Cyber Physical Security for Industrial Control Systems and IoT

Cyber-attacks and cybersecurity used to be the issues for those who use Internet and computers. The issues, however, are expanding to anyone who does not even use them directly. The society is gradually and heavily depending on networks and computers. They are not closed within a cyberspace anymore and having interaction with our real world with sensors and actuators. Such systems are known as CPS (Cyber Physical Systems), IoT/E (Internet of Things/Everything), Industry 4.0, Industrial Internet, M2M, etc. No matter what they are called, exploitation of any of these systems may cause a serious influence to our real life and appropriate countermeasures must be taken to mitigate the risks. In this paper, cybersecurity in ICS (Industrial Control Systems) is reviewed as a leading example of cyber physical security for critical infrastructures. Then as a future aspect of it, IoT security for consumers is explained. key words: security, Cyber Physical System, Industrial Control System, IoT, M2M

[1]  Yehuda Lindell,et al.  Privacy Preserving Data Mining , 2002, Journal of Cryptology.

[2]  Latanya Sweeney,et al.  k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[3]  SeongHan Shin,et al.  A Simple Leakage-Resilient Authenticated Key Establishment Protocol, Its Extensions, and Applications , 2005, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..

[4]  Cynthia Dwork,et al.  Differential Privacy , 2006, ICALP.

[5]  ASHWIN MACHANAVAJJHALA,et al.  L-diversity: privacy beyond k-anonymity , 2006, 22nd International Conference on Data Engineering (ICDE'06).

[6]  Ninghui Li,et al.  t-Closeness: Privacy Beyond k-Anonymity and l-Diversity , 2007, 2007 IEEE 23rd International Conference on Data Engineering.

[7]  G. Edward Suh,et al.  Physical Unclonable Functions for Device Authentication and Secret Key Generation , 2007, 2007 44th ACM/IEEE Design Automation Conference.

[8]  Vitaly Shmatikov,et al.  Robust De-anonymization of Large Sparse Datasets , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).

[9]  SeongHan Shin,et al.  Protocols for purpose-restricted anonymous communications in IP-based wireless networks , 2008, Comput. Commun..

[10]  N. Geethanjali,et al.  Secure Authenticated Key Exchange Protocol for Credential Services , 2009 .

[11]  SeongHan Shin,et al.  Anonymous Password-Authenticated Key Exchange: New Construction and Its Extensions , 2010, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..

[12]  Ichiro Koshijima,et al.  Safety securing approach against cyber-attacks for process control system , 2013, Comput. Chem. Eng..

[13]  D. Kushner,et al.  The real story of stuxnet , 2013, IEEE Spectrum.

[14]  Kazukuni Kobara,et al.  Kernel Memory Protection by an Insertable Hypervisor Which Has VM Introspection and Stealth Breakpoints , 2014, IWSEC.

[15]  Kazukuni Kobara,et al.  Evaluation of Physical Unclonable Functions for 28-nm Process Field-Programmable Gate Arrays , 2014, J. Inf. Process..

[16]  Yohei Hori,et al.  Cryptographie key generation from PUF data using efficient fuzzy extractors , 2014, 16th International Conference on Advanced Communication Technology.

[17]  Tsutomu Matsumoto,et al.  IoTPOT: Analysing the Rise of IoT Compromises , 2015, WOOT.

[18]  N. Weitzel The Year in Review 2014 , 2015, Seminars in cardiothoracic and vascular anesthesia.