Call for Paper - January 2024 Edition
IJCA solicits original research papers for the January 2024 Edition. Last date of manuscript submission is December 20, 2023. Read More

An Information Security Risk Assessment Framework for Cyber-Physical System

International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2022
Keerti Dixit, Umesh Kumar Singh, Bhupendra Kumar Pandya

Keerti Dixit, Umesh Kumar Singh and Bhupendra Kumar Pandya. An Information Security Risk Assessment Framework for Cyber-Physical System. International Journal of Computer Applications 183(53):41-44, February 2022. BibTeX

	author = {Keerti Dixit and Umesh Kumar Singh and Bhupendra Kumar Pandya},
	title = {An Information Security Risk Assessment Framework for Cyber-Physical System},
	journal = {International Journal of Computer Applications},
	issue_date = {February 2022},
	volume = {183},
	number = {53},
	month = {Feb},
	year = {2022},
	issn = {0975-8887},
	pages = {41-44},
	numpages = {4},
	url = {},
	doi = {10.5120/ijca2022921939},
	publisher = {Foundation of Computer Science (FCS), NY, USA},
	address = {New York, USA}


The term "Cyber-physical system" refers to a system that combines physical and cyber capabilities. It is a new field in the twenty-first century. CPS is in grave danger of being hacked. A well-designed CPS risk assessment will provide a comprehensive picture of the facility's security state and aid in the efficient deployment of safeguard resources. Despite the fact that standard IT system risk assessment is well-established, due to the significant differences between IT systems and CPS, a separate risk assessment method for CPS is required to address the developing security challenges. This paper highlights the security objective and challenges of CPS. In this research paper we have developed an Information Security Risk Assessment Framework for Cyber-Physical System.


  1. L. Gurgen, O. Gunalp, Y. Benazzouz and M. Gallissot, "Self-aware cyber-physical systems and applications in smart buildings and cities," in Design, Automation & Test in Europe Conference & Exhibition (DATE) (pp. 1149-1154). IEEE., 2013.
  2. R. Rajkumar, I. Lee, L. Sha and J. Stankovic, “Cyber-physical systems: the next computing revolution,” in Design Automation Conference (DAC), 2010 47th ACM/IEEE (pp. 731-736). IEEE., 2010.
  3. L. Da Xu, W. He and S. Li, "Internet of things in industries: A survey," IEEE Transactions on industrial informatics, 10(4), 2233-2243., 2014.
  4. J. Gubbi, R. Buyya and S. P. M. Marusic, "Internet of Things (IoT): A vision, architectural elements, and future directions," Future Generation Computer Systems, 29(7), pp.1645- 1660, 2013.
  5. J. Wan, H. Yan, H. Suo and F. Li, "Advances in Cyber-Physical Systems Research.," KSII Transactions on Internet & Information Systems,, p. 5(11), 2011.
  6. M. E. Brak, S. E. Brak, M. Essaaidi and D. Benhaddou, "Wireless Sensor Network applications in smart grid," in International Renewable and Sustainable Energy Conference (IRSEC) (pp. 587-592). IEEE., 2014.
  7. B. Bordel, R. Alcarria, T. Robles and D. Martín, "Cyber–physical systems: Extending pervasive sensing from control theory to the Internet of Things," in Pervasive and mobile computing, 40, 156-184., 2017.
  8. Tawalbeh, L.A., Mowafi, M. and Aljoby, W. (2013) Use of Elliptic Curve Cryptography for Multimedia Encryption. IET Information Security, 7, 67-74.
  9. Rungger, M. and Tabuada, P. (2013) A Notion of Robustness for Cyber-Physical Systems.
  10. Lo’ai, A.T., Mehmood, R., Benkhlifa, E. and Song, H. (2016) Mobile Cloud Compu- ting Model and Big Data Analysis for Healthcare Applications. IEEE Access, 4, 6171-6180.
  11. Tawalbeh, L.A., Haddad, Y., Khamis, O., Benkhelifa, E., Jararweh, Y. and AlDosari, F. (2016) Efficient and Secure Software-Defined Mobile Cloud Computing Infra- structure. International Journal of High Performance Computing and Networking, 9, 328-341.
  12. Kocher, P.C. (1996) Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems. Proceedings of CRYPTO, Santa Barbara, August 1996, 104-113.
  13. Y. Guan and X. Ge, "Distributed attack detection and secure estimation of networked cyber-physical systems against false data injection attacks and jamming attacks," in IEEE Transactions on Signal and Information Processing over Networks, 4(1), 48-59., 2017.
  14. Y. Peng, T. Lu, J. Liu, Y. Gao, X. Guo and F. Xie, "Cyber-physical System Risk Assessment," 2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing., 2013. 169
  15. T. Lu, J. Lin, L. Zhao, Y. Li and Y. Peng, "A Security Architecture in Cyber-Physical Systems. Security Theories, Analysis, Simulation and Application Fields," IJSIA (International Journal of Security and Its Applications) 9 (7), 2015.
  16. Konstantinou C, Maniatakos M, Saqib F, Hu S, Plusquellic J, Jin Y. Cyber-physical systems: a security perspective, 20th IEEE Eur. Test Symp., pp. 1–8, 2015.
  17. Raza S. Lightweight security solutions for the Internet of Things, Mälardalen University Press Dissertations, Mälardalen University, Västerås, Sweden, 2013.
  18. Wang EK, Ye Y, Xu X, Yiu SM, Hui LCK, Chow KP. Security issues and challenges for cyber physical system, Proc. IEEE/ACM Int’l Conf. Green Comput. Commun. Int’l Conf. Cyber, Phys. Soc. Comput., pp. 733–738, 2010.
  19. Weiss J. Control system cyber vulnerabilities and potential mitigation of risk for utilities, White Pap. Juniper Networks, Inc., 2010.
  20. Hu W, Oberg J, Barrientos J, Mu D, Kastner R. Expanding gate level information flow tracking for multilevel security. IEEE Embed Syst Lett 2013;5(2):25–8.
  21. Jing Q, Vasilakos AV, Wan J. Security of the internet of things: perspectives and challenges. Wirel Netw 2014;20(8): 2481–501.
  22. Lu T, Xu B, Guo X, Zhao L, Xie F. A new multilevel framework for cyber-physical system security, pp. 2–3, 2013.
  23. Stankovic JA. Research directions for the internet of things. IEEE Internet Things J 2014;3–9. no. c.


Cyber-physical System, Information Security Risk Assessment.