CFP last date
20 May 2024
Reseach Article

An Information Security Risk Assessment Framework for Cyber-Physical System

by Keerti Dixit, Umesh Kumar Singh, Bhupendra Kumar Pandya
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 183 - Number 53
Year of Publication: 2022
Authors: Keerti Dixit, Umesh Kumar Singh, Bhupendra Kumar Pandya
10.5120/ijca2022921939

Keerti Dixit, Umesh Kumar Singh, Bhupendra Kumar Pandya . An Information Security Risk Assessment Framework for Cyber-Physical System. International Journal of Computer Applications. 183, 53 ( Feb 2022), 41-44. DOI=10.5120/ijca2022921939

@article{ 10.5120/ijca2022921939,
author = { Keerti Dixit, Umesh Kumar Singh, Bhupendra Kumar Pandya },
title = { An Information Security Risk Assessment Framework for Cyber-Physical System },
journal = { International Journal of Computer Applications },
issue_date = { Feb 2022 },
volume = { 183 },
number = { 53 },
month = { Feb },
year = { 2022 },
issn = { 0975-8887 },
pages = { 41-44 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume183/number53/32293-2022921939/ },
doi = { 10.5120/ijca2022921939 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:19:51.978473+05:30
%A Keerti Dixit
%A Umesh Kumar Singh
%A Bhupendra Kumar Pandya
%T An Information Security Risk Assessment Framework for Cyber-Physical System
%J International Journal of Computer Applications
%@ 0975-8887
%V 183
%N 53
%P 41-44
%D 2022
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The term "Cyber-physical system" refers to a system that combines physical and cyber capabilities. It is a new field in the twenty-first century. CPS is in grave danger of being hacked. A well-designed CPS risk assessment will provide a comprehensive picture of the facility's security state and aid in the efficient deployment of safeguard resources. Despite the fact that standard IT system risk assessment is well-established, due to the significant differences between IT systems and CPS, a separate risk assessment method for CPS is required to address the developing security challenges. This paper highlights the security objective and challenges of CPS. In this research paper we have developed an Information Security Risk Assessment Framework for Cyber-Physical System.

References
  1. L. Gurgen, O. Gunalp, Y. Benazzouz and M. Gallissot, "Self-aware cyber-physical systems and applications in smart buildings and cities," in Design, Automation & Test in Europe Conference & Exhibition (DATE) (pp. 1149-1154). IEEE., 2013.
  2. R. Rajkumar, I. Lee, L. Sha and J. Stankovic, “Cyber-physical systems: the next computing revolution,” in Design Automation Conference (DAC), 2010 47th ACM/IEEE (pp. 731-736). IEEE., 2010.
  3. L. Da Xu, W. He and S. Li, "Internet of things in industries: A survey," IEEE Transactions on industrial informatics, 10(4), 2233-2243., 2014.
  4. J. Gubbi, R. Buyya and S. P. M. Marusic, "Internet of Things (IoT): A vision, architectural elements, and future directions," Future Generation Computer Systems, 29(7), pp.1645- 1660, 2013.
  5. J. Wan, H. Yan, H. Suo and F. Li, "Advances in Cyber-Physical Systems Research.," KSII Transactions on Internet & Information Systems,, p. 5(11), 2011.
  6. M. E. Brak, S. E. Brak, M. Essaaidi and D. Benhaddou, "Wireless Sensor Network applications in smart grid," in International Renewable and Sustainable Energy Conference (IRSEC) (pp. 587-592). IEEE., 2014.
  7. B. Bordel, R. Alcarria, T. Robles and D. Martín, "Cyber–physical systems: Extending pervasive sensing from control theory to the Internet of Things," in Pervasive and mobile computing, 40, 156-184., 2017.
  8. Tawalbeh, L.A., Mowafi, M. and Aljoby, W. (2013) Use of Elliptic Curve Cryptography for Multimedia Encryption. IET Information Security, 7, 67-74. https://doi.org/10.1049/iet-ifs.2012.0147
  9. Rungger, M. and Tabuada, P. (2013) A Notion of Robustness for Cyber-Physical Systems.
  10. Lo’ai, A.T., Mehmood, R., Benkhlifa, E. and Song, H. (2016) Mobile Cloud Compu- ting Model and Big Data Analysis for Healthcare Applications. IEEE Access, 4, 6171-6180. https://doi.org/10.1109/ACCESS.2016.2613278
  11. Tawalbeh, L.A., Haddad, Y., Khamis, O., Benkhelifa, E., Jararweh, Y. and AlDosari, F. (2016) Efficient and Secure Software-Defined Mobile Cloud Computing Infra- structure. International Journal of High Performance Computing and Networking, 9, 328-341. https://doi.org/10.1504/IJHPCN.2016.077825
  12. Kocher, P.C. (1996) Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems. Proceedings of CRYPTO, Santa Barbara, August 1996, 104-113. https://doi.org/10.1007/3-540-68697-5_9
  13. Y. Guan and X. Ge, "Distributed attack detection and secure estimation of networked cyber-physical systems against false data injection attacks and jamming attacks," in IEEE Transactions on Signal and Information Processing over Networks, 4(1), 48-59., 2017.
  14. Y. Peng, T. Lu, J. Liu, Y. Gao, X. Guo and F. Xie, "Cyber-physical System Risk Assessment," 2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing., 2013. 169
  15. T. Lu, J. Lin, L. Zhao, Y. Li and Y. Peng, "A Security Architecture in Cyber-Physical Systems. Security Theories, Analysis, Simulation and Application Fields," IJSIA (International Journal of Security and Its Applications) 9 (7), 2015.
  16. Konstantinou C, Maniatakos M, Saqib F, Hu S, Plusquellic J, Jin Y. Cyber-physical systems: a security perspective, 20th IEEE Eur. Test Symp., pp. 1–8, 2015.
  17. Raza S. Lightweight security solutions for the Internet of Things, Mälardalen University Press Dissertations, Mälardalen University, Västerås, Sweden, 2013.
  18. Wang EK, Ye Y, Xu X, Yiu SM, Hui LCK, Chow KP. Security issues and challenges for cyber physical system, Proc. IEEE/ACM Int’l Conf. Green Comput. Commun. Int’l Conf. Cyber, Phys. Soc. Comput., pp. 733–738, 2010.
  19. Weiss J. Control system cyber vulnerabilities and potential mitigation of risk for utilities, White Pap. Juniper Networks, Inc., 2010.
  20. Hu W, Oberg J, Barrientos J, Mu D, Kastner R. Expanding gate level information flow tracking for multilevel security. IEEE Embed Syst Lett 2013;5(2):25–8.
  21. Jing Q, Vasilakos AV, Wan J. Security of the internet of things: perspectives and challenges. Wirel Netw 2014;20(8): 2481–501.
  22. Lu T, Xu B, Guo X, Zhao L, Xie F. A new multilevel framework for cyber-physical system security, pp. 2–3, 2013.
  23. Stankovic JA. Research directions for the internet of things. IEEE Internet Things J 2014;3–9. no. c.
Index Terms

Computer Science
Information Sciences

Keywords

Cyber-physical System Information Security Risk Assessment.