Call for Paper - August 2022 Edition
IJCA solicits original research papers for the August 2022 Edition. Last date of manuscript submission is July 20, 2022. Read More

Security Issues of Cyber Physical System: A Review

Print
PDF
IJCA Proceedings on National Conference on Advances in Computing Applications
© 2016 by IJCA Journal
NCACA 2016 - Number 1
Year of Publication: 2016
Authors:
Piyush Maheshwari

Piyush Maheshwari. Article: Security Issues of Cyber Physical System: A Review. IJCA Proceedings on National Conference on Advances in Computing Applications NCACA 2016(1):7-11, September 2016. Full text available. BibTeX

@article{key:article,
	author = {Piyush Maheshwari},
	title = {Article: Security Issues of Cyber Physical System: A Review},
	journal = {IJCA Proceedings on National Conference on Advances in Computing Applications},
	year = {2016},
	volume = {NCACA 2016},
	number = {1},
	pages = {7-11},
	month = {September},
	note = {Full text available}
}

Abstract

Cyber Physical System (CPS) is extensively used in various fields like critical infrastructure control, vehicular system and transportation, social networking, medical and healthcare systems. The security concern for CPS is of utmost importance. CPS is vulnerable to many kinds of attacks that may cause major loss and potential security risk. In this paper, we will elaborate the requirement of security in CPS on the basis of attacks on CPS taking into account the existing security issues and the challenges to provide the security.

References

  • . Park, K. J. , Zheng, R. , and Liu, X. , "Cyber-physical systems: Milestones and research challenges". Computer Communications. 36,1 , 2012, 1-7.
  • . Ragunathan (Raj) Rajkumar, Insup Lee, LuiSha , John Stankovic "Cyber-Physical Systems: The Next Computing Revolution" , Anaheim, California, USA,Design Automation Conference,2010.
  • . Andrei Petrovski, PrapaRattadilok, Sergei Petrovski, "Designing a Context-Aware Cyber Physical System for Detecting Security Threats in Motor Vehicles", ACM, 2015.
  • . Siddhartha Kumar Khaitan, James D. McCalley, " Design Techniques and Applications of Cyber physical Systems: A Survey" IEEE SYSTEMS JOURNAL, 2014.
  • . CharalambosKonstantinou!,MichailManiatakos!, FareenaSaqib†, Shiyan Hu‡, Jim Plusquellic§ and Yier Jin, "Cyber-Physical Systems: A Security Perspective", 20th IEEE European Test Symposium (ETS), 2015.
  • . Tianbo Lu1,2, Jinyang Zhao1, Lingling Zhao1, Yang Li1 and Xiaoyan Zhang1, "Towards a Framework for Assuring Cyber Physical System Security", International Journal of Security and Its Applications Vol. 9, No. 3 , 2015, pp. 25-40
  • . Eric KeWang,Yunming Ye, XiaofeiXu, S. M. Yiu, L. C. K. Hui, K. P. Chow , "Security Issues and Challenges for Cyber Physical System", IEEE/ACM International Conference on Green Computing and Communications &2010 IEEE/ACM International Conference on Cyber, Physical and Social Computing , 2010
  • . Dr. Nabil Adam, "Workshop on Future Directions in Cyber-Physical Systems Security", Final Report January 2010.
  • . M. Bishop. Computer Security: Art and Science. Addison-Wesley Professional, 1st edition, 2002.
  • . Krishna Kumar Venkatasubramanian, "security solutions for cyber-physical systems",A Dissertation Presented in Partial Fulfillmentof the Requirements for the DegreeDoctor of Philosophy Arizona State University, December 2009.
  • . Fabio Pasqualetti, "Attack Detection and Identification in Cyber-Physical Systems", IEEE transactions on automatic control, vol. 58, no. 11, november 2013.
  • . K. Chalkias, F. Baldimtsi, D. Hristu-Varsakelis and G. Stephanides, "Two Types of Key-Compromise Impersonation Attacks against One-Pass Key Establishment Protocols", Communications inComputer and Information Science, Volume 23, Part 3, 227-238,2009.
  • . J. -C. Kao and R. Marculescu, "Eavesdropping Minimization via Transmission Power Control in Ad-Hoc Wireless Networks", 3rd Annual IEEE Communications Society on Sensor and Ad Hoc Communications and Networks, (2006), pp. 707-714.
  • . K. Chalkias, F. Baldimtsi, D. Hristu-Varsakelis and G. Stephanides, "Two Types of Key-Compromise Impersonation Attacks against One-Pass Key Establishment Protocols", Communications in Computer and Information Science, vol. 23, (2009), pp. 227-238.
  • . L. Yuzhe, S. Ling, C. Peng, C. Jiming and D. E. Quevedo, "Jamming attack on Cyber-Physical Systems: A game-theoretic approach," Cyber Technology in Automation, Control and Intelligent Systems (CYBER), 2013 IEEE 3rd Annual International Conference on, (2013), pp. 252-257.
  • . Z. Heng, C. Peng, S. Ling and C. Jiming, "Optimal DoS attack policy against remote state estimation," Decision and Control (CDC), 2013 IEEE 52nd Annual Conference on, (2013), pp. 5444-5449.
  • . UttamAdhikari, "Event and intrusion detection systems for cyber-physical power systems" ,Doctoral Dissertations, Mississippi State, MississippiAugust2015.
  • . Kevin G. Lyn, "Classification of and Resilience to Cyber-Attacks on Cyber-Physical Systems",Doctoral Dissertations, Georgia Institute of Technology, August 2015.
  • . K. Cheolhyeon, L. Weiyi and H. Inseok, "Security analysis for Cyber-Physical Systems against stealthy deception attacks," American Control Conference (ACC), (2013), pp. 3344-3349.
  • . AnisDrira, "Characterization of Optimal Cyber Attacks onControl Systems", Doctoral Dissertations, The University of Tennessee, Knoxville,December2015.
  • . Y. Yuan, Z. Quanyan, S. Fuchun, W. Qinyi and T. Basar, "Resilient control of cyber-physical systems against Denial-of-Service attacks," Resilient Control Systems (ISRCS), 2013 6th International Symposium on, (2013), pp. 54-59.
  • . R. Saltzman and A. Sharabani, "Active Man in the Middle Attacks, A Security Advisory", A whitepaper from IBM Rational Application Security Group, (2009) February 27.