We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Security Issues of Cyber Physical System: A Review

Published on September 2016 by Piyush Maheshwari
National Conference on Advances in Computing Applications
Foundation of Computer Science USA
NCACA2016 - Number 1
September 2016
Authors: Piyush Maheshwari
fa2a9c62-48d9-4363-9783-8f2eba1a1146

Piyush Maheshwari . Security Issues of Cyber Physical System: A Review. National Conference on Advances in Computing Applications. NCACA2016, 1 (September 2016), 7-11.

@article{
author = { Piyush Maheshwari },
title = { Security Issues of Cyber Physical System: A Review },
journal = { National Conference on Advances in Computing Applications },
issue_date = { September 2016 },
volume = { NCACA2016 },
number = { 1 },
month = { September },
year = { 2016 },
issn = 0975-8887,
pages = { 7-11 },
numpages = 5,
url = { /proceedings/ncaca2016/number1/26166-1035/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 National Conference on Advances in Computing Applications
%A Piyush Maheshwari
%T Security Issues of Cyber Physical System: A Review
%J National Conference on Advances in Computing Applications
%@ 0975-8887
%V NCACA2016
%N 1
%P 7-11
%D 2016
%I International Journal of Computer Applications
Abstract

Cyber Physical System (CPS) is extensively used in various fields like critical infrastructure control, vehicular system and transportation, social networking, medical and healthcare systems. The security concern for CPS is of utmost importance. CPS is vulnerable to many kinds of attacks that may cause major loss and potential security risk. In this paper, we will elaborate the requirement of security in CPS on the basis of attacks on CPS taking into account the existing security issues and the challenges to provide the security.

References
  1. . Park, K. J. , Zheng, R. , and Liu, X. , "Cyber-physical systems: Milestones and research challenges". Computer Communications. 36,1 , 2012, 1-7.
  2. . Ragunathan (Raj) Rajkumar, Insup Lee, LuiSha , John Stankovic "Cyber-Physical Systems: The Next Computing Revolution" , Anaheim, California, USA,Design Automation Conference,2010.
  3. . Andrei Petrovski, PrapaRattadilok, Sergei Petrovski, "Designing a Context-Aware Cyber Physical System for Detecting Security Threats in Motor Vehicles", ACM, 2015.
  4. . Siddhartha Kumar Khaitan, James D. McCalley, " Design Techniques and Applications of Cyber physical Systems: A Survey" IEEE SYSTEMS JOURNAL, 2014.
  5. . CharalambosKonstantinou!,MichailManiatakos!, FareenaSaqib†, Shiyan Hu‡, Jim Plusquellic§ and Yier Jin, "Cyber-Physical Systems: A Security Perspective", 20th IEEE European Test Symposium (ETS), 2015.
  6. . Tianbo Lu1,2, Jinyang Zhao1, Lingling Zhao1, Yang Li1 and Xiaoyan Zhang1, "Towards a Framework for Assuring Cyber Physical System Security", International Journal of Security and Its Applications Vol. 9, No. 3 , 2015, pp. 25-40
  7. . Eric KeWang,Yunming Ye, XiaofeiXu, S. M. Yiu, L. C. K. Hui, K. P. Chow , "Security Issues and Challenges for Cyber Physical System", IEEE/ACM International Conference on Green Computing and Communications &2010 IEEE/ACM International Conference on Cyber, Physical and Social Computing , 2010
  8. . Dr. Nabil Adam, "Workshop on Future Directions in Cyber-Physical Systems Security", Final Report January 2010.
  9. . M. Bishop. Computer Security: Art and Science. Addison-Wesley Professional, 1st edition, 2002.
  10. . Krishna Kumar Venkatasubramanian, "security solutions for cyber-physical systems",A Dissertation Presented in Partial Fulfillmentof the Requirements for the DegreeDoctor of Philosophy Arizona State University, December 2009.
  11. . Fabio Pasqualetti, "Attack Detection and Identification in Cyber-Physical Systems", IEEE transactions on automatic control, vol. 58, no. 11, november 2013.
  12. . K. Chalkias, F. Baldimtsi, D. Hristu-Varsakelis and G. Stephanides, "Two Types of Key-Compromise Impersonation Attacks against One-Pass Key Establishment Protocols", Communications inComputer and Information Science, Volume 23, Part 3, 227-238,2009.
  13. . J. -C. Kao and R. Marculescu, "Eavesdropping Minimization via Transmission Power Control in Ad-Hoc Wireless Networks", 3rd Annual IEEE Communications Society on Sensor and Ad Hoc Communications and Networks, (2006), pp. 707-714.
  14. . K. Chalkias, F. Baldimtsi, D. Hristu-Varsakelis and G. Stephanides, "Two Types of Key-Compromise Impersonation Attacks against One-Pass Key Establishment Protocols", Communications in Computer and Information Science, vol. 23, (2009), pp. 227-238.
  15. . L. Yuzhe, S. Ling, C. Peng, C. Jiming and D. E. Quevedo, "Jamming attack on Cyber-Physical Systems: A game-theoretic approach," Cyber Technology in Automation, Control and Intelligent Systems (CYBER), 2013 IEEE 3rd Annual International Conference on, (2013), pp. 252-257.
  16. . Z. Heng, C. Peng, S. Ling and C. Jiming, "Optimal DoS attack policy against remote state estimation," Decision and Control (CDC), 2013 IEEE 52nd Annual Conference on, (2013), pp. 5444-5449.
  17. . UttamAdhikari, "Event and intrusion detection systems for cyber-physical power systems" ,Doctoral Dissertations, Mississippi State, MississippiAugust2015.
  18. . Kevin G. Lyn, "Classification of and Resilience to Cyber-Attacks on Cyber-Physical Systems",Doctoral Dissertations, Georgia Institute of Technology, August 2015.
  19. . K. Cheolhyeon, L. Weiyi and H. Inseok, "Security analysis for Cyber-Physical Systems against stealthy deception attacks," American Control Conference (ACC), (2013), pp. 3344-3349.
  20. . AnisDrira, "Characterization of Optimal Cyber Attacks onControl Systems", Doctoral Dissertations, The University of Tennessee, Knoxville,December2015.
  21. . Y. Yuan, Z. Quanyan, S. Fuchun, W. Qinyi and T. Basar, "Resilient control of cyber-physical systems against Denial-of-Service attacks," Resilient Control Systems (ISRCS), 2013 6th International Symposium on, (2013), pp. 54-59.
  22. . R. Saltzman and A. Sharabani, "Active Man in the Middle Attacks, A Security Advisory", A whitepaper from IBM Rational Application Security Group, (2009) February 27.
Index Terms

Computer Science
Information Sciences

Keywords

Cyber Physical System (cps) Security Attack.