Skip to main content
Log in

Analysis of Cross-Domain Security and Privacy Aspects of Cyber-Physical Systems

  • Published:
International Journal of Wireless Information Networks Aims and scope Submit manuscript

Abstract

Cyber-physical systems (CPSs) are the recent surfacing of engineered systems in which the integration of computing, communication, and control technologies are so secure. Many important application fields such as transportation, energy, and medical systems employ Cyber-physical systems as the basic engineering systems which we conclude from various researches. The rapid and important development of CPS is affecting many aspects of people's lifestyles, enabling a wide range of applications and services such as Smart Home, E-Health, and ecommerce. They have the capability to consolidate sensor networks with implanted processing to screen and control the actual environment, with input circles that permits this outside boost to self-initiate either correspondence, control or registering. In spite of their various benefits, CPS frameworks are inclined to different digital and additionally actual security dangers, assaults and difficulties. This is because of their heterogeneous nature, their dependence on private information, and their enormous scope arrangement. Thus, purposeful or unplanned openings of these frameworks can result in calamitous impacts, which makes it basic to set up vigorous safety efforts. Currently, there is an increase in the present security confrontation with the epidemic growth of cyber-physical systems. There has been an influx of susceptibility, risks, attacks, and controls for the emerging latest generation of CPS. This paper overviews the security of cyber-physical systems along with the exploration of various cyber-attacks associated with CPS. Furthermore, this paper gives us a clear picture of various applications in several domains as well as the CPS in various emerging technologies.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  1. M. Albalawi and H. Song, Data security and privacy issues in swarms of drones, in: 2019 Integrated Communications, Navigation and Surveillance Conference (ICNS). pp. 1–11, 2019. https://doi.org/10.1109/ICNSURV.2019.8735133.

  2. A. Sharma, K. Bhasin, P. Gulati and S. Kumar, Cyberattacks and security of cyber-physical systems, in: Proceedings of the International Conference on Innovative Computing & Communications (ICICC). pp. 1–6, 2020. https://doi.org/10.2139/ssrn.3600709.

  3. N. Tuptuk and S. Hailes, Security of smart manufacturing systems, Journal of Manufacturing Systems, Vol. 47, pp. 93–106, 2018.

    Article  Google Scholar 

  4. A. Stefanov and C. C. Liu, Cyber-power system security in a smart grid environment, in: 2012 IEEE PES Innovative Smart Grid Technologies (ISGT). pp. 1–3, IEEE, 2012.

  5. Z. A. Al-Sharif, M. I. Al-Saleh, L. M. Alawneh, Y. I. Jararweh and B. Gupta, Live forensics of software attacks on cyber–physical systems, Future Generation Computer Systems, Vol. 108, pp. 1217–1229, 2020. https://doi.org/10.1016/j.future.2018.07.028.

    Article  Google Scholar 

  6. J. Dsouza, L. Elezabeth, V. P. Mishra and R. Jain, Security in cyber-physical systems, in: 2019 Amity International Conference on Artificial Intelligence (AICAI). pp. 840–844, IEEE, 2019.

  7. X. Ouyang, B. Tian, Q. Li, J. Y. Zhang, Z. M. Hu and Y. Xin, A novel framework of defense system against DoS attacks in wireless sensor networks, in: 2011 7th International Conference on Wireless Communications, Networking and Mobile Computing. pp. 1–5, IEEE, 2011.

  8. H. A. Kholidy, Autonomous mitigation of cyber risks in the Cyber-Physical Systems, Future Generation Computer Systems, Vol. 115, pp. 171–187, 2021. https://doi.org/10.1016/j.future.2020.09.002.

    Article  Google Scholar 

  9. D. Zhang, Q. G. Wang, G. Feng, Y. Shi and A. V. Vasilakos, A survey on attack detection, estimation and control of industrial cyber–physical systems, ISA Transactions, Vol. 116, pp. 1–16, 2021. https://doi.org/10.1016/j.isatra.2021.01.036.

    Article  Google Scholar 

  10. A. A. Khalil, J. Franco, I. Parvez, S. Uluagac, and M. A. Rahman, A Literature Review on Blockchain-enabled Security and Operation of Cyber-Physical Systems, pp. 2–6, 2021.

  11. A. Ahmed Jamal, A.-A. Mustafa Majid, A. Konev, T. Kosachenko and A. Shelupanov, A review on security analysis of cyber physical systems using machine learning, Materials Today: Proceedings, 2021. https://doi.org/10.1016/j.matpr.2021.06.320.

    Article  Google Scholar 

  12. Yu. Luo, Y. Xiao, L. Cheng, G. Peng and D. D. Yao, Deep learning-based anomaly detection in cyber-physical systems: progress and opportunities, ACM Computing Surveys (CSUR), Vol. 54, No. 5, pp. 1–4, 2021. https://doi.org/10.1145/3453155.

    Article  Google Scholar 

  13. R. H. Jhaveri, R. Tan and S. V. Ramani, Real-time QoS-aware routing scheme in SDN-based robotic cyber-physical systems, in: 2019 IEEE 5th International Conference on Mechatronics System and Robots (ICMSR), 2019. pp. 18–23, 2019.

  14. T. Park, D. Cho and H. Kim, An effective classification for DoS attacks in wireless sensor networks, in: 2018 Tenth international conference on ubiquitous and future networks (ICUFN). pp. 689–692, IEEE, 2018.

  15. A. Longras, H. Oliveira and S. Paiva, Security vulnerabilities on implantable medical devices, in: 2020 15th Iberian Conference on Information Systems and Technologies (CISTI), Vol. 2020, pp. 24–27, 2020. https://doi.org/10.23919/CISTI49556.2020.9141043.

  16. L. Zhang, J. Zhang and Y. H. Hu, A privacy-preserving distributed smart metering temporal and spatial aggregation scheme, IEEE Access, Vol. 7, pp. 28372–28382, 2019. https://doi.org/10.1109/ACCESS.2019.2899961.

    Article  Google Scholar 

  17. S. Zhao, et al., Smart and practical privacy-preserving data aggregation for fog-based smart grids, IEEE Transactions on Information Forensics and Security, Vol. 16, pp. 521–536, 2021. https://doi.org/10.1109/TIFS.2020.3014487.

    Article  Google Scholar 

  18. F. Kargl, R. W. van der Heijden, H. König, A. Valdes and M. C. Dacier, Insights on the security and dependability of industrial control systems, IEEE Security & Privacy, Vol. 12, No. 6, pp. 75–78, 2014.

    Article  Google Scholar 

  19. L. Lyu, Y. W. Law, J. Jin and M. Palaniswami, Privacy-preserving aggregation of smart metering via transformation and encryption, in: 2017 IEEE Trustcom/BigDataSE/ICESS. pp. 472–479, IEEE, 2017.

  20. U. Bihr, T. Liu and M. Ortmanns, Telemetry for implantable medical devices: Part 3-Data telemetry, IEEE Solid-State Circuits Magazine, Vol. 6, No. 4, pp. 56–62, 2014.

    Article  Google Scholar 

  21. C. Konstantinou, M. Maniatakos, F. Saqib, S. Hu, J. Plusquellic and Y. Jin, Cyber-physical systems: a security perspective, in: 2015 20th IEEE European Test Symposium (ETS). pp. 1–8, IEEE, 2015.

  22. Y. Tan, J. Wang, J. Liu and Y. Zhang, Unmanned systems security: models, challenges, and future directions, IEEE Network, Vol. 34, No. 4, pp. 291–297, 2020. https://doi.org/10.1109/MNET.001.1900546.

    Article  Google Scholar 

  23. C. Lin, D. He, N. Kumar, K. K. Choo, A. Vinel and X. Huang, Security and privacy for the internet of drones: challenges and solutions, IEEE Communications Magazine, Vol. 56, No. 1, pp. 64–69, 2018.

    Article  Google Scholar 

  24. R. Panigrahi, S. Borah, A. K. Bhoi, M. F. Ijaz, M. Pramanik, R. H. Jhaveri and C. L. Chowdhary, Performance assessment of supervised classifiers for designing intrusion detection systems: a comprehensive review and recommendations for future research, Mathematics, Vol. 9, No. 6, pp. 690, 2021.

    Article  Google Scholar 

  25. M. A. Marquez, R. S. Herrera, A. Mejias, F. Esquembre and J. M. Andujar, Controlled and secure access to promote the industrial internet of things, IEEE Access, Vol. 6, pp. 48289–48299, 2018. https://doi.org/10.1109/ACCESS.2018.2867794.

    Article  Google Scholar 

  26. A. Mohammadi, P. Cheng, V. Piuri, K. N. Plataniotis and P. Campisi, Guest editorial distributed signal processing for security and privacy in networked cyber-physical systems, IEEE Transactions on Signal and Information Processing over Networks, Vol. 4, No. 1, pp. 1–3, 2018.

    Article  Google Scholar 

  27. R. Alguliyev, Y. Imamverdiyev and L. Sukhostat, Cyber-physical systems and their security issues, Computers in Industry, Vol. 100, pp. 212–223, 2018.

    Article  Google Scholar 

  28. A. S. M. Sanwar Hosen, et al., Blockchain-based transaction validation protocol for a secure distributed IoT network, IEEE Access, Vol. 8, pp. 117266–117277, 2020. https://doi.org/10.1109/ACCESS.2020.3004486.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ramani Selvanambi.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Prasat, K., Sanjay, S., Ananya, V. et al. Analysis of Cross-Domain Security and Privacy Aspects of Cyber-Physical Systems. Int J Wireless Inf Networks 29, 454–479 (2022). https://doi.org/10.1007/s10776-022-00559-6

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10776-022-00559-6

Keywords

Navigation