Skip to main content

AI and Security of Cyber Physical Systems: Opportunities and Challenges

  • Chapter
  • First Online:
Security of Cyber-Physical Systems

Abstract

Much of the recent innovation and development in technology is geared towards the integration of communication networks among systems and devices. Various applications of technology are witnessing a shift to internet-linked components and integrating cyber and physical systems together; such phenomenon is often referred to as Cyber Physical Systems (CPS). CPS is used in many applications including industrial control systems and critical infrastructure such as health-care and power generation. The increased integration of CPS and internet networks raises security concerns and vulnerabilities. This book delves into some of the security challenges associated with CPS as well as intelligent methods used to secure CPS in various applications. The book also discusses various AI-based methods for enhanced CPS security and performance and presents case studies and proof of concepts in simulated environments.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 149.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 199.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 199.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. D. Miorandi, S. Sicari, F. De Pellegrini, I. Chlamtac, Internet of things: vision, applications and research challenges. Ad Hoc Netw. 10, 1497–1516 (2012)

    Article  Google Scholar 

  2. A. Milenković, C. Otto, E. Jovanov, Wireless sensor networks for personal health monitoring: issues and an implementation. Comput. Commun. 29, 2521–2533 (2006)

    Article  Google Scholar 

  3. A. Ferlin, R. Ben-Ayed, P. Sun, S. Collart-Dutilleul, P. Bon, Implementation of ERTMS: a methodology based on formal methods and simulation with respect to French national rules. Transp. Res. Procedia 14, 1957–1966 (2016). Transport Research Arena TRA2016

    Google Scholar 

  4. J.J.P.C. Rodrigues, D.B. De Rezende Segundo, H.A. Junqueira, M.H. Sabino, R.M. Prince, J. Al-Muhtadi, V.H.C. De Albuquerque, Enabling technologies for the Internet of health things. IEEE Access 6, 13129–13141 (2018)

    Article  Google Scholar 

  5. M. Hassanalieragh, A. Page, T. Soyata, G. Sharma, M. Aktas, G. Mateos, B. Kantarci, S. Andreescu, Health monitoring and management using Internet-of-Things (IoT) sensing with cloud-based processing: opportunities and challenges, in 2015 IEEE International Conference on Services Computing, New York City, NY, June (IEEE, Piscataway, 2015), pp. 285–292

    Google Scholar 

  6. A. Luque-Ayala, S. Marvin, Developing a critical understanding of smart urbanism? Urban Stud. 52, 2105–2116 (2015)

    Article  Google Scholar 

  7. F. Khalid, S. Rehman, M. Shafique, Overview of security for smart cyber-physical systems, in Security of Cyber-Physical System: Vulnerability and Impact, ch. 2, pp. 5–25 (Springer International Publishing, Cham, 2019)

    Google Scholar 

  8. H. Asai, T. Aoyama, Y. Ota, T. Hashimoto, I. Koshijima, Design and operation framework for industrial control system security exercise, in Security of Cyber-Physical System: Vulnerability and Impact, ch. 3, pp. 26–62 (Springer International Publishing, Cham, 2019)

    Google Scholar 

  9. W. Liao, P. Li, Cascading failure attacks in the power system, in Security of Cyber-Physical System: Vulnerability and Impact, ch. 4, pp. 63–88 (Springer International Publishing, Cham, 2019)

    Google Scholar 

  10. F. Derakhshan, M. Ashrafnejad, The risk of botnets in cyber physical systems, in Security of Cyber-Physical System: Vulnerability and Impact, ch. 5, pp. 88–119 (Springer International Publishing, Cham, 2019)

    Google Scholar 

  11. F.S. Mozaffari, H. Karimipour, R.M. Parizi, Learning based anomaly detection in critical cyber-physical systems, in Security of Cyber-Physical System: Vulnerability and Impact, ch. 6, pp. 120–147 (Springer International Publishing, Cham, 2019)

    Google Scholar 

  12. M. Sun, J. Zhang, Data-driven anomaly detection in modern power systems, in Security of Cyber-Physical System: Vulnerability and Impact, ch. 7, pp. 148–161 (Springer International Publishing, Cham, 2019)

    Google Scholar 

  13. H.M. Rouzbahani, Z. Faraji, M. Amiri-Zarandi, H. Karimipour, Ai-enabled security monitoring in smart cyber physical grids, in Security of Cyber-Physical System: Vulnerability and Impact, ch. 8, pp. 162–194 (Springer International Publishing, Cham, 2019)

    Google Scholar 

  14. S. Hadayeghparast, H. Karimipour, Application of machine learning in state estimation of smart cyber-physical grid, in Security of Cyber-Physical System: Vulnerability and Impact, ch. 9, pp. 195–227 (Springer International Publishing, Cham, 2019)

    Google Scholar 

  15. S. Nakhodchi, A. Upadhyay, A. Dehghantanha, A comparison between different machine learning models for IoT malware detection, in Security of Cyber-Physical System: Vulnerability and Impact, ch. 10, pp. 228–242 (Springer International Publishing, Cham, 2019)

    Google Scholar 

  16. S. Nakhodchi, A. Dehghantanha, A bibliometric analysis on the application of deep learning in cybersecurity, in Security of Cyber-Physical System: Vulnerability and Impact, ch. 11, pp. 243–272 (Springer International Publishing, Cham, 2019)

    Google Scholar 

  17. K. Yamashita, C.-W. Ten, L. Wang, Dynamical analysis of cyber-related contingencies initiated from substations, in Security of Cyber-Physical System: Vulnerability and Impact, ch. 12, pp. 273–297 (Springer International Publishing, Cham, 2019)

    Google Scholar 

  18. J. Liu, P. Srikantha, Distributed attack and mitigation strategies for active power distribution networks, in Security of Cyber-Physical System: Vulnerability and Impact, ch. 13, pp. 298–315 (Springer International Publishing, Cham, 2019)

    Google Scholar 

  19. P. Srikantha, A. Shi, B. Zhang, D. Kundur, Privacy-preserving homomorphic masking for smart grid data analytics in the cloud, in Security of Cyber-Physical System: Vulnerability and Impact, ch. 14, pp. 316–342 (Springer International Publishing, Cham, 2019)

    Google Scholar 

  20. Y. Wu, J. Wei, B.-M. Hodge, A distributed middleware architecture for attack-resilient communications in smart grids, in Security of Cyber-Physical System: Vulnerability and Impact, ch. 16, pp. 365–394 (Springer International Publishing, Cham, 2019)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hadis Karimipour .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Sakhnini, J., Karimipour, H. (2020). AI and Security of Cyber Physical Systems: Opportunities and Challenges. In: Karimipour, H., Srikantha, P., Farag, H., Wei-Kocsis, J. (eds) Security of Cyber-Physical Systems. Springer, Cham. https://doi.org/10.1007/978-3-030-45541-5_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-45541-5_1

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-45540-8

  • Online ISBN: 978-3-030-45541-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics