Skip to main content

Secure Infrastructure for Cyber-Physical Ranges

  • 494 Accesses

Part of the Lecture Notes in Business Information Processing book series (LNBIP,volume 476)


Industrial systems (IS), including critical ones, swiftly move towards integrating elements of modern Information Technology (IT) into their formerly air-gapped Operational Technology (OT) architectures. And, naturally, the more such systems become interconnected, the more alluring they pose to attackers. Concurrently, the twenty-four-seven availability of these systems renders it harder for defenders to promptly apply contemporary security controls. In this context, cyber ranges have emerged as a proper complementary solution for better comprehending and subsequently tackling the relevant risks without endangering the operation of the real systems. This work aspires to contribute a reference architecture for designing and developing cross-sector critical infrastructure (CI) cyber-physical ranges and security testbeds. A second key goal is to demonstrate the soundness of the proposed reference architecture through the implementation and evaluation of a number of cyber range instances specifically tailored for CIs of interest, including manufacturing, energy, and healthcare.


  • Industry 4.0
  • cyber-physical system
  • reference architecture
  • cyber-physical range
  • security testbed
  • risk assessment

This is a preview of subscription content, access via your institution.

Buying options

USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
USD   79.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   99.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions


  1. Agrawal, N., Kumar, R.: Security perspective analysis of industrial cyber physical systems: a decade-wide survey. ISA Trans. 130, 10–24 (2022)

    CrossRef  Google Scholar 

  2. Bécue, A., et al.: 1-securing the industry 4.0 with cyber-ranges and digital twins. In: Proceedings of the 2018 14th IEEE International Workshop on Factory Communication Systems (WFCS), Imperia, Italy, pp. 13–15 (2018)

    Google Scholar 

  3. International Electrotechnical Commission: IEC 62443 security for industrial automation and control systems standard (2018)

    Google Scholar 

  4. Geng, Y., Wang, Y., Liu, W., Wei, Q., Liu, K., Wu, H.: A survey of industrial control system testbeds. In: IOP Conference Series: Materials Science and Engineering, vol. 569, p. 042030. IOP Publishing (2019)

    Google Scholar 

  5. Habib, M.K., Chimsom, C., et al.: CPS: role, characteristics, architectures and future potentials. Procedia Comput. Sci. 200, 1347–1358 (2022)

    CrossRef  Google Scholar 

  6. Holm, H., Karresand, M., Vidström, A., Westring, E.: A survey of industrial control system testbeds. In: Buchegger, S., Dam, M. (eds.) NordSec 2015. LNCS, vol. 9417, pp. 11–26. Springer, Cham (2015).

    CrossRef  Google Scholar 

  7. Kavallieratos, G., Katsikas, S.K., Gkioulos, V.: Towards a cyber-physical range. In: Proceedings of the 5th Workshop on Cyber-Physical System Security, pp. 25–34 (2019)

    Google Scholar 

  8. Kayan, H., Nunes, M., Rana, O., Burnap, P., Perera, C.: Cybersecurity of industrial cyber-physical systems: a review. ACM Comput. Surv. 54(11s), 1–35 (2022)

    CrossRef  Google Scholar 

  9. Lydia, M., Kumar, P.E.G., Selvakumar, A.I.: Securing the cyber-physical system: a review. Cyber-Phys. Syst. 1–31 (2022)

    Google Scholar 

  10. Makrakis, G.M., Kolias, C., Kambourakis, G., Rieger, C., Benjamin, J.: Industrial and critical infrastructure security: technical analysis of real-life security incidents. IEEE Access 9, 165295–165325 (2021)

    CrossRef  Google Scholar 

  11. NIST: Cyber ranges. Accessed 27 Mar 2023

  12. Peffers, K., Tuunanen, T., Rothenberger, M.A., Chatterjee, S.: A design science research methodology for information systems research. J. Manag. Inf. Syst. 24(3), 45–77 (2007)

    CrossRef  Google Scholar 

  13. Ross, R., Victoria, P., Gary, G., Ryan, W., Richard, G., Deborah, B.: Enhanced security requirements for protecting controlled unclassified information (2021).

  14. Yamin, M.M., Katt, B., Gkioulos, V.: Cyber ranges and security testbeds: scenarios, functions, tools and architecture. Comput. Secur. 88, 101636 (2020)

    CrossRef  Google Scholar 

Download references


This Ph.D. is carried out under the supervision of Profs. Vasileios Gkioulos and Sokratis Katsikas of Norwegian University of Science and Technology, Gjøvik, Norway and Dr. Habtamu Abie of the Norwegian Computing Centre.

Author information

Authors and Affiliations


Corresponding author

Correspondence to Vyron Kampourakis .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and Permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kampourakis, V. (2023). Secure Infrastructure for Cyber-Physical Ranges. In: Nurcan, S., Opdahl, A.L., Mouratidis, H., Tsohou, A. (eds) Research Challenges in Information Science: Information Science and the Connected World. RCIS 2023. Lecture Notes in Business Information Processing, vol 476. Springer, Cham.

Download citation

  • DOI:

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-33079-7

  • Online ISBN: 978-3-031-33080-3

  • eBook Packages: Computer ScienceComputer Science (R0)