Skip to main content

Identification of Safety and Security Vulnerabilities in Cyber Physical Systems

  • Conference paper
  • First Online:
Data Science and Analytics (REDSET 2019)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1230))

Abstract

Cyber physical systems (CPS) known as a class of automated systems working as a life line of smart cities such as home automation system, power grid, automotive industry, etc. The security aspects of these systems are at high demand as these systems are involved in day to day life of people and national economy. The compromised CPS can harm day to day operations of people. CPS systems are complex in design and more prone to cyber-attacks. In this study, the safety and security deficiencies at different levels of CPS are analyzed and discussed. The systematic survey of safety and security loopholes presented in current study. In addition, this paper describes risk factors for security and techniques which can be implemented to mitigate risks. This paper also elaborated the related work done by researchers and new research focus in this area.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Asare, P., Broman, D., Lee, E.A., Torngren, M., Sunder, S.S.: Cyberphysical systems (2012). http://cyberphysicalsystems.org/. Accessed 24 Dec 2016

  2. Vegh, L., Miclea, L.: Enhancing security in cyber-physical systems through cryptographic and steganographic techniques. In: Automation, Quality and Testing, Robotics International Conference, pp. 1–6. IEEE (2014)

    Google Scholar 

  3. Zhang, B., Ma, X., Qin, Z.: Security architecture on the trusting internet of things. J. Electron. Sci. Technol. 9(4), 364–367 (2011)

    Google Scholar 

  4. Nourian, A., Madnick, S.: A systems theoretic approach to the security threats in cyber physical systems applied to stuxnet. IEEE Syst. J. (2015). https://doi.org/10.1109/TDSC.2015.2509994

    Article  Google Scholar 

  5. Peng, Y., Lu, T., Liu, J., Gao, Y., Guo, X., Xie, F.: Cyber-physical system risk assessment. In: Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp. 442–447 (2013)

    Google Scholar 

  6. Leavitt, N.: Researchers fight to keep implanted medical devices safe from hackers. Computer 43(8), 11–14 (2010)

    Article  Google Scholar 

  7. Gervasoni, A.: Alternative funding sources for growth: the role of private equity, Venture Capital and Private Debt (2015)

    Google Scholar 

  8. Jalali, S.: Trends and implications in embedded systems development. Tata Consult. Serv. Limited, TCS white paper (2009)

    Google Scholar 

  9. Konstantinou, C., Maniatakos, M., Saqib, F., Hu, S., Plusquellic, J., Jin, Y.: Cyber-physical systems: a security perspective. In: 20th IEEE European Test Symposium, pp. 1–8 (2015)

    Google Scholar 

  10. Wang, E.K., Ye, Y., Xu, X., Yiu, S.M., Hui, L.C.K., Chow, K.P.: Security issues and challenges for cyber physical system. In: Proceedings of the IEEE/ACM International Conference on Green Computing and Communications and International Conference on Cyber, Physical and Social Computing, pp. 733–738 (2010)

    Google Scholar 

  11. Ashibani, Y., Mahmoud, Q.H.: Cyber physical systems security: analysis, challenges and solutions. Comput. Secur. 68, 81–97 (2017)

    Article  Google Scholar 

  12. Shafi, Q.: Cyber physical systems security: a brief survey. In: 12th International Conference on Computational Science and Its Applications (ICCSA), pp. 146–150. IEEE (2012)

    Google Scholar 

  13. Gifty, R., Bharathi, R., Krishnakumar, P.: Privacy and security of big data in cyber physical systems using Weibull distribution-based intrusion detection. Neural Comput. Appl. 31(1), 23–34 (2018). https://doi.org/10.1007/s00521-018-3635-6

    Article  Google Scholar 

  14. Peng, Y., Lu, T., Liu, J., Gao, Y., Guo, X., Xie, F.: Cyber-physical system risk assessment. In: Proceedings of Ninth International Conference on Intelligent Information Hiding and Mulitmedia Signal Processing, pp. 442–447. IEEE Computer Society (2013)

    Google Scholar 

  15. Giraldo, J., Sarkar, E., Cardenas, A.A., Maniatakos, M., Kantarcioglu, M.: Security and privacy in cyber-physical systems: a survey of surveys. IEEE Des. Test 34(4), 7–17 (2017). https://doi.org/10.1109/mdat.2017.2709310

    Article  Google Scholar 

  16. Padir, T., Fischer, G.S., Chernova, S., Gennert, M.A.: A unified and integrated approach to teaching a two-course sequence in Robotics Engineering. JRM 23(5), 748–758 (2011)

    Article  Google Scholar 

  17. Edwards, S.A., Lee, E.A.: The case for the precision timed (PRET) machine. In: Proceedings of the 44th ACM/IEEE Design Automation Conference (DAC), San Diego, CA, pp. 264–265 (2007)

    Google Scholar 

  18. Avissar, O., Barua, R., Stewart, D.: An optimal memory allocation scheme for scratch-pad-based embedded systems. ACM Trans. Embedded Comput. Syst. 1(1), 6–26 (2002)

    Article  Google Scholar 

  19. Henzinger, T.A., Horowitz, B., Kirsch, C.M.: Giotto: a timetriggered language for embedded programming. Proc. IEEE 91(1), 84–99 (2003)

    Article  Google Scholar 

  20. Berry, G.: The effectiveness of synchronous languages for the development of safety-critical systems. Technical report, Esterel Technologies (2003)

    Google Scholar 

  21. Lee, E.A., Neuendorffer, S., Wirthlin, M.J.: Actor-oriented design of embedded hardware and software systems. J. Circuit. Syst. Comput. 12(3), 231–260 (2003)

    Article  Google Scholar 

  22. Johannessen, S.: Time synchronization in a local area network. IEEE Control Syst. 24(2), 61–69 (2004)

    Article  Google Scholar 

  23. Tardieu, O., Edwards, S.A.: Scheduling-independent threads and exceptions in SHIM. In: Proceedings of the 6th ACM & IEEE International Conference on Embedded Software, Seoul, Korea, pp. 142–151 (2006)

    Google Scholar 

  24. Zhao, Y., Liu, J., Lee, E.A.: A programming model for time-synchronized distributed real-time systems. In: Proceedings of the 13th IEEE Real Time and Embedded Technology and Applications Symposium, Bellevue, USA, pp. 259–268 (2007)

    Google Scholar 

  25. Abdelzaher, T.: Research challenges in distributed cyber-physical systems. In: Proceedings of the IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, Shanghai, China, p. 5 (2008)

    Google Scholar 

  26. Ahola, T., Korpinen, P., Rakkola, J., Ramo, T., Salminen, J., Savolainen, J.: Wearable FPGA based wireless sensor platform. In: Proceedings of the 29th Annual International Conference on IEEE Engineering in Medicine and Biology Society, Lyon, pp. 2288–2291 (2007)

    Google Scholar 

  27. Peng, Y., Lu, T., Liu, J., Gao, Y., Guo, X., Xie, F.: Cyber-physical system risk assessment, 442–447 (2013). https://doi.org/10.1109/iih-msp.2013.116

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Abhilasha Vyas .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Vyas, A., Batra, U. (2020). Identification of Safety and Security Vulnerabilities in Cyber Physical Systems. In: Batra, U., Roy, N., Panda, B. (eds) Data Science and Analytics. REDSET 2019. Communications in Computer and Information Science, vol 1230. Springer, Singapore. https://doi.org/10.1007/978-981-15-5830-6_1

Download citation

  • DOI: https://doi.org/10.1007/978-981-15-5830-6_1

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-15-5829-0

  • Online ISBN: 978-981-15-5830-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics