Abstract
Cyber physical systems (CPS) known as a class of automated systems working as a life line of smart cities such as home automation system, power grid, automotive industry, etc. The security aspects of these systems are at high demand as these systems are involved in day to day life of people and national economy. The compromised CPS can harm day to day operations of people. CPS systems are complex in design and more prone to cyber-attacks. In this study, the safety and security deficiencies at different levels of CPS are analyzed and discussed. The systematic survey of safety and security loopholes presented in current study. In addition, this paper describes risk factors for security and techniques which can be implemented to mitigate risks. This paper also elaborated the related work done by researchers and new research focus in this area.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Asare, P., Broman, D., Lee, E.A., Torngren, M., Sunder, S.S.: Cyberphysical systems (2012). http://cyberphysicalsystems.org/. Accessed 24 Dec 2016
Vegh, L., Miclea, L.: Enhancing security in cyber-physical systems through cryptographic and steganographic techniques. In: Automation, Quality and Testing, Robotics International Conference, pp. 1–6. IEEE (2014)
Zhang, B., Ma, X., Qin, Z.: Security architecture on the trusting internet of things. J. Electron. Sci. Technol. 9(4), 364–367 (2011)
Nourian, A., Madnick, S.: A systems theoretic approach to the security threats in cyber physical systems applied to stuxnet. IEEE Syst. J. (2015). https://doi.org/10.1109/TDSC.2015.2509994
Peng, Y., Lu, T., Liu, J., Gao, Y., Guo, X., Xie, F.: Cyber-physical system risk assessment. In: Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp. 442–447 (2013)
Leavitt, N.: Researchers fight to keep implanted medical devices safe from hackers. Computer 43(8), 11–14 (2010)
Gervasoni, A.: Alternative funding sources for growth: the role of private equity, Venture Capital and Private Debt (2015)
Jalali, S.: Trends and implications in embedded systems development. Tata Consult. Serv. Limited, TCS white paper (2009)
Konstantinou, C., Maniatakos, M., Saqib, F., Hu, S., Plusquellic, J., Jin, Y.: Cyber-physical systems: a security perspective. In: 20th IEEE European Test Symposium, pp. 1–8 (2015)
Wang, E.K., Ye, Y., Xu, X., Yiu, S.M., Hui, L.C.K., Chow, K.P.: Security issues and challenges for cyber physical system. In: Proceedings of the IEEE/ACM International Conference on Green Computing and Communications and International Conference on Cyber, Physical and Social Computing, pp. 733–738 (2010)
Ashibani, Y., Mahmoud, Q.H.: Cyber physical systems security: analysis, challenges and solutions. Comput. Secur. 68, 81–97 (2017)
Shafi, Q.: Cyber physical systems security: a brief survey. In: 12th International Conference on Computational Science and Its Applications (ICCSA), pp. 146–150. IEEE (2012)
Gifty, R., Bharathi, R., Krishnakumar, P.: Privacy and security of big data in cyber physical systems using Weibull distribution-based intrusion detection. Neural Comput. Appl. 31(1), 23–34 (2018). https://doi.org/10.1007/s00521-018-3635-6
Peng, Y., Lu, T., Liu, J., Gao, Y., Guo, X., Xie, F.: Cyber-physical system risk assessment. In: Proceedings of Ninth International Conference on Intelligent Information Hiding and Mulitmedia Signal Processing, pp. 442–447. IEEE Computer Society (2013)
Giraldo, J., Sarkar, E., Cardenas, A.A., Maniatakos, M., Kantarcioglu, M.: Security and privacy in cyber-physical systems: a survey of surveys. IEEE Des. Test 34(4), 7–17 (2017). https://doi.org/10.1109/mdat.2017.2709310
Padir, T., Fischer, G.S., Chernova, S., Gennert, M.A.: A unified and integrated approach to teaching a two-course sequence in Robotics Engineering. JRM 23(5), 748–758 (2011)
Edwards, S.A., Lee, E.A.: The case for the precision timed (PRET) machine. In: Proceedings of the 44th ACM/IEEE Design Automation Conference (DAC), San Diego, CA, pp. 264–265 (2007)
Avissar, O., Barua, R., Stewart, D.: An optimal memory allocation scheme for scratch-pad-based embedded systems. ACM Trans. Embedded Comput. Syst. 1(1), 6–26 (2002)
Henzinger, T.A., Horowitz, B., Kirsch, C.M.: Giotto: a timetriggered language for embedded programming. Proc. IEEE 91(1), 84–99 (2003)
Berry, G.: The effectiveness of synchronous languages for the development of safety-critical systems. Technical report, Esterel Technologies (2003)
Lee, E.A., Neuendorffer, S., Wirthlin, M.J.: Actor-oriented design of embedded hardware and software systems. J. Circuit. Syst. Comput. 12(3), 231–260 (2003)
Johannessen, S.: Time synchronization in a local area network. IEEE Control Syst. 24(2), 61–69 (2004)
Tardieu, O., Edwards, S.A.: Scheduling-independent threads and exceptions in SHIM. In: Proceedings of the 6th ACM & IEEE International Conference on Embedded Software, Seoul, Korea, pp. 142–151 (2006)
Zhao, Y., Liu, J., Lee, E.A.: A programming model for time-synchronized distributed real-time systems. In: Proceedings of the 13th IEEE Real Time and Embedded Technology and Applications Symposium, Bellevue, USA, pp. 259–268 (2007)
Abdelzaher, T.: Research challenges in distributed cyber-physical systems. In: Proceedings of the IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, Shanghai, China, p. 5 (2008)
Ahola, T., Korpinen, P., Rakkola, J., Ramo, T., Salminen, J., Savolainen, J.: Wearable FPGA based wireless sensor platform. In: Proceedings of the 29th Annual International Conference on IEEE Engineering in Medicine and Biology Society, Lyon, pp. 2288–2291 (2007)
Peng, Y., Lu, T., Liu, J., Gao, Y., Guo, X., Xie, F.: Cyber-physical system risk assessment, 442–447 (2013). https://doi.org/10.1109/iih-msp.2013.116
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Vyas, A., Batra, U. (2020). Identification of Safety and Security Vulnerabilities in Cyber Physical Systems. In: Batra, U., Roy, N., Panda, B. (eds) Data Science and Analytics. REDSET 2019. Communications in Computer and Information Science, vol 1230. Springer, Singapore. https://doi.org/10.1007/978-981-15-5830-6_1
Download citation
DOI: https://doi.org/10.1007/978-981-15-5830-6_1
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-5829-0
Online ISBN: 978-981-15-5830-6
eBook Packages: Computer ScienceComputer Science (R0)