Abstract
Concerns with the security of the cyber-physical systems include the malicious attempts by an adversary to intercept, disrupt, defect or fail cyber-physical systems that may affect a large group of population, an important government agency or an influential business entity by denying availability of services, stealing sensitive data, or causing various types of damages, as well as the security breaches in small scale cyber-physical systems that may affect few individuals or relatively smaller entities.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
N. Adam, “Cyber-physical systems security,” presented at the Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies, Oak Ridge, Tennessee, 2009.
E. K. Wang, et al., “Security Issues and Challenges for Cyber-Physical System,” presented at the Proceedings of the 2010 IEEE/ACM Int’l Conference on Green Computing and Communications \& Int’l Conference on Cyber, Physical and Social Computing, 2010.
M. Yilin, et al., “Cyber-Physical Security of a Smart Grid Infrastructure,” Proceedings of the IEEE, vol. 100, pp. 195–209, 2012.
J. Mirkovic, et al., Internet denial of service: attack and defense mechanisms: Prentice Hall, 2005.
M. Brownfield, et al., “Wireless sensor network denial of sleep attack,” in Information Assurance Workshop, 2005. IAW ‘05. Proceedings from the Sixth Annual IEEE SMC, 2005, pp. 356–364.
A. Dinaburg, et al., “Ether: malware analysis via hardware virtualization extensions,” presented at the Proceedings of the 15th ACM conference on Computer and communications security, Alexandria, Virginia, USA, 2008.
M. I. Sharif, et al., “Impeding Malware Analysis Using Conditional Code Obfuscation,” in NDSS’08, 2008.
C. Willems, et al., “Toward Automated Dynamic Malware Analysis Using CWSandbox,” Security & Privacy, IEEE, vol. 5, pp. 32–39, 2007.
A. Moser, et al., “Exploring Multiple Execution Paths for Malware Analysis,” in Security and Privacy, 2007. SP ‘07. IEEE Symposium on, 2007, pp. 231–245.
C. Zimmer, et al., “Time-based intrusion detection in cyber-physical systems,” presented at the Proceedings of the 1st ACM/IEEE International Conference on Cyber-Physical Systems, Stockholm, Sweden, 2010.
R. Chow, et al., “Enhancing cyber-physical security through data patterns,” in Proceedings of the Workshop on Foundations of Dependable and Secure Cyber-Physical Systems, 2011.
B. Thuraisingham, “Data mining for security applications: Mining concept-drifting data streams to detect peer to peer botnet traffic,” in Intelligence and Security Informatics, 2008. ISI 2008. IEEE International Conference on, 2008, pp. xxix–xxx.
R. Gummadi, et al., “Not-a-Bot: improving service availability in the face of botnet attacks,” presented at the Proceedings of the 6th USENIX symposium on Networked systems design and implementation, Boston, Massachusetts, 2009.
K. Xu, et al., “Data-Provenance Verification For Secure Hosts,” IEEE Trans. Dependable Secur. Comput., vol. 9, pp. 173–183, 2012.
P. Gupta, “Algorithms for routing lookups and packet classification,” PhD Thesis, Stanford University, Stanford, CA, USA, 2000.
A. X. Liu and M. G. Gouda, “Diverse Firewall Design,” Parallel and Distributed Systems, IEEE Transactions on, vol. 19, pp. 1237–1251, 2008.
N. C. Team, “NuFW firewall: Now User Filtering Works,” 2008.
A. A. Cardenas, et al., “Secure Control: Towards Survivable Cyber-Physical Systems,” in Distributed Computing Systems Workshops, 2008. ICDCS ‘08. 28th International Conference on, 2008, pp. 495–500.
R. Akella, et al., “Analysis of information flow security in cyber–physical systems,” International Journal of Critical Infrastructure Protection, vol. 3, pp. 157–173, 2010.
T. T. Gamage, et al., “Enforcing Information Flow Security Properties in Cyber-Physical Systems: A Generalized Framework Based on Compensation,” presented at the Proceedings of the 2010 IEEE 34th Annual Computer Software and Applications Conference Workshops, 2010.
T. Gamage, et al., “Information flow security in cyber-physical systems,” presented at the Proceedings of the Seventh Annual Workshop on Cyber Security and Information Intelligence Research, Oak Ridge, Tennessee, 2011.
C. Neuman, “Challenges in Security for Cyber-Physical Systems,” in Workshop on Future Directions in Cyber-physical Systems Security, 2009.
H. Tang and B. M. McMillin, “Security Property Violation in CPS through Timing,” presented at the Proceedings of the 2008 The 28th International Conference on Distributed Computing Systems Workshops, 2008.
F. Mueller, “Challenges for Cyber-Physical Systems: Security, Timing Analysis and Soft Error Protection,” in Proc. of the National Workshop on High Confidence Software Platforms for Cyber-Physical Systems, 2008.
T. T. Gamage, et al., “Confidentiality Preserving Security Properties for Cyber-Physical Systems,” presented at the Proceedings of the 2011 IEEE 35th Annual Computer Software and Applications Conference, 2011.
T. Kohno, “Security for cyber-physical systems: case studies with medical devices, robots, and automobiles,” presented at the Proceedings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks, Tucson, Arizona, USA, 2012.
R. Mitchell and I.-R. Chen, “Behavior Rule Based Intrusion Detection for Supporting Secure Medical Cyber Physical Systems,” in Computer Communications and Networks (ICCCN), 2012 21st International Conference on, 2012, pp. 1–7.
Z. Quanyan, et al., “A hierarchical security architecture for cyber-physical systems,” in Resilient Control Systems (ISRCS), 2011 4th International Symposium on, 2011, pp. 15–20.
M. Mathews, et al., “Detecting Compromised Nodes in Wireless Sensor Networks,” in Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, 2007. SNPD 2007. Eighth ACIS International Conference on, 2007, pp. 273–278.
P. R. Nalabolu, “Detecting Malicious Code in Sensor Network Applications Using Petri Nets,” M.S., Oklahoma State University, Oklahoma City, OK, USA, 2007.
K. K. Fletcher and L. Xiaoqing, “Security Requirements Analysis, Specification, Prioritization and Policy Development in Cyber-Physical Systems,” in Secure Software Integration & Reliability Improvement Companion (SSIRI-C), 2011 5th International Conference on, 2011, pp. 106–113.
M. Azab and M. Eltoweissy, “Defense as a service cloud for Cyber-Physical Systems,” in Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom), 2011 7th International Conference on, 2011, pp. 392–401.
G. S. Lee and B. Thuraisingham, “Cyber-physical systems security applied to telesurgical robotics,” Comput. Stand. Interfaces, vol. 34, pp. 225–229, 2012.
O. Al Ibrahim and S. Nair, “Cyber-physical security using system-level PUFs,” in Wireless Communications and Mobile Computing Conference (IWCMC), 2011 7th International, 2011, pp. 1672–1676.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer Science+Business Media New York
About this paper
Cite this paper
Karim, M.E., Phoha, V.V. (2014). Cyber-physical Systems Security. In: Suh, S., Tanik, U., Carbone, J., Eroglu, A. (eds) Applied Cyber-Physical Systems. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-7336-7_7
Download citation
DOI: https://doi.org/10.1007/978-1-4614-7336-7_7
Published:
Publisher Name: Springer, New York, NY
Print ISBN: 978-1-4614-7335-0
Online ISBN: 978-1-4614-7336-7
eBook Packages: Computer ScienceComputer Science (R0)