Skip to main content

Cyber-physical Systems Security

  • Conference paper
  • First Online:

Abstract

Concerns with the security of the cyber-physical systems include the malicious attempts by an adversary to intercept, disrupt, defect or fail cyber-physical systems that may affect a large group of population, an important government agency or an influential business entity by denying availability of services, stealing sensitive data, or causing various types of damages, as well as the security breaches in small scale cyber-physical systems that may affect few individuals or relatively smaller entities.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. N. Adam, “Cyber-physical systems security,” presented at the Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies, Oak Ridge, Tennessee, 2009.

    Google Scholar 

  2. E. K. Wang, et al., “Security Issues and Challenges for Cyber-Physical System,” presented at the Proceedings of the 2010 IEEE/ACM Int’l Conference on Green Computing and Communications \& Int’l Conference on Cyber, Physical and Social Computing, 2010.

    Google Scholar 

  3. M. Yilin, et al., “Cyber-Physical Security of a Smart Grid Infrastructure,” Proceedings of the IEEE, vol. 100, pp. 195–209, 2012.

    Google Scholar 

  4. J. Mirkovic, et al., Internet denial of service: attack and defense mechanisms: Prentice Hall, 2005.

    Google Scholar 

  5. M. Brownfield, et al., “Wireless sensor network denial of sleep attack,” in Information Assurance Workshop, 2005. IAW ‘05. Proceedings from the Sixth Annual IEEE SMC, 2005, pp. 356–364.

    Google Scholar 

  6. A. Dinaburg, et al., “Ether: malware analysis via hardware virtualization extensions,” presented at the Proceedings of the 15th ACM conference on Computer and communications security, Alexandria, Virginia, USA, 2008.

    Google Scholar 

  7. M. I. Sharif, et al., “Impeding Malware Analysis Using Conditional Code Obfuscation,” in NDSS’08, 2008.

    Google Scholar 

  8. C. Willems, et al., “Toward Automated Dynamic Malware Analysis Using CWSandbox,” Security & Privacy, IEEE, vol. 5, pp. 32–39, 2007.

    Google Scholar 

  9. A. Moser, et al., “Exploring Multiple Execution Paths for Malware Analysis,” in Security and Privacy, 2007. SP ‘07. IEEE Symposium on, 2007, pp. 231–245.

    Google Scholar 

  10. C. Zimmer, et al., “Time-based intrusion detection in cyber-physical systems,” presented at the Proceedings of the 1st ACM/IEEE International Conference on Cyber-Physical Systems, Stockholm, Sweden, 2010.

    Google Scholar 

  11. R. Chow, et al., “Enhancing cyber-physical security through data patterns,” in Proceedings of the Workshop on Foundations of Dependable and Secure Cyber-Physical Systems, 2011.

    Google Scholar 

  12. B. Thuraisingham, “Data mining for security applications: Mining concept-drifting data streams to detect peer to peer botnet traffic,” in Intelligence and Security Informatics, 2008. ISI 2008. IEEE International Conference on, 2008, pp. xxix–xxx.

    Google Scholar 

  13. R. Gummadi, et al., “Not-a-Bot: improving service availability in the face of botnet attacks,” presented at the Proceedings of the 6th USENIX symposium on Networked systems design and implementation, Boston, Massachusetts, 2009.

    Google Scholar 

  14. K. Xu, et al., “Data-Provenance Verification For Secure Hosts,” IEEE Trans. Dependable Secur. Comput., vol. 9, pp. 173–183, 2012.

    Google Scholar 

  15. P. Gupta, “Algorithms for routing lookups and packet classification,” PhD Thesis, Stanford University, Stanford, CA, USA, 2000.

    Google Scholar 

  16. A. X. Liu and M. G. Gouda, “Diverse Firewall Design,” Parallel and Distributed Systems, IEEE Transactions on, vol. 19, pp. 1237–1251, 2008.

    Google Scholar 

  17. N. C. Team, “NuFW firewall: Now User Filtering Works,” 2008.

    Google Scholar 

  18. A. A. Cardenas, et al., “Secure Control: Towards Survivable Cyber-Physical Systems,” in Distributed Computing Systems Workshops, 2008. ICDCS ‘08. 28th International Conference on, 2008, pp. 495–500.

    Google Scholar 

  19. R. Akella, et al., “Analysis of information flow security in cyber–physical systems,” International Journal of Critical Infrastructure Protection, vol. 3, pp. 157–173, 2010.

    Google Scholar 

  20. T. T. Gamage, et al., “Enforcing Information Flow Security Properties in Cyber-Physical Systems: A Generalized Framework Based on Compensation,” presented at the Proceedings of the 2010 IEEE 34th Annual Computer Software and Applications Conference Workshops, 2010.

    Google Scholar 

  21. T. Gamage, et al., “Information flow security in cyber-physical systems,” presented at the Proceedings of the Seventh Annual Workshop on Cyber Security and Information Intelligence Research, Oak Ridge, Tennessee, 2011.

    Google Scholar 

  22. C. Neuman, “Challenges in Security for Cyber-Physical Systems,” in Workshop on Future Directions in Cyber-physical Systems Security, 2009.

    Google Scholar 

  23. H. Tang and B. M. McMillin, “Security Property Violation in CPS through Timing,” presented at the Proceedings of the 2008 The 28th International Conference on Distributed Computing Systems Workshops, 2008.

    Google Scholar 

  24. F. Mueller, “Challenges for Cyber-Physical Systems: Security, Timing Analysis and Soft Error Protection,” in Proc. of the National Workshop on High Confidence Software Platforms for Cyber-Physical Systems, 2008.

    Google Scholar 

  25. T. T. Gamage, et al., “Confidentiality Preserving Security Properties for Cyber-Physical Systems,” presented at the Proceedings of the 2011 IEEE 35th Annual Computer Software and Applications Conference, 2011.

    Google Scholar 

  26. T. Kohno, “Security for cyber-physical systems: case studies with medical devices, robots, and automobiles,” presented at the Proceedings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks, Tucson, Arizona, USA, 2012.

    Google Scholar 

  27. R. Mitchell and I.-R. Chen, “Behavior Rule Based Intrusion Detection for Supporting Secure Medical Cyber Physical Systems,” in Computer Communications and Networks (ICCCN), 2012 21st International Conference on, 2012, pp. 1–7.

    Google Scholar 

  28. Z. Quanyan, et al., “A hierarchical security architecture for cyber-physical systems,” in Resilient Control Systems (ISRCS), 2011 4th International Symposium on, 2011, pp. 15–20.

    Google Scholar 

  29. M. Mathews, et al., “Detecting Compromised Nodes in Wireless Sensor Networks,” in Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, 2007. SNPD 2007. Eighth ACIS International Conference on, 2007, pp. 273–278.

    Google Scholar 

  30. P. R. Nalabolu, “Detecting Malicious Code in Sensor Network Applications Using Petri Nets,” M.S., Oklahoma State University, Oklahoma City, OK, USA, 2007.

    Google Scholar 

  31. K. K. Fletcher and L. Xiaoqing, “Security Requirements Analysis, Specification, Prioritization and Policy Development in Cyber-Physical Systems,” in Secure Software Integration & Reliability Improvement Companion (SSIRI-C), 2011 5th International Conference on, 2011, pp. 106–113.

    Google Scholar 

  32. M. Azab and M. Eltoweissy, “Defense as a service cloud for Cyber-Physical Systems,” in Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom), 2011 7th International Conference on, 2011, pp. 392–401.

    Google Scholar 

  33. G. S. Lee and B. Thuraisingham, “Cyber-physical systems security applied to telesurgical robotics,” Comput. Stand. Interfaces, vol. 34, pp. 225–229, 2012.

    Google Scholar 

  34. O. Al Ibrahim and S. Nair, “Cyber-physical security using system-level PUFs,” in Wireless Communications and Mobile Computing Conference (IWCMC), 2011 7th International, 2011, pp. 1672–1676.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Vir V. Phoha .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer Science+Business Media New York

About this paper

Cite this paper

Karim, M.E., Phoha, V.V. (2014). Cyber-physical Systems Security. In: Suh, S., Tanik, U., Carbone, J., Eroglu, A. (eds) Applied Cyber-Physical Systems. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-7336-7_7

Download citation

  • DOI: https://doi.org/10.1007/978-1-4614-7336-7_7

  • Published:

  • Publisher Name: Springer, New York, NY

  • Print ISBN: 978-1-4614-7335-0

  • Online ISBN: 978-1-4614-7336-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics