Skip to main content

A Security Based Reference Architecture for Cyber-Physical Systems

  • Conference paper
  • First Online:

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 942))

Abstract

Today we live in a world full of digital content. Digitalization is growing and the use of cyber-physical systems too. A cyber-physical systems (CPS) is a system that integrates both physical and virtual capabilities which communicates via a network. Attributes of CPSs includes real-time, fault-tolerance, security, safety, scalability, reliability, distributed, adaptability and heterogeneity. Hence, security for CPS is very crucial due to the nature of CPS and the interaction with the physical world. Therefore, the use of effective security mechanisms is crucial. Moreover, we have to ensure that we build these systems in a way that they meet the CPS specific requirements and to adapt the security mechanism accordingly, since the security threats of CPSs differ from classical software. This paper analyzes the security threats of cyber-physical systems, presents countermeasure to these threats and propose a security based reference architecture for cyber-physical systems. Furthermore, the architecture is applied on a case study of smart home to validate the proposed architecture. The proposed security based reference architecture is a good start to focus on this important aspect of security for CPS and great contribution to the research community.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Rehman, S., Gruhn, V.: Security requirements engineering (SRE) framework for cyber-physical systems (CPS): SRE for CPS. In: New Trends in Intelligent Software Methodologies, Tools and Techniques: Proceedings of the 16th International Conference SoMeT_17, vol. 297, p. 153. IOS Press (2017)

    Google Scholar 

  2. Dong, P., Han, Y., Guo, X., Xie, F.: A systematic review of studies on cyber physical system security. Int. J. Secur. Appl. 9(1), 155–164 (2015)

    Google Scholar 

  3. Jing, Q., Vasilakos, A.V., Wan, J., Lu, J., Qui, D.: Security of the internet of things: perspectives and challenges. Wirel. Netw. 20, 2481 (2014). Springer

    Google Scholar 

  4. Gao, Y.: Analysis of security threats and vulnerability for cyber-physical systems. IEEE (2013)

    Google Scholar 

  5. Rehman, S., Gruhn, V.: An effective security requirements engineering framework for cyber-physical systems (2018). Int. J. Inf. Commun. Technol. Special issue Cyber-Physical Systems: Data Processing and Communication Architectures 6(3) (ISSN: 2227-7080; ESCI-WoS index)

    Article  Google Scholar 

  6. Wang, E.K., Ye, Y., Xu, X., Yiu, S.M., Hui, L.C.K., Chow, K.P.: Security issues and challenges for cyber physical system. IEEE (2010)

    Google Scholar 

  7. Fischer, K., Geßner, J.: Security architecture elements for IoT enabled automation networks. IEEE (2012)

    Google Scholar 

  8. Karlof, C., Wagner, D.: Secure routing in wireless sensor networks: attacks and countermeasures. Elsevier (2003)

    Google Scholar 

  9. Zhao, K., Ge, L.: A Survey on the Internet of Things Security. IEEE (2014). https://doi.org/10.1109/CIS.2013.145

  10. Callaway, E.H.: Wireless Sensor Networks Architectures and Protocols. Auerbach Publications, New York (2003)

    Google Scholar 

  11. Chen, D., Chang, G., Jin, L., Ren, X., Li, J., Li, F.: A novel secure architecture for the Internet of Things. IEEE (2011)

    Google Scholar 

  12. Di Pietro, R., Guarino, S., Verde, N.V., Domingo-Ferrer, J.: Security in wireless ad-hoc networks – a survey. Comput. Commun. 51, 1–20 (2014)

    Google Scholar 

  13. Kim, K.-W., Hian, Y.-H., Min, S.-G.: An authentication and key management mechanism for resource constrained devices in IEEE 802.11-based IoT Access Networks. https://doi.org/10.3390/s17102170

    Article  Google Scholar 

  14. Mendez, D., Papapanagiotou, I., Yang, B.: Internet of Things: survey on security and privacy (2017). https://arxiv.org/pdf/1707.01879.pdf. Accessed 21 Dec 2017

  15. Pathan, A.-S.K., Lee, H.-.W., Hong, C.S.: Security in wireless sensor networks: issues and challenges. IEEE (2006)

    Google Scholar 

  16. Wang, Y., Attebury, G., Ramamurthy, B.: A survey of security issues in wireless sensor networks. IEEE (2006)

    Google Scholar 

  17. IEEE: IEEE Standard for Low-Rate Wireless Networks (2015)

    Google Scholar 

  18. Singh, V., Jain, S., Singhai, J.: Hello flood attack and its countermeasures in wireless sensor networks. Int. J. Comput. Sci. 7(3), 23 (2010)

    Google Scholar 

  19. Hu, Y.-C., Perrig, A., Johnson, D.B.: Packet leashes: a defense against wormhole attacks in wireless networks. IEEE (2003)

    Google Scholar 

  20. Qian, J., Xu, H., Li, P.: A novel secure architecture for the Internet of Things. IEEE (2016)

    Google Scholar 

  21. Jia, X., Feng, Q., Ma, C.: An efficient anti-collision protocol for RFID tag identification. IEEE (2010)

    Google Scholar 

  22. Halfond, W.G.J., Viegas, J., Orso, A.: A classification of SQL injection attacks and countermeasures. IEEE (2006)

    Google Scholar 

  23. Rehman, S., Gruhn, V.: An effective security requirements engineering framework for cyber-physical systems. Int. J. Inf. Commun. Technol. 6(3) (2018). Special issue Cyber-Physical Systems: Data Processing and Communication Architectures (ISSN: 2227-7080; ESCI-WoS index)

    Google Scholar 

  24. Tan, Y., Goddard, S., Perez, L.C.: A prototype architecture for cyber-physical systems. ACM Sigbed Rev. 5(1), 26 (2008)

    Article  Google Scholar 

  25. Kellerman, C.: Reference architecture for cyber-physical systems (2016). https://www.nist.gov/programs-projects/reference-architecture-cyber-physical-systems

  26. Weyrich, M., Ebert, C.: Reference architectures for the internet of things. IEEE Softw. 33(1), 112–116 (2016)

    Article  Google Scholar 

  27. Rehman, S., Gruhn, V.: An approach to secure smart homes in Cyber-physical systems/Internet-of-things. In: The Fifth IEEE International Conference on Software Defined Systems (SDS-2018) (2018)

    Google Scholar 

Download references

Acknowledgment

This work has been supported by the European Community through project CPS.HUB NRW, EFRE Nr. 0-4000-17.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shafiq ur Rehman .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

ur Rehman, S., Iannella, A., Gruhn, V. (2018). A Security Based Reference Architecture for Cyber-Physical Systems. In: Florez, H., Diaz, C., Chavarriaga, J. (eds) Applied Informatics. ICAI 2018. Communications in Computer and Information Science, vol 942. Springer, Cham. https://doi.org/10.1007/978-3-030-01535-0_12

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-01535-0_12

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-01534-3

  • Online ISBN: 978-3-030-01535-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics