Abstract
Today we live in a world full of digital content. Digitalization is growing and the use of cyber-physical systems too. A cyber-physical systems (CPS) is a system that integrates both physical and virtual capabilities which communicates via a network. Attributes of CPSs includes real-time, fault-tolerance, security, safety, scalability, reliability, distributed, adaptability and heterogeneity. Hence, security for CPS is very crucial due to the nature of CPS and the interaction with the physical world. Therefore, the use of effective security mechanisms is crucial. Moreover, we have to ensure that we build these systems in a way that they meet the CPS specific requirements and to adapt the security mechanism accordingly, since the security threats of CPSs differ from classical software. This paper analyzes the security threats of cyber-physical systems, presents countermeasure to these threats and propose a security based reference architecture for cyber-physical systems. Furthermore, the architecture is applied on a case study of smart home to validate the proposed architecture. The proposed security based reference architecture is a good start to focus on this important aspect of security for CPS and great contribution to the research community.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Rehman, S., Gruhn, V.: Security requirements engineering (SRE) framework for cyber-physical systems (CPS): SRE for CPS. In: New Trends in Intelligent Software Methodologies, Tools and Techniques: Proceedings of the 16th International Conference SoMeT_17, vol. 297, p. 153. IOS Press (2017)
Dong, P., Han, Y., Guo, X., Xie, F.: A systematic review of studies on cyber physical system security. Int. J. Secur. Appl. 9(1), 155–164 (2015)
Jing, Q., Vasilakos, A.V., Wan, J., Lu, J., Qui, D.: Security of the internet of things: perspectives and challenges. Wirel. Netw. 20, 2481 (2014). Springer
Gao, Y.: Analysis of security threats and vulnerability for cyber-physical systems. IEEE (2013)
Rehman, S., Gruhn, V.: An effective security requirements engineering framework for cyber-physical systems (2018). Int. J. Inf. Commun. Technol. Special issue Cyber-Physical Systems: Data Processing and Communication Architectures 6(3) (ISSN: 2227-7080; ESCI-WoS index)
Wang, E.K., Ye, Y., Xu, X., Yiu, S.M., Hui, L.C.K., Chow, K.P.: Security issues and challenges for cyber physical system. IEEE (2010)
Fischer, K., Geßner, J.: Security architecture elements for IoT enabled automation networks. IEEE (2012)
Karlof, C., Wagner, D.: Secure routing in wireless sensor networks: attacks and countermeasures. Elsevier (2003)
Zhao, K., Ge, L.: A Survey on the Internet of Things Security. IEEE (2014). https://doi.org/10.1109/CIS.2013.145
Callaway, E.H.: Wireless Sensor Networks Architectures and Protocols. Auerbach Publications, New York (2003)
Chen, D., Chang, G., Jin, L., Ren, X., Li, J., Li, F.: A novel secure architecture for the Internet of Things. IEEE (2011)
Di Pietro, R., Guarino, S., Verde, N.V., Domingo-Ferrer, J.: Security in wireless ad-hoc networks – a survey. Comput. Commun. 51, 1–20 (2014)
Kim, K.-W., Hian, Y.-H., Min, S.-G.: An authentication and key management mechanism for resource constrained devices in IEEE 802.11-based IoT Access Networks. https://doi.org/10.3390/s17102170
Mendez, D., Papapanagiotou, I., Yang, B.: Internet of Things: survey on security and privacy (2017). https://arxiv.org/pdf/1707.01879.pdf. Accessed 21 Dec 2017
Pathan, A.-S.K., Lee, H.-.W., Hong, C.S.: Security in wireless sensor networks: issues and challenges. IEEE (2006)
Wang, Y., Attebury, G., Ramamurthy, B.: A survey of security issues in wireless sensor networks. IEEE (2006)
IEEE: IEEE Standard for Low-Rate Wireless Networks (2015)
Singh, V., Jain, S., Singhai, J.: Hello flood attack and its countermeasures in wireless sensor networks. Int. J. Comput. Sci. 7(3), 23 (2010)
Hu, Y.-C., Perrig, A., Johnson, D.B.: Packet leashes: a defense against wormhole attacks in wireless networks. IEEE (2003)
Qian, J., Xu, H., Li, P.: A novel secure architecture for the Internet of Things. IEEE (2016)
Jia, X., Feng, Q., Ma, C.: An efficient anti-collision protocol for RFID tag identification. IEEE (2010)
Halfond, W.G.J., Viegas, J., Orso, A.: A classification of SQL injection attacks and countermeasures. IEEE (2006)
Rehman, S., Gruhn, V.: An effective security requirements engineering framework for cyber-physical systems. Int. J. Inf. Commun. Technol. 6(3) (2018). Special issue Cyber-Physical Systems: Data Processing and Communication Architectures (ISSN: 2227-7080; ESCI-WoS index)
Tan, Y., Goddard, S., Perez, L.C.: A prototype architecture for cyber-physical systems. ACM Sigbed Rev. 5(1), 26 (2008)
Kellerman, C.: Reference architecture for cyber-physical systems (2016). https://www.nist.gov/programs-projects/reference-architecture-cyber-physical-systems
Weyrich, M., Ebert, C.: Reference architectures for the internet of things. IEEE Softw. 33(1), 112–116 (2016)
Rehman, S., Gruhn, V.: An approach to secure smart homes in Cyber-physical systems/Internet-of-things. In: The Fifth IEEE International Conference on Software Defined Systems (SDS-2018) (2018)
Acknowledgment
This work has been supported by the European Community through project CPS.HUB NRW, EFRE Nr. 0-4000-17.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Switzerland AG
About this paper
Cite this paper
ur Rehman, S., Iannella, A., Gruhn, V. (2018). A Security Based Reference Architecture for Cyber-Physical Systems. In: Florez, H., Diaz, C., Chavarriaga, J. (eds) Applied Informatics. ICAI 2018. Communications in Computer and Information Science, vol 942. Springer, Cham. https://doi.org/10.1007/978-3-030-01535-0_12
Download citation
DOI: https://doi.org/10.1007/978-3-030-01535-0_12
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-01534-3
Online ISBN: 978-3-030-01535-0
eBook Packages: Computer ScienceComputer Science (R0)