Skip to main content
Top

2014 | OriginalPaper | Chapter

7. Cyber-physical Systems Security

Authors : Md E. Karim, Vir V. Phoha

Published in: Applied Cyber-Physical Systems

Publisher: Springer New York

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Concerns with the security of the cyber-physical systems include the malicious attempts by an adversary to intercept, disrupt, defect or fail cyber-physical systems that may affect a large group of population, an important government agency or an influential business entity by denying availability of services, stealing sensitive data, or causing various types of damages, as well as the security breaches in small scale cyber-physical systems that may affect few individuals or relatively smaller entities.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference N. Adam, “Cyber-physical systems security,” presented at the Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies, Oak Ridge, Tennessee, 2009. N. Adam, “Cyber-physical systems security,” presented at the Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies, Oak Ridge, Tennessee, 2009.
2.
go back to reference E. K. Wang, et al., “Security Issues and Challenges for Cyber-Physical System,” presented at the Proceedings of the 2010 IEEE/ACM Int’l Conference on Green Computing and Communications \& Int’l Conference on Cyber, Physical and Social Computing, 2010. E. K. Wang, et al., “Security Issues and Challenges for Cyber-Physical System,” presented at the Proceedings of the 2010 IEEE/ACM Int’l Conference on Green Computing and Communications \& Int’l Conference on Cyber, Physical and Social Computing, 2010.
3.
go back to reference M. Yilin, et al., “Cyber-Physical Security of a Smart Grid Infrastructure,” Proceedings of the IEEE, vol. 100, pp. 195–209, 2012. M. Yilin, et al., “Cyber-Physical Security of a Smart Grid Infrastructure,” Proceedings of the IEEE, vol. 100, pp. 195–209, 2012.
4.
go back to reference J. Mirkovic, et al., Internet denial of service: attack and defense mechanisms: Prentice Hall, 2005. J. Mirkovic, et al., Internet denial of service: attack and defense mechanisms: Prentice Hall, 2005.
5.
go back to reference M. Brownfield, et al., “Wireless sensor network denial of sleep attack,” in Information Assurance Workshop, 2005. IAW ‘05. Proceedings from the Sixth Annual IEEE SMC, 2005, pp. 356–364. M. Brownfield, et al., “Wireless sensor network denial of sleep attack,” in Information Assurance Workshop, 2005. IAW ‘05. Proceedings from the Sixth Annual IEEE SMC, 2005, pp. 356–364.
6.
go back to reference A. Dinaburg, et al., “Ether: malware analysis via hardware virtualization extensions,” presented at the Proceedings of the 15th ACM conference on Computer and communications security, Alexandria, Virginia, USA, 2008. A. Dinaburg, et al., “Ether: malware analysis via hardware virtualization extensions,” presented at the Proceedings of the 15th ACM conference on Computer and communications security, Alexandria, Virginia, USA, 2008.
7.
go back to reference M. I. Sharif, et al., “Impeding Malware Analysis Using Conditional Code Obfuscation,” in NDSS’08, 2008. M. I. Sharif, et al., “Impeding Malware Analysis Using Conditional Code Obfuscation,” in NDSS’08, 2008.
8.
go back to reference C. Willems, et al., “Toward Automated Dynamic Malware Analysis Using CWSandbox,” Security & Privacy, IEEE, vol. 5, pp. 32–39, 2007. C. Willems, et al., “Toward Automated Dynamic Malware Analysis Using CWSandbox,” Security & Privacy, IEEE, vol. 5, pp. 32–39, 2007.
9.
go back to reference A. Moser, et al., “Exploring Multiple Execution Paths for Malware Analysis,” in Security and Privacy, 2007. SP ‘07. IEEE Symposium on, 2007, pp. 231–245. A. Moser, et al., “Exploring Multiple Execution Paths for Malware Analysis,” in Security and Privacy, 2007. SP ‘07. IEEE Symposium on, 2007, pp. 231–245.
10.
go back to reference C. Zimmer, et al., “Time-based intrusion detection in cyber-physical systems,” presented at the Proceedings of the 1st ACM/IEEE International Conference on Cyber-Physical Systems, Stockholm, Sweden, 2010. C. Zimmer, et al., “Time-based intrusion detection in cyber-physical systems,” presented at the Proceedings of the 1st ACM/IEEE International Conference on Cyber-Physical Systems, Stockholm, Sweden, 2010.
11.
go back to reference R. Chow, et al., “Enhancing cyber-physical security through data patterns,” in Proceedings of the Workshop on Foundations of Dependable and Secure Cyber-Physical Systems, 2011. R. Chow, et al., “Enhancing cyber-physical security through data patterns,” in Proceedings of the Workshop on Foundations of Dependable and Secure Cyber-Physical Systems, 2011.
12.
go back to reference B. Thuraisingham, “Data mining for security applications: Mining concept-drifting data streams to detect peer to peer botnet traffic,” in Intelligence and Security Informatics, 2008. ISI 2008. IEEE International Conference on, 2008, pp. xxix–xxx. B. Thuraisingham, “Data mining for security applications: Mining concept-drifting data streams to detect peer to peer botnet traffic,” in Intelligence and Security Informatics, 2008. ISI 2008. IEEE International Conference on, 2008, pp. xxix–xxx.
13.
go back to reference R. Gummadi, et al., “Not-a-Bot: improving service availability in the face of botnet attacks,” presented at the Proceedings of the 6th USENIX symposium on Networked systems design and implementation, Boston, Massachusetts, 2009. R. Gummadi, et al., “Not-a-Bot: improving service availability in the face of botnet attacks,” presented at the Proceedings of the 6th USENIX symposium on Networked systems design and implementation, Boston, Massachusetts, 2009.
14.
go back to reference K. Xu, et al., “Data-Provenance Verification For Secure Hosts,” IEEE Trans. Dependable Secur. Comput., vol. 9, pp. 173–183, 2012. K. Xu, et al., “Data-Provenance Verification For Secure Hosts,” IEEE Trans. Dependable Secur. Comput., vol. 9, pp. 173–183, 2012.
15.
go back to reference P. Gupta, “Algorithms for routing lookups and packet classification,” PhD Thesis, Stanford University, Stanford, CA, USA, 2000. P. Gupta, “Algorithms for routing lookups and packet classification,” PhD Thesis, Stanford University, Stanford, CA, USA, 2000.
16.
go back to reference A. X. Liu and M. G. Gouda, “Diverse Firewall Design,” Parallel and Distributed Systems, IEEE Transactions on, vol. 19, pp. 1237–1251, 2008. A. X. Liu and M. G. Gouda, “Diverse Firewall Design,” Parallel and Distributed Systems, IEEE Transactions on, vol. 19, pp. 1237–1251, 2008.
17.
go back to reference N. C. Team, “NuFW firewall: Now User Filtering Works,” 2008. N. C. Team, “NuFW firewall: Now User Filtering Works,” 2008.
18.
go back to reference A. A. Cardenas, et al., “Secure Control: Towards Survivable Cyber-Physical Systems,” in Distributed Computing Systems Workshops, 2008. ICDCS ‘08. 28th International Conference on, 2008, pp. 495–500. A. A. Cardenas, et al., “Secure Control: Towards Survivable Cyber-Physical Systems,” in Distributed Computing Systems Workshops, 2008. ICDCS ‘08. 28th International Conference on, 2008, pp. 495–500.
19.
go back to reference R. Akella, et al., “Analysis of information flow security in cyber–physical systems,” International Journal of Critical Infrastructure Protection, vol. 3, pp. 157–173, 2010. R. Akella, et al., “Analysis of information flow security in cyber–physical systems,” International Journal of Critical Infrastructure Protection, vol. 3, pp. 157–173, 2010.
20.
go back to reference T. T. Gamage, et al., “Enforcing Information Flow Security Properties in Cyber-Physical Systems: A Generalized Framework Based on Compensation,” presented at the Proceedings of the 2010 IEEE 34th Annual Computer Software and Applications Conference Workshops, 2010. T. T. Gamage, et al., “Enforcing Information Flow Security Properties in Cyber-Physical Systems: A Generalized Framework Based on Compensation,” presented at the Proceedings of the 2010 IEEE 34th Annual Computer Software and Applications Conference Workshops, 2010.
21.
go back to reference T. Gamage, et al., “Information flow security in cyber-physical systems,” presented at the Proceedings of the Seventh Annual Workshop on Cyber Security and Information Intelligence Research, Oak Ridge, Tennessee, 2011. T. Gamage, et al., “Information flow security in cyber-physical systems,” presented at the Proceedings of the Seventh Annual Workshop on Cyber Security and Information Intelligence Research, Oak Ridge, Tennessee, 2011.
22.
go back to reference C. Neuman, “Challenges in Security for Cyber-Physical Systems,” in Workshop on Future Directions in Cyber-physical Systems Security, 2009. C. Neuman, “Challenges in Security for Cyber-Physical Systems,” in Workshop on Future Directions in Cyber-physical Systems Security, 2009.
23.
go back to reference H. Tang and B. M. McMillin, “Security Property Violation in CPS through Timing,” presented at the Proceedings of the 2008 The 28th International Conference on Distributed Computing Systems Workshops, 2008. H. Tang and B. M. McMillin, “Security Property Violation in CPS through Timing,” presented at the Proceedings of the 2008 The 28th International Conference on Distributed Computing Systems Workshops, 2008.
24.
go back to reference F. Mueller, “Challenges for Cyber-Physical Systems: Security, Timing Analysis and Soft Error Protection,” in Proc. of the National Workshop on High Confidence Software Platforms for Cyber-Physical Systems, 2008. F. Mueller, “Challenges for Cyber-Physical Systems: Security, Timing Analysis and Soft Error Protection,” in Proc. of the National Workshop on High Confidence Software Platforms for Cyber-Physical Systems, 2008.
25.
go back to reference T. T. Gamage, et al., “Confidentiality Preserving Security Properties for Cyber-Physical Systems,” presented at the Proceedings of the 2011 IEEE 35th Annual Computer Software and Applications Conference, 2011. T. T. Gamage, et al., “Confidentiality Preserving Security Properties for Cyber-Physical Systems,” presented at the Proceedings of the 2011 IEEE 35th Annual Computer Software and Applications Conference, 2011.
26.
go back to reference T. Kohno, “Security for cyber-physical systems: case studies with medical devices, robots, and automobiles,” presented at the Proceedings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks, Tucson, Arizona, USA, 2012. T. Kohno, “Security for cyber-physical systems: case studies with medical devices, robots, and automobiles,” presented at the Proceedings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks, Tucson, Arizona, USA, 2012.
27.
go back to reference R. Mitchell and I.-R. Chen, “Behavior Rule Based Intrusion Detection for Supporting Secure Medical Cyber Physical Systems,” in Computer Communications and Networks (ICCCN), 2012 21st International Conference on, 2012, pp. 1–7. R. Mitchell and I.-R. Chen, “Behavior Rule Based Intrusion Detection for Supporting Secure Medical Cyber Physical Systems,” in Computer Communications and Networks (ICCCN), 2012 21st International Conference on, 2012, pp. 1–7.
28.
go back to reference Z. Quanyan, et al., “A hierarchical security architecture for cyber-physical systems,” in Resilient Control Systems (ISRCS), 2011 4th International Symposium on, 2011, pp. 15–20. Z. Quanyan, et al., “A hierarchical security architecture for cyber-physical systems,” in Resilient Control Systems (ISRCS), 2011 4th International Symposium on, 2011, pp. 15–20.
29.
go back to reference M. Mathews, et al., “Detecting Compromised Nodes in Wireless Sensor Networks,” in Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, 2007. SNPD 2007. Eighth ACIS International Conference on, 2007, pp. 273–278. M. Mathews, et al., “Detecting Compromised Nodes in Wireless Sensor Networks,” in Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, 2007. SNPD 2007. Eighth ACIS International Conference on, 2007, pp. 273–278.
30.
go back to reference P. R. Nalabolu, “Detecting Malicious Code in Sensor Network Applications Using Petri Nets,” M.S., Oklahoma State University, Oklahoma City, OK, USA, 2007. P. R. Nalabolu, “Detecting Malicious Code in Sensor Network Applications Using Petri Nets,” M.S., Oklahoma State University, Oklahoma City, OK, USA, 2007.
31.
go back to reference K. K. Fletcher and L. Xiaoqing, “Security Requirements Analysis, Specification, Prioritization and Policy Development in Cyber-Physical Systems,” in Secure Software Integration & Reliability Improvement Companion (SSIRI-C), 2011 5th International Conference on, 2011, pp. 106–113. K. K. Fletcher and L. Xiaoqing, “Security Requirements Analysis, Specification, Prioritization and Policy Development in Cyber-Physical Systems,” in Secure Software Integration & Reliability Improvement Companion (SSIRI-C), 2011 5th International Conference on, 2011, pp. 106–113.
32.
go back to reference M. Azab and M. Eltoweissy, “Defense as a service cloud for Cyber-Physical Systems,” in Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom), 2011 7th International Conference on, 2011, pp. 392–401. M. Azab and M. Eltoweissy, “Defense as a service cloud for Cyber-Physical Systems,” in Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom), 2011 7th International Conference on, 2011, pp. 392–401.
33.
go back to reference G. S. Lee and B. Thuraisingham, “Cyber-physical systems security applied to telesurgical robotics,” Comput. Stand. Interfaces, vol. 34, pp. 225–229, 2012. G. S. Lee and B. Thuraisingham, “Cyber-physical systems security applied to telesurgical robotics,” Comput. Stand. Interfaces, vol. 34, pp. 225–229, 2012.
34.
go back to reference O. Al Ibrahim and S. Nair, “Cyber-physical security using system-level PUFs,” in Wireless Communications and Mobile Computing Conference (IWCMC), 2011 7th International, 2011, pp. 1672–1676. O. Al Ibrahim and S. Nair, “Cyber-physical security using system-level PUFs,” in Wireless Communications and Mobile Computing Conference (IWCMC), 2011 7th International, 2011, pp. 1672–1676.
Metadata
Title
Cyber-physical Systems Security
Authors
Md E. Karim
Vir V. Phoha
Copyright Year
2014
Publisher
Springer New York
DOI
https://doi.org/10.1007/978-1-4614-7336-7_7

Premium Partner