Cyber Physical System Security
What is Cyber Physical System Security?
The word cyber-physical system was first introduced by Hellen Gill in 2006. The term Cyber-physical systems contain cyber and physical factors. Cyber-physical systems, or CPSs for short, are constructed to communicate effortlessly with networks of physical and computational parts. These systems are necessary and will enhance our life (Sadiku, et al, 2017).
Cyber Physical Systems Security Challenges
- Decrease in Performance
- High Power Consumption
- Transmission Delay
- Expensive in Cost
- Compatible Issues
- Operational Security Delay
(Yaacoub et al,. 2020)
Cyber-physical systems criticality
There are four categories for criticality for cyber-physical systems. These criticality explain the attacks that can occur in these categories.
1- Safety critical:
If an attack occurs, there is a high probability of the individual involved being seriously injured by a disease and in some cases, it can lead to death. It can also affect the environment with fire, floods, and radioactivity (Yaacoub et al,. 2020).
2-Mission critical:
In case of an attack in this category, the result may vary to fatal or non-fatal, total or partial failure of a CPS system to reach its purpose (Yaacoub et al,. 2020).
3-Business critical:
A massive amount of money will be lost if an attack occurs. In addition, both the finance and economy will be in jeopardy, as well as the customers and the businesses (Yaacoub et al,. 2020).
4-Security critical:
A security breach will take place during an attack. The attacks can lead to a security gap, exploitable vulnerabilities, rootkits, and backdoors (Yaacoub et al,. 2020).
Major Security requirements in Cyber-physical systems:
These requirements are important to ensure the safety in these systems.
1-Sense security:
To ensure the physical process reliability, sensing security in CPS has to be validated.
2-Sotrage security:
In storage security, it is necessary to create and produce solutions to secure stored data in the CPS platform from physical and cyber threats since data will be gathered and kept safely for future use.
3-Communication security:
It is required in communicating security to establish protocols to secure CPSs between and inside communication from intruders.
4-Acutation control security:
A procedure can only take place with proper approval.
5-Feedback security:
In order to provide adequate resistance against CPS, estimation and control algorithms must be thoroughly studied.
(Shafi, 2012)
Reference List:
Sadiku, M., Wang, Y., Cui, S. and Musa, S.M., 2017.
Cyber-physical systems: A literature review.
European Scientific
Journal,
13(36), pp.52-58. Available at:
328026153.pdf (core.ac.uk).
[Last Accessed 12th of April 2023]
Yaacoub, J.P.A., Salman, O., Noura, H.N., Kaaniche, N., Chehab, A. and Malli, M., 2020. Cyber-physical systems security: Limitations, issues and future trends. Microprocessors and microsystems, 77, p.103201. Available at: https://doi.org/10.1016/j.micpro.2020.103201 [Last Accessed 12th April 2023]
Shafi, Q., 2012,. Cyber physical systems security: A brief survey.12th International Conference on Computational Science and Its Applications (pp. 146-150). IEEE. Available at: Cyber Physical Systems Security: A Brief Survey | IEEE Conference Publication | IEEE Xplore. [Last Accessed 12th of April 2023]
Comments
Post a Comment