Introduction to Cyber-Physical System Security: A Cross-Layer Perspective
Cyber-physical systems (CPS) comprise the backbone of national critical infrastructures such as power grids, transportation systems, home automation systems, etc. Because cyber-physical systems are widely used in these applications, the security considerations of these systems should be of very high...
Gespeichert in:
Veröffentlicht in: | IEEE transactions on multi-scale computing systems 2017-07, Vol.3 (3), p.215-227 |
---|---|
Hauptverfasser: | , , , , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 227 |
---|---|
container_issue | 3 |
container_start_page | 215 |
container_title | IEEE transactions on multi-scale computing systems |
container_volume | 3 |
creator | Wurm, Jacob Jin, Yier Liu, Yang Hu, Shiyan Heffner, Kenneth Rahman, Fahim Tehranipoor, Mark |
description | Cyber-physical systems (CPS) comprise the backbone of national critical infrastructures such as power grids, transportation systems, home automation systems, etc. Because cyber-physical systems are widely used in these applications, the security considerations of these systems should be of very high importance. Compromise of these systems in critical infrastructure will cause catastrophic consequences. In this paper, we will investigate the security vulnerabilities of currently deployed/implemented cyber-physical systems. Our analysis will be from a cross-layer perspective, ranging from full cyber-physical systems to the underlying hardware platforms. In addition, security solutions are introduced to aid the implementation of security countermeasures into cyber-physical systems by manufacturers. Through these solutions, we hope to alter the mindset of considering security as an afterthought in CPS development procedures. |
doi_str_mv | 10.1109/TMSCS.2016.2569446 |
format | Article |
fullrecord | <record><control><sourceid>crossref_RIE</sourceid><recordid>TN_cdi_crossref_primary_10_1109_TMSCS_2016_2569446</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>7470512</ieee_id><sourcerecordid>10_1109_TMSCS_2016_2569446</sourcerecordid><originalsourceid>FETCH-LOGICAL-c426t-dbc0f44bb603d6776dc6e20abf9fff491ce2b1f508253b0ddbcebc5e190f05ef3</originalsourceid><addsrcrecordid>eNpNkM1Kw0AUhQdRsNS-gG7mBRLv_Ma4K8GfQMRC6jpkJncw0jZlJhXm7U1tEVf3Ls53OHyE3DJIGYP8fv1WF3XKgemUK51LqS_IjAvBkyzT-vLff00WIXwBTFEAkakZKcvd6IfuYMd-2NFxoEU06JPVZwy9bTe0jmHELa3RHnw_xke6pIUfQkiqNqKnK_RhjxP8jTfkyrWbgIvznZOP56d18ZpU7y9lsawSK7kek85YcFIao0F0ehrVWY0cWuNy55zMmUVumFPwwJUw0E15NFYhy8GBQifmhJ967XGHR9fsfb9tfWwYNEcfza-P5uijOfuYoLsT1CPiH5DJDBTj4gdebF3b</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>Introduction to Cyber-Physical System Security: A Cross-Layer Perspective</title><source>IEEE Electronic Library (IEL)</source><creator>Wurm, Jacob ; Jin, Yier ; Liu, Yang ; Hu, Shiyan ; Heffner, Kenneth ; Rahman, Fahim ; Tehranipoor, Mark</creator><creatorcontrib>Wurm, Jacob ; Jin, Yier ; Liu, Yang ; Hu, Shiyan ; Heffner, Kenneth ; Rahman, Fahim ; Tehranipoor, Mark</creatorcontrib><description>Cyber-physical systems (CPS) comprise the backbone of national critical infrastructures such as power grids, transportation systems, home automation systems, etc. Because cyber-physical systems are widely used in these applications, the security considerations of these systems should be of very high importance. Compromise of these systems in critical infrastructure will cause catastrophic consequences. In this paper, we will investigate the security vulnerabilities of currently deployed/implemented cyber-physical systems. Our analysis will be from a cross-layer perspective, ranging from full cyber-physical systems to the underlying hardware platforms. In addition, security solutions are introduced to aid the implementation of security countermeasures into cyber-physical systems by manufacturers. Through these solutions, we hope to alter the mindset of considering security as an afterthought in CPS development procedures.</description><identifier>ISSN: 2332-7766</identifier><identifier>EISSN: 2332-7766</identifier><identifier>DOI: 10.1109/TMSCS.2016.2569446</identifier><identifier>CODEN: ITMCFM</identifier><language>eng</language><publisher>IEEE</publisher><subject>Cyber-physical system ; Cyber-physical systems ; Hardware ; hardware security ; Pricing ; Scheduling ; Security ; Smart homes ; vulnerability</subject><ispartof>IEEE transactions on multi-scale computing systems, 2017-07, Vol.3 (3), p.215-227</ispartof><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c426t-dbc0f44bb603d6776dc6e20abf9fff491ce2b1f508253b0ddbcebc5e190f05ef3</citedby><cites>FETCH-LOGICAL-c426t-dbc0f44bb603d6776dc6e20abf9fff491ce2b1f508253b0ddbcebc5e190f05ef3</cites><orcidid>0000-0002-8791-0597</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/7470512$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,776,780,792,27903,27904,54736</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/7470512$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Wurm, Jacob</creatorcontrib><creatorcontrib>Jin, Yier</creatorcontrib><creatorcontrib>Liu, Yang</creatorcontrib><creatorcontrib>Hu, Shiyan</creatorcontrib><creatorcontrib>Heffner, Kenneth</creatorcontrib><creatorcontrib>Rahman, Fahim</creatorcontrib><creatorcontrib>Tehranipoor, Mark</creatorcontrib><title>Introduction to Cyber-Physical System Security: A Cross-Layer Perspective</title><title>IEEE transactions on multi-scale computing systems</title><addtitle>TMSCS</addtitle><description>Cyber-physical systems (CPS) comprise the backbone of national critical infrastructures such as power grids, transportation systems, home automation systems, etc. Because cyber-physical systems are widely used in these applications, the security considerations of these systems should be of very high importance. Compromise of these systems in critical infrastructure will cause catastrophic consequences. In this paper, we will investigate the security vulnerabilities of currently deployed/implemented cyber-physical systems. Our analysis will be from a cross-layer perspective, ranging from full cyber-physical systems to the underlying hardware platforms. In addition, security solutions are introduced to aid the implementation of security countermeasures into cyber-physical systems by manufacturers. Through these solutions, we hope to alter the mindset of considering security as an afterthought in CPS development procedures.</description><subject>Cyber-physical system</subject><subject>Cyber-physical systems</subject><subject>Hardware</subject><subject>hardware security</subject><subject>Pricing</subject><subject>Scheduling</subject><subject>Security</subject><subject>Smart homes</subject><subject>vulnerability</subject><issn>2332-7766</issn><issn>2332-7766</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2017</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNpNkM1Kw0AUhQdRsNS-gG7mBRLv_Ma4K8GfQMRC6jpkJncw0jZlJhXm7U1tEVf3Ls53OHyE3DJIGYP8fv1WF3XKgemUK51LqS_IjAvBkyzT-vLff00WIXwBTFEAkakZKcvd6IfuYMd-2NFxoEU06JPVZwy9bTe0jmHELa3RHnw_xke6pIUfQkiqNqKnK_RhjxP8jTfkyrWbgIvznZOP56d18ZpU7y9lsawSK7kek85YcFIao0F0ehrVWY0cWuNy55zMmUVumFPwwJUw0E15NFYhy8GBQifmhJ967XGHR9fsfb9tfWwYNEcfza-P5uijOfuYoLsT1CPiH5DJDBTj4gdebF3b</recordid><startdate>201707</startdate><enddate>201707</enddate><creator>Wurm, Jacob</creator><creator>Jin, Yier</creator><creator>Liu, Yang</creator><creator>Hu, Shiyan</creator><creator>Heffner, Kenneth</creator><creator>Rahman, Fahim</creator><creator>Tehranipoor, Mark</creator><general>IEEE</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><orcidid>https://orcid.org/0000-0002-8791-0597</orcidid></search><sort><creationdate>201707</creationdate><title>Introduction to Cyber-Physical System Security: A Cross-Layer Perspective</title><author>Wurm, Jacob ; Jin, Yier ; Liu, Yang ; Hu, Shiyan ; Heffner, Kenneth ; Rahman, Fahim ; Tehranipoor, Mark</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c426t-dbc0f44bb603d6776dc6e20abf9fff491ce2b1f508253b0ddbcebc5e190f05ef3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2017</creationdate><topic>Cyber-physical system</topic><topic>Cyber-physical systems</topic><topic>Hardware</topic><topic>hardware security</topic><topic>Pricing</topic><topic>Scheduling</topic><topic>Security</topic><topic>Smart homes</topic><topic>vulnerability</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Wurm, Jacob</creatorcontrib><creatorcontrib>Jin, Yier</creatorcontrib><creatorcontrib>Liu, Yang</creatorcontrib><creatorcontrib>Hu, Shiyan</creatorcontrib><creatorcontrib>Heffner, Kenneth</creatorcontrib><creatorcontrib>Rahman, Fahim</creatorcontrib><creatorcontrib>Tehranipoor, Mark</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005–Present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><jtitle>IEEE transactions on multi-scale computing systems</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Wurm, Jacob</au><au>Jin, Yier</au><au>Liu, Yang</au><au>Hu, Shiyan</au><au>Heffner, Kenneth</au><au>Rahman, Fahim</au><au>Tehranipoor, Mark</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Introduction to Cyber-Physical System Security: A Cross-Layer Perspective</atitle><jtitle>IEEE transactions on multi-scale computing systems</jtitle><stitle>TMSCS</stitle><date>2017-07</date><risdate>2017</risdate><volume>3</volume><issue>3</issue><spage>215</spage><epage>227</epage><pages>215-227</pages><issn>2332-7766</issn><eissn>2332-7766</eissn><coden>ITMCFM</coden><abstract>Cyber-physical systems (CPS) comprise the backbone of national critical infrastructures such as power grids, transportation systems, home automation systems, etc. Because cyber-physical systems are widely used in these applications, the security considerations of these systems should be of very high importance. Compromise of these systems in critical infrastructure will cause catastrophic consequences. In this paper, we will investigate the security vulnerabilities of currently deployed/implemented cyber-physical systems. Our analysis will be from a cross-layer perspective, ranging from full cyber-physical systems to the underlying hardware platforms. In addition, security solutions are introduced to aid the implementation of security countermeasures into cyber-physical systems by manufacturers. Through these solutions, we hope to alter the mindset of considering security as an afterthought in CPS development procedures.</abstract><pub>IEEE</pub><doi>10.1109/TMSCS.2016.2569446</doi><tpages>13</tpages><orcidid>https://orcid.org/0000-0002-8791-0597</orcidid><oa>free_for_read</oa></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 2332-7766 |
ispartof | IEEE transactions on multi-scale computing systems, 2017-07, Vol.3 (3), p.215-227 |
issn | 2332-7766 2332-7766 |
language | eng |
recordid | cdi_crossref_primary_10_1109_TMSCS_2016_2569446 |
source | IEEE Electronic Library (IEL) |
subjects | Cyber-physical system Cyber-physical systems Hardware hardware security Pricing Scheduling Security Smart homes vulnerability |
title | Introduction to Cyber-Physical System Security: A Cross-Layer Perspective |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-26T11%3A01%3A12IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-crossref_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Introduction%20to%20Cyber-Physical%20System%20Security:%20A%20Cross-Layer%20Perspective&rft.jtitle=IEEE%20transactions%20on%20multi-scale%20computing%20systems&rft.au=Wurm,%20Jacob&rft.date=2017-07&rft.volume=3&rft.issue=3&rft.spage=215&rft.epage=227&rft.pages=215-227&rft.issn=2332-7766&rft.eissn=2332-7766&rft.coden=ITMCFM&rft_id=info:doi/10.1109/TMSCS.2016.2569446&rft_dat=%3Ccrossref_RIE%3E10_1109_TMSCS_2016_2569446%3C/crossref_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=7470512&rfr_iscdi=true |