Introduction to Cyber-Physical System Security: A Cross-Layer Perspective

Cyber-physical systems (CPS) comprise the backbone of national critical infrastructures such as power grids, transportation systems, home automation systems, etc. Because cyber-physical systems are widely used in these applications, the security considerations of these systems should be of very high...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEEE transactions on multi-scale computing systems 2017-07, Vol.3 (3), p.215-227
Hauptverfasser: Wurm, Jacob, Jin, Yier, Liu, Yang, Hu, Shiyan, Heffner, Kenneth, Rahman, Fahim, Tehranipoor, Mark
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 227
container_issue 3
container_start_page 215
container_title IEEE transactions on multi-scale computing systems
container_volume 3
creator Wurm, Jacob
Jin, Yier
Liu, Yang
Hu, Shiyan
Heffner, Kenneth
Rahman, Fahim
Tehranipoor, Mark
description Cyber-physical systems (CPS) comprise the backbone of national critical infrastructures such as power grids, transportation systems, home automation systems, etc. Because cyber-physical systems are widely used in these applications, the security considerations of these systems should be of very high importance. Compromise of these systems in critical infrastructure will cause catastrophic consequences. In this paper, we will investigate the security vulnerabilities of currently deployed/implemented cyber-physical systems. Our analysis will be from a cross-layer perspective, ranging from full cyber-physical systems to the underlying hardware platforms. In addition, security solutions are introduced to aid the implementation of security countermeasures into cyber-physical systems by manufacturers. Through these solutions, we hope to alter the mindset of considering security as an afterthought in CPS development procedures.
doi_str_mv 10.1109/TMSCS.2016.2569446
format Article
fullrecord <record><control><sourceid>crossref_RIE</sourceid><recordid>TN_cdi_crossref_primary_10_1109_TMSCS_2016_2569446</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>7470512</ieee_id><sourcerecordid>10_1109_TMSCS_2016_2569446</sourcerecordid><originalsourceid>FETCH-LOGICAL-c426t-dbc0f44bb603d6776dc6e20abf9fff491ce2b1f508253b0ddbcebc5e190f05ef3</originalsourceid><addsrcrecordid>eNpNkM1Kw0AUhQdRsNS-gG7mBRLv_Ma4K8GfQMRC6jpkJncw0jZlJhXm7U1tEVf3Ls53OHyE3DJIGYP8fv1WF3XKgemUK51LqS_IjAvBkyzT-vLff00WIXwBTFEAkakZKcvd6IfuYMd-2NFxoEU06JPVZwy9bTe0jmHELa3RHnw_xke6pIUfQkiqNqKnK_RhjxP8jTfkyrWbgIvznZOP56d18ZpU7y9lsawSK7kek85YcFIao0F0ehrVWY0cWuNy55zMmUVumFPwwJUw0E15NFYhy8GBQifmhJ967XGHR9fsfb9tfWwYNEcfza-P5uijOfuYoLsT1CPiH5DJDBTj4gdebF3b</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>Introduction to Cyber-Physical System Security: A Cross-Layer Perspective</title><source>IEEE Electronic Library (IEL)</source><creator>Wurm, Jacob ; Jin, Yier ; Liu, Yang ; Hu, Shiyan ; Heffner, Kenneth ; Rahman, Fahim ; Tehranipoor, Mark</creator><creatorcontrib>Wurm, Jacob ; Jin, Yier ; Liu, Yang ; Hu, Shiyan ; Heffner, Kenneth ; Rahman, Fahim ; Tehranipoor, Mark</creatorcontrib><description>Cyber-physical systems (CPS) comprise the backbone of national critical infrastructures such as power grids, transportation systems, home automation systems, etc. Because cyber-physical systems are widely used in these applications, the security considerations of these systems should be of very high importance. Compromise of these systems in critical infrastructure will cause catastrophic consequences. In this paper, we will investigate the security vulnerabilities of currently deployed/implemented cyber-physical systems. Our analysis will be from a cross-layer perspective, ranging from full cyber-physical systems to the underlying hardware platforms. In addition, security solutions are introduced to aid the implementation of security countermeasures into cyber-physical systems by manufacturers. Through these solutions, we hope to alter the mindset of considering security as an afterthought in CPS development procedures.</description><identifier>ISSN: 2332-7766</identifier><identifier>EISSN: 2332-7766</identifier><identifier>DOI: 10.1109/TMSCS.2016.2569446</identifier><identifier>CODEN: ITMCFM</identifier><language>eng</language><publisher>IEEE</publisher><subject>Cyber-physical system ; Cyber-physical systems ; Hardware ; hardware security ; Pricing ; Scheduling ; Security ; Smart homes ; vulnerability</subject><ispartof>IEEE transactions on multi-scale computing systems, 2017-07, Vol.3 (3), p.215-227</ispartof><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c426t-dbc0f44bb603d6776dc6e20abf9fff491ce2b1f508253b0ddbcebc5e190f05ef3</citedby><cites>FETCH-LOGICAL-c426t-dbc0f44bb603d6776dc6e20abf9fff491ce2b1f508253b0ddbcebc5e190f05ef3</cites><orcidid>0000-0002-8791-0597</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/7470512$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,776,780,792,27903,27904,54736</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/7470512$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Wurm, Jacob</creatorcontrib><creatorcontrib>Jin, Yier</creatorcontrib><creatorcontrib>Liu, Yang</creatorcontrib><creatorcontrib>Hu, Shiyan</creatorcontrib><creatorcontrib>Heffner, Kenneth</creatorcontrib><creatorcontrib>Rahman, Fahim</creatorcontrib><creatorcontrib>Tehranipoor, Mark</creatorcontrib><title>Introduction to Cyber-Physical System Security: A Cross-Layer Perspective</title><title>IEEE transactions on multi-scale computing systems</title><addtitle>TMSCS</addtitle><description>Cyber-physical systems (CPS) comprise the backbone of national critical infrastructures such as power grids, transportation systems, home automation systems, etc. Because cyber-physical systems are widely used in these applications, the security considerations of these systems should be of very high importance. Compromise of these systems in critical infrastructure will cause catastrophic consequences. In this paper, we will investigate the security vulnerabilities of currently deployed/implemented cyber-physical systems. Our analysis will be from a cross-layer perspective, ranging from full cyber-physical systems to the underlying hardware platforms. In addition, security solutions are introduced to aid the implementation of security countermeasures into cyber-physical systems by manufacturers. Through these solutions, we hope to alter the mindset of considering security as an afterthought in CPS development procedures.</description><subject>Cyber-physical system</subject><subject>Cyber-physical systems</subject><subject>Hardware</subject><subject>hardware security</subject><subject>Pricing</subject><subject>Scheduling</subject><subject>Security</subject><subject>Smart homes</subject><subject>vulnerability</subject><issn>2332-7766</issn><issn>2332-7766</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2017</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNpNkM1Kw0AUhQdRsNS-gG7mBRLv_Ma4K8GfQMRC6jpkJncw0jZlJhXm7U1tEVf3Ls53OHyE3DJIGYP8fv1WF3XKgemUK51LqS_IjAvBkyzT-vLff00WIXwBTFEAkakZKcvd6IfuYMd-2NFxoEU06JPVZwy9bTe0jmHELa3RHnw_xke6pIUfQkiqNqKnK_RhjxP8jTfkyrWbgIvznZOP56d18ZpU7y9lsawSK7kek85YcFIao0F0ehrVWY0cWuNy55zMmUVumFPwwJUw0E15NFYhy8GBQifmhJ967XGHR9fsfb9tfWwYNEcfza-P5uijOfuYoLsT1CPiH5DJDBTj4gdebF3b</recordid><startdate>201707</startdate><enddate>201707</enddate><creator>Wurm, Jacob</creator><creator>Jin, Yier</creator><creator>Liu, Yang</creator><creator>Hu, Shiyan</creator><creator>Heffner, Kenneth</creator><creator>Rahman, Fahim</creator><creator>Tehranipoor, Mark</creator><general>IEEE</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><orcidid>https://orcid.org/0000-0002-8791-0597</orcidid></search><sort><creationdate>201707</creationdate><title>Introduction to Cyber-Physical System Security: A Cross-Layer Perspective</title><author>Wurm, Jacob ; Jin, Yier ; Liu, Yang ; Hu, Shiyan ; Heffner, Kenneth ; Rahman, Fahim ; Tehranipoor, Mark</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c426t-dbc0f44bb603d6776dc6e20abf9fff491ce2b1f508253b0ddbcebc5e190f05ef3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2017</creationdate><topic>Cyber-physical system</topic><topic>Cyber-physical systems</topic><topic>Hardware</topic><topic>hardware security</topic><topic>Pricing</topic><topic>Scheduling</topic><topic>Security</topic><topic>Smart homes</topic><topic>vulnerability</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Wurm, Jacob</creatorcontrib><creatorcontrib>Jin, Yier</creatorcontrib><creatorcontrib>Liu, Yang</creatorcontrib><creatorcontrib>Hu, Shiyan</creatorcontrib><creatorcontrib>Heffner, Kenneth</creatorcontrib><creatorcontrib>Rahman, Fahim</creatorcontrib><creatorcontrib>Tehranipoor, Mark</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005–Present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><jtitle>IEEE transactions on multi-scale computing systems</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Wurm, Jacob</au><au>Jin, Yier</au><au>Liu, Yang</au><au>Hu, Shiyan</au><au>Heffner, Kenneth</au><au>Rahman, Fahim</au><au>Tehranipoor, Mark</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Introduction to Cyber-Physical System Security: A Cross-Layer Perspective</atitle><jtitle>IEEE transactions on multi-scale computing systems</jtitle><stitle>TMSCS</stitle><date>2017-07</date><risdate>2017</risdate><volume>3</volume><issue>3</issue><spage>215</spage><epage>227</epage><pages>215-227</pages><issn>2332-7766</issn><eissn>2332-7766</eissn><coden>ITMCFM</coden><abstract>Cyber-physical systems (CPS) comprise the backbone of national critical infrastructures such as power grids, transportation systems, home automation systems, etc. Because cyber-physical systems are widely used in these applications, the security considerations of these systems should be of very high importance. Compromise of these systems in critical infrastructure will cause catastrophic consequences. In this paper, we will investigate the security vulnerabilities of currently deployed/implemented cyber-physical systems. Our analysis will be from a cross-layer perspective, ranging from full cyber-physical systems to the underlying hardware platforms. In addition, security solutions are introduced to aid the implementation of security countermeasures into cyber-physical systems by manufacturers. Through these solutions, we hope to alter the mindset of considering security as an afterthought in CPS development procedures.</abstract><pub>IEEE</pub><doi>10.1109/TMSCS.2016.2569446</doi><tpages>13</tpages><orcidid>https://orcid.org/0000-0002-8791-0597</orcidid><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 2332-7766
ispartof IEEE transactions on multi-scale computing systems, 2017-07, Vol.3 (3), p.215-227
issn 2332-7766
2332-7766
language eng
recordid cdi_crossref_primary_10_1109_TMSCS_2016_2569446
source IEEE Electronic Library (IEL)
subjects Cyber-physical system
Cyber-physical systems
Hardware
hardware security
Pricing
Scheduling
Security
Smart homes
vulnerability
title Introduction to Cyber-Physical System Security: A Cross-Layer Perspective
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-26T11%3A01%3A12IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-crossref_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Introduction%20to%20Cyber-Physical%20System%20Security:%20A%20Cross-Layer%20Perspective&rft.jtitle=IEEE%20transactions%20on%20multi-scale%20computing%20systems&rft.au=Wurm,%20Jacob&rft.date=2017-07&rft.volume=3&rft.issue=3&rft.spage=215&rft.epage=227&rft.pages=215-227&rft.issn=2332-7766&rft.eissn=2332-7766&rft.coden=ITMCFM&rft_id=info:doi/10.1109/TMSCS.2016.2569446&rft_dat=%3Ccrossref_RIE%3E10_1109_TMSCS_2016_2569446%3C/crossref_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=7470512&rfr_iscdi=true