Journal of Information Security

Volume 8, Issue 4 (October 2017)

ISSN Print: 2153-1234   ISSN Online: 2153-1242

Google-based Impact Factor: 3.79  Citations  

Security and Privacy Challenges in Cyber-Physical Systems

HTML  XML Download Download as PDF (Size: 968KB)  PP. 285-295  
DOI: 10.4236/jis.2017.84019    2,311 Downloads   7,328 Views  Citations
Author(s)

ABSTRACT

Cyber-Physical Systems, or Smart-Embedded Systems, are co-engineered for the integration of physical, computational and networking resources. These resources are used to develop an efficient base for enhancing the quality of services in all areas of life and achieving a classier lifestyle in terms of a required service’s functionality and timing. Cyber-Physical Systems (CPSs) complement the need to have smart products (e.g., homes, hospitals, airports, cities). In other words, regulate the three kinds of resources available: physical, computational, and networking. This regulation supports communication and interaction between the human word and digital word to find the required intelligence in all scopes of life, including Telecommunication, Power Generation and Distribution, and Manufacturing. Data Security is among the most important issues to be considered in recent technologies. Because Cyber-Physical Systems consist of interacting complex components and middle-ware, they face real challenges in being secure against cyber-attacks while functioning efficiently and without affecting or degrading their performance. This study gives a detailed description of CPSs, their challenges (including cyber-security attacks), characteristics, and related technologies. We also focus on the tradeoff between security and performance in CPS, and we present the most common Side Channel Attacks on the implementations of cryptographic algorithms (symmetric: AES and asymmetric: RSA) with the countermeasures against these attacks.

Share and Cite:

AlDosari, F. (2017) Security and Privacy Challenges in Cyber-Physical Systems. Journal of Information Security, 8, 285-295. doi: 10.4236/jis.2017.84019.

Cited by

[1] Nussbaum-type function based robust neural event-triggered control of unmanned surface vehicle subject to cyber and physical attacks
Ocean Engineering, 2023
[2] Cryptographic Strength Study of the Pseudorandom Sequences Generator Based on the Blender Algorithm
2022 14th International …, 2022
[3] IT success factors in sustainable food supply chain management
Materials Today: Proceedings, 2022
[4] On engineering secure software for cyber-physical systems in practice
2021
[5] Analysis of Security Issues, Threats and Challenges in Cyber–Physical System for IoT Devices
2021
[6] Security and Safety of Industrial Cyber-Physical System: Systematic Literature Review
2020
[7] Applications and Security Challenges of Cyber-Physical Systems: Survey
2019
[8] A Trusted Bluetooth Performance Evaluation Model for Brain Computer Interfaces
2019
[9] Requirements Traceability in Cyber Physical Systems using Semantic Inference
2019
[10] A Systematic review to aligning research paths: Energy cyber-physical systems
2019
[11] МЕТОД ОЦЕНКИ КАЧЕСТВА КРИПТОСТОЙКИХ ГЕНЕРАТОРОВ ПСЕВДОСЛУЧАЙНЫХ ПОСЛЕДОВАТЕЛЬНОСТЕЙ
2018
[12] ПРИМЕНЕНИЕ ВЕЙВЛЕТНЫХ КОДОВ ДЛЯ ЗАЩИТЫ КЭШ-ПАМЯТИ ОТ АТАК ПО СТОРОННИМ КАНАЛАМ
2018

Copyright © 2024 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.