Security for Cyber-Physical Systems  
  Authors : Amey Vinayak Moholkar


Cyber-Physical systems is an open system, which, integrate computing and communication with monitoring and/or control of entities in physical world. Use of CPS has increased many folds in recent years to automate and efficiently manage services. The real time nature and involvement in critical processes makes the security of CPS of paramount nature. Conventional security solutions for CPS focus on applying knowledge of traditional IT security to CPS environment. Though use of solutions from information security like authentication, encryption, access control etc. can be useful in CPS environment to some extent, we need to consider security solutions that take into consideration difference between IT systems and CPSs. Use of trusted computing offers many advantages, which can be incorporated in CPS to provide stronger security.


Published In : IJCAT Journal Volume 1, Issue 6

Date of Publication : 31 July 2014

Pages : 257 - 262

Figures :01

Tables : --

Publication Link : Security for Cyber-Physical Systems




Amey Vinayak Moholkar : University of Southern California Los Angeles, CA90007, USA








Cyber-Physical System


Trusted Computing for CPS

Cyber-Physical systems have additional security requirements due to introduction of physical domain, stringent real-time availability restrictions and involvement in critical applications. Conventional solutions to security of CPS have largely applied traditional IT security model to CPS. Though effective in protecting against attacks on cyber domain, this approach does not take into consideration inherent difference between CPS and traditional IT systems. We need to consider this distinction before designing a security mechanism for CPS. Use of trusted computing in CPS, has its advantages.










[1] M. Anand, E. Cronin, M. Sherr, M. Blaze, Z. Ives, and I. Lee. Security challenges in next generation cyber physical systems. In Beyond SCADA: Networked Embedded Control for Cyber Physical Systems, November 2006.

[2] A. Jøsang, C. Keser, and T. Dimitrakos. Can we manage trust? In Trust Management, Proc. of the Third International Conference, iTrust 2005, Paris, France, May 23-26, 2005

[3] Alvaro A. Cárdenas Saurabh Amin Shankar Sastry. Research Challenges for the Security of Control Systems, University of California, Berkeley

[4] Dr. Clifford Neuman. Challenges in Security for Cyber- Physical Systems. Information Sciences Institute, University of Southern California.

[5] P. Tabuada. Cyber-physical systems: Position paper. In NSF Workshop on Cyber-Physical Systems, 2006.

[6] Annarita Giani, Adrian Perrig, Shankar Sastry, Challenges for Securing Cyber Physical Systems, Workshop on Future Directions in Cyber-physical Systems Security, DHS 23 July 2009.

[7] Dr. Clifford Neuman. Understanding trust and security in SCADA systems. In Beyond SCADA: Networked Embedded Control for Cyber Physical Systems, November 2006.

[8] Bonnie Zhu, Anthony Joseph, and Shankar Sastry, Taxonomy of Cyber Attacks on SCADA Systems, Proceedings of CPSCom 2011: The 4th IEEE International Conference on Cyber, Physical and Social Computing, Dalian, China, October 19-22, 2011.

[9] J. Slay and M. Miller. Lessons learned from the Maroochy water breach. In Critical Infrastructure Protection, volume 253/2007, pages 73–82. SpringerBoston, November 2007.

[10] Krishna Kumar Venkatasubramanian Security Solutions For Cyber-Physical Systems, Ph.D. Dissertation, Arizona State University December 2009.

[11] B. Krebs. Cyber Incident Blamed for Nuclear Power Plant Shutdown. Washington Post, content/article/2008/06/05/AR2008060501958.html, June 2008.

[12] Alvaro A. C´ardenas Saurabh Amin Shankar Sastry, Secure Control: Towards Survivable Cyber-Physical Systems, University of California, Berkeley.

[13] N. W. Group. Internet security glossary., May 2000.

[14] Ayan Banerjee, Krishna K. Venkatasubramanian, Tridib Mukherjee, Sandeep Kumar S. Gupta, Ensuring Safety, Security, andSustainabilityof Mission-CriticalCyber– Physical Systems, Proceedings of the IEEE (Volume:100 , Issue 1) Jan 2012

[15] Qaisar Shafi, Cyber Physical Systems Security: A Brief Survey, Computational Science and Its Applications (ICCSA), 2012 12th International Conference.

[16] K. Venkatasubramanian, S. Nabar, S. K. S. Gupta, and R. Poovendran, Cyber Physical Security Solutions for Pervasive Health Monitoring Systems, M. Watfa, Ed. IGI Global, 2011, ser. E-Healthcare Systems and Wireless Communications: Current and Future Challenges.

[17] Dina Had?ziosmanovic, Robin Sommer, Damiano Bolzoni, Pieter Hartel, Improving SCADA Security with Context-aware Network Profiling, University of Twente, Enschede, The Netherlands, International Computer Science Institute, Berkeley, Lawrence Berkeley National Laboratory, Berkeley.

[18] David A. Fisher, Principles of Trust for Embedded Systems, Technical Note CMU/SEI-2012-TN-007, March 2012.

[19] Embedded Systems and Trusted Computing Security, Trusted Computing Group News Letter