Cyber-Physical Systems: Security Threats, Countermeasures and Issues

Verified

Added on  2022/09/14

|13
|556
|21
Presentation
AI Summary
This presentation delves into the domain of cyber-physical systems (CPS), highlighting their integration of physical and cyber components, including IoT, big data, and cloud computing. It examines CPS features, such as embedded systems, interoperability, and data flow, along with the architectural layers from physical to application. The presentation identifies security threats like spoofing, data tampering, and denial of service, while also exploring research areas such as attack modeling and security architecture. Countermeasures discussed include SCADA and smart grid security. The presentation concludes by suggesting future research directions, including the development of authentication techniques, metrics for trust, and ensuring data security within CPS environments. The presentation draws on several key sources, including works by Lee and Seshia, Liu et al., Massey, Monostori et al., and Yu and Xue.
Document Page
SLIDE IOT
Name of Student:
Name of University:
Author Note:
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
INTRODUCTION
The presentation deals with the cyber
physical systems and the problems of
security in these physical systems. The
presentation also focuses on the
features and the countermeasures of
the security threats on these systems.
Document Page
CYBER-PHYSICAL
SYSTEMS
It is a system that can combine physical
and cyber components
They consists of network monitors,
embedded computers and controllers
The important technologies under these
systems include IoT, Big data, cloud
computing
They are used in smart vehicles,
wearables, smart medicines and many
more
Document Page
FEATURES OF CPS
Embedded and mobile sensing
Capability to adopt and train
Interoperability via the use of internet
Interaction of physical and cyber
components
Data flows and cross-domain sensor
sources
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
ARCHITECTURE OF CPS
The architecture of Cyber-physical
systems consists of :
Physical layer
Data link layer
Network layer
Transport layer
Sessions layer
Presentation layer
Application layer
Document Page
PHILOSOPHICAL ISSUES
Generation of more information leading
threat of security
Increase in the information noise due to
more information generation
Search of information become a
complex task
Barriers includes barriers and standards.
Document Page
SECURITY THREATS
The threats affect the integrity,
confidentiality and availability of data
The threats of CPS include:
Spoofing identity
Tampering of data
Disclosure of information
Denial of service
Elevation of privilege
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
MAIN RESEARCH AREAS
Estimation of consequences of cyber
attacks
Modeling of attacks of CPS
Detection of attacks of CPS
Development of an architecture of
security
Document Page
COUNTERMEASURES
The countermeasures those are devised
in order to stop the attacks on CPS
include:
Security system of SCADA
Security of smart grid
Communication security
Document Page
OPEN ISSUES
The creation of techniques for CPS
mechanism authentication
The development of metrics to decide
level of hope in CPS
Creation of techniques for making sure
security of data
Creation of CPS architecture.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
CONCLUSION
The presentation deals with the cyber-
physical systems those are prone to
cyber threats. This presentation deals
with the countermeasures of these
threats and issues. Moreover, future
research areas of CPS are found that
includes architecture of CPS, level of
trust in CPS, ensuring security of
personal data and many more.
Document Page
BIBLIOGRAPHY
Lee, E.A. and Seshia, S.A., 2016. Introduction to embedded
systems: A cyber-physical systems approach. Mit Press.
Liu, Y., Peng, Y., Wang, B., Yao, S. and Liu, Z., 2017. Review
on cyber-physical systems. IEEE/CAA Journal of Automatica
Sinica, 4(1), pp.27-40.
Massey, D., 2017, November. Applying Cybersecurity
Challenges to Medical and Vehicular Cyber Physical Systems.
In Proceedings of the 2017 Workshop on Automated
Decision Making for Active Cyber Defense (pp. 39-39).
Monostori, L., Kádár, B., Bauernhansl, T., Kondoh, S.,
Kumara, S., Reinhart, G., Sauer, O., Schuh, G., Sihn, W. and
Ueda, K., 2016. Cyber-physical systems in
manufacturing. Cirp Annals, 65(2), pp.621-641.
Yu, X. and Xue, Y., 2016. Smart grids: A cyber–physical
systems perspective. Proceedings of the IEEE, 104(5),
pp.1058-1070.
chevron_up_icon
1 out of 13
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]