12,261 Hits in 9.6 sec

Security and Privacy Challenges in Cyber-Physical Systems

Fahd AlDosari
2017 Journal of Information Security  
Because Cyber-Physical Systems consist of interacting complex components and middle-ware, they face real challenges in being secure against cyber-attacks while functioning efficiently and without affecting  ...  Cyber-Physical Systems, or Smart-Embedded Systems, are co-engineered for the integration of physical, computational and networking resources.  ...  Acknowledgements The authors would like to thank the Deanship of Scientific Research at Umm Al-Qura University for the continuous support.  ... 
doi:10.4236/jis.2017.84019 fatcat:p6fbike43rfvhkafxmmk6v6uaa


Jayashree Agarkhed
2017 International Journal of Advanced Research in Computer Science  
CPS along with their cyber-physical object (CPO) is the key elements in the context of a smart city nature.  ...  The idea of cyber-physical systems (CPS) is the incorporation of computation processes and physical processes which can help towards the recognition of real smart cities capable to ensure sustainability  ...  The security and privacy protection of cyber physical systems are considered using cloud computing area.  ... 
doi:10.26483/ijarcs.v8i8.4841 fatcat:y6ox5m77vjhovljvqxxrbji4u4

Systematic review of features for co‐simulating security incidents in Cyber‐Physical Systems

Ricardo M. Czekster, Charles Morisset, John A. Clark, Sadegh Soudjani, Charalampos Patsios, Peter Davison
2021 Security and Privacy  
Cyber-physical security is a major source of concern due to the high reliance of the SG on Information and Communication Technologies (ICT) and their widespread use.  ...  Cyber-Physical Systems (CPS) and Internet-of-Things (IoT) plus energy are the enabling technology of modern power systems also known as the Smart Grid (SG).  ...  ACKNOWLEDGMENTS The authors wish to acknowledge funding from the Industrial Strategy Challenge Fund and Engineering and Physical Sciences Research Council (EPSRC/UK) EP/V012053/1 for The Active Building  ... 
doi:10.1002/spy2.150 fatcat:mcrafuc2tnbqnmsywuniygcbcq

A survey of cybersecurity vulnerabilities in healthcare systems

Abdullah Mohammed Alodaynan, Department of Information and Computer Science, College of Computer Science and Engineering, University of Hail, Hail, Saudi Arabia, Adwan Alownie Alanazi, Department of Information and Computer Science, College of Computer Science and Engineering, University of Hail, Hail, Saudi Arabia
2021 International Journal of Advanced and Applied Sciences  
as soon as possible to reach the highest level of security and confidentiality of patient data and their privacy in addition to the safety of systems from malfunctions as a result of the attack.  ...  protection techniques mentioned, and some challenges and solutions will be discussed in addition to some security issues in general, the research aims to gain the best level of security and privacy in  ...  In another research entitled "A Typical Analysis and Survey on Healthcare Cyber Security" has focused on data protection through the safety of medical devices and their accessories and ensuring the safety  ... 
doi:10.21833/ijaas.2021.12.007 fatcat:gzkkqmsm7fewra3namyx345k6y

A Survey of Blockchain Enabled Cyber-Physical Systems

Rathore, Mohamed, Guizani
2020 Sensors  
Cyber-physical systems (CPS) is a setup that controls and monitors the physical worldaround us.  ...  In this paper, we presenta holistic survey of various applications of CPS where blockchain has been utilized.  ...  Acknowledgments: The authors would like to thank Abhay Samant, University of Texas, Austin, USA for his valuable feedback and collection of data for the study conducted in this paper.  ... 
doi:10.3390/s20010282 pmid:31947860 pmcid:PMC6983181 fatcat:ohnywh55t5bunmnlixzesjobiq

A Survey on Security Issues of M2M Communications in Cyber-Physical Systems

Dong Chen
2012 KSII Transactions on Internet and Information Systems  
In this paper, we present a survey of security and privacy preserving issues in M2M communications in Cyber-Physical Systems.  ...  First, we discuss the security challenges in M2M communications in wireless networks of Cyber-Physical Systems and outline the constraints, attack issues, and a set of challenges that need to be addressed  ...  In this paper, a survey of security and privacy preserving issues of M2M communications in CPS is given.  ... 
doi:10.3837/tiis.2012.01.002 fatcat:ycyufngdtrdobmu33j3wqizydy

Medical cyber-physical systems: A survey

Nilanjan Dey, Amira S. Ashour, Fuqian Shi, Simon James Fong, João Manuel R. S. Tavares
2018 Journal of medical systems  
In the current work, the infrastructure of the cyber-physical systems (CPS) are reviewed and discussed.  ...  Medical cyber-physical systems (MCPS) are healthcare critical integration of a network of medical devices.  ...  Conflict of Interest: We are the authors confirm that no conflict of interest.  ... 
doi:10.1007/s10916-018-0921-x pmid:29525900 fatcat:wctzw4ilafgwjm5yrk53sl4ldy

Cloud based Cyber Physical Systems Security Issues: A Survey

Yogita Borse, Mohammed Saleh
2019 International Journal of Computer Applications  
This paper presents a survey of research done on cloud based cyber physical systems security issues.  ...  Data processing and physical interaction are combined by cyber physical systems (CPSs). CPSs have limited computation and storage capabilities due to their small size and resource constraints.  ...  ACKNOWLEDGMENTS Research reported in this publication was supported by K J Somaiya College of Engineering, Vidyavihar Mumbai, University of Mumbai.  ... 
doi:10.5120/ijca2019919474 fatcat:2kcmumegsvc4npg2fgwfeehzny

Security Requirements of Internet of Things-Based Healthcare System: a Survey Study

Somayeh Nasiri, Farahnaz Sadoughi, Mohammad Tadayon, Afsaneh Dehnad
2019 Acta Informatica Medica  
A survey study on security requirements of IoT in healthcare system was conducted. Four digital databases (Web of Science, Scopus, PubMed and IEEE) were searched from 2005 to September 2019.  ...  Due to its nature to sensitive and confidential information of patients, ensuring security is a critical issue in the development of IoT-based healthcare system.  ...  AIM The purpose of this survey was to provide an overview of the features and concepts related to security requirements of IoT in a healthcare system.  ... 
doi:10.5455/aim.2019.27.253-258 pmid:32055092 pmcid:PMC7004290 fatcat:wp7wghokkndajpvm5hxwy3dury

A Critical Survey Of Privacy Infrastructures [article]

B H Priyanka, Ravi Prakash
2015 arXiv   pre-print
As a democratic function of Internet, and relying on the open model on which it has been built, there has been concerted efforts in the direction of privacy protection and use of privacy enhancing tools  ...  Innovation in use of VPN, TLS/SSL and cryptographic tools are a testimony to it.  ...  Consistency in the usage of same Operating System like Android or iOS which use Tor for a long period of time, gives chance to the sophisticated cyber criminals to exploit the vulnerabilities in these  ... 
arXiv:1512.07207v1 fatcat:z4neq7e66ze3pl3r4m4zxzrbhi

Cybersecurity of Industrial Cyber-Physical Systems: A Review

Hakan Kayan, Matthew Nunes, Omer Rana, Pete Burnap, Charith Perera
2022 ACM Computing Surveys  
Industrial cyber-physical systems (ICPSs) manage critical infrastructures by controlling the processes based on the "physics" data gathered by edge sensor networks.  ...  Recent innovations in ubiquitous computing and communication technologies have prompted the rapid integration of highly interconnected systems to ICPSs.  ...  We would like to acknowledge the scholarship and support provided by Republic of Turkey Ministry of National Education.  ... 
doi:10.1145/3510410 fatcat:fa73nli6zzfxjkedcosbj3j4li

A Survey of RFID Deployment and Security Issues

Amit Grover, Hal Berghel
2011 Journal of Information Processing Systems  
Section 9 covers a variety of RFID security issues, followed by a detailed listing of countermeasures and precautions in Section 10.  ...  A Survey of RFID Deployment and Security Issues 562 tact to take place between the reader and the button thus making them suitable for only limited applications; coupled with the fact that these are proprietary  ...  different application-area; coupled with an increase in newsreports documenting various security vulnerabilities in RFID systems, a concern about the privacy issues is bound to be there.  ... 
doi:10.3745/jips.2011.7.4.561 fatcat:b2jinzbpzvhtziyrgs7o5eyhfi

5G Internet of Things: A survey

Shancang Li, Li Da Xu, Shanshan Zhao
2018 Journal of Industrial Information Integration  
The existing IoT solutions are facing a number of challenges such as large number of conneciton of nodes, security, and new standards.  ...  This paper reviews the current research state-of-the-art of 5G IoT, key enabling technologies, and main research trends and challenges in 5G IoT 1 .  ...  Instead of individual security mechanisms, a systematic security and privacy protection stragegy is needed to in 5G-IoT, and more valid security approaches, such as trust models, device security, and data  ... 
doi:10.1016/j.jii.2018.01.005 fatcat:wst2mrwbpjgxvdqqig3yj4ofum

Internet of Things: A Survey

Belkız TORĞUL, Lütfü Şağbanşua, Figen Balo Balo
2016 International Journal of Applied Mathematics Electronics and Computers  
Internet of Things (IoT) is a global infrastructure worldwide which links objects and enables data generation and sharing of this data.  ...  With rapid advances in this system technology, successful implementations will continue to emerge to improve the quality of life in many areas.  ...  Security and Privacy The system establishes on a huge of network system bring along the cyber security risks. Main security issues in IoT are illustrated in Fig. 6 .  ... 
doi:10.18100/ijamec.267197 fatcat:sh4pl32g6fhahkz3rz4xw7snmq

A Survey Of Network Attacks On Cyber-Physical Systems

Liwei Cao, Xiaoning Jiang, Yumei Zhao, Shouguang Wang, Dan You, Xianli Xu
2020 IEEE Access  
A cyber-physical system (CPS) typically consists of the plant, sensors, actuators, the controller and a communication network.  ...  The future research directions of CPSs network security are also presented. INDEX TERMS Cyber-physical systems, network attacks, intrusion detection, defense strategies.  ...  Some applications in this layer will storage a large amount of user privacy data, such as the personal information and 44220 VOLUME 8, 2020 consumption habits of users.  ... 
doi:10.1109/access.2020.2977423 fatcat:6gm45fwcsjb5ri45frxlnjhbo4
« Previous Showing results 1 — 15 out of 12,261 results