A Security Architecture in Cyber-Physical Systems: Security Theories, Analysis, Simulation and Application Fields

Tianbo Lu, Jiaxi Lin, Lingling Zhao, Yang Li, Yong Peng
2015 International Journal of Security and Its Applications  
Governments, companies, universities and research institutes are pushing the research and development of cyber-physical systems (CPS). However, the development of cyberphysical systems is constrained by security factors. According to this situation, this paper put forward a CPS security model, which contains security objectives, basic theories, simulation, and CPS framework, summarizes security attacks to cyber-physical systems as a theoretical reference for the study of cyber-physical systems
more » ... nd to provide useful security defense. Based on the cyber-physical systems framework, the paper classifies attacks for the execution layer, transport layer and control layer. The execution layer attacks include security attacks for nodes such as sensors and actuators. Transport layer attacks include data leakage or damage and security issues during massive data integration. Control layer attacks include the loss of user privacy, incorrect access control policies and inadequate security standards. This paper gives security defenses and recommendations for all types of security attacks. Finally, this paper introduces categorizations of CPS application fields and explores their relationships. 2 Copyright ⓒ 2015 SERSC realized in large engineering systems. At the same time, the systems also have many characters, such as real-time, safe, reliable, high-performance and etc. Cyberphysical systems not only have become an important direction in academic research at home and abroad, but also is an advance field in industry. However, some security factors constrain the development of cyber -physical systems. If the security factors are not taken into consideration, cyber -physical systems cannot operate healthily and stably. First of all, this paper presents a systematic CPS security model, which includes security theories, CPS architecture, attacks and defenses analysis, application fields. Secondly, security objectives an d basic theories are introduced in the view of security theory. Thirdly, based on the three layers of CPS architecture, attacks which three layers are facing are summarized in detail. Meanwhile, defenses against attacks are also concluded. Finally, this paper presents a literature map of application fields, in which application fields are clearly classified.
doi:10.14257/ijsia.2015.9.7.01 fatcat:rbt2aq542fdmtjtnribbn4vluq