Cyber Physical Systems - Advances and Applications

Cyber-Physical System: Advances and Applications in Cyber Security

Author(s): Sindhu Rajendran*, Shilpa S.P., Sai Priya L. and Ramavenkateswaran N.

Pp: 106-133 (28)

DOI: 10.2174/9789815223286124010007

* (Excluding Mailing and Handling)

Abstract

A cyber-physical system is a computer system that operates or monitors a mechanism using computer-based algorithms. Due to the rapid evolution of CPS in today's world, a greater range of services and applications involving e-Health, smart homes, e-Commerce, and industry automation may be easily realized, affecting numerous parts of people's lives. Smart grid, autonomous underwater, and UAVs, gas and oil pipeline monitoring and control, smart factory and manufacturing, pollution control, and HEVs are among the most prominent applications in this domain.

However, interconnecting the cyber and physical worlds introduces new security threats. Security attacks can result in trouble to essential infrastructure and business continuity, including production-performance deterioration, severe commercial risks, unavailability of critical services, and regulatory violations. Cybersecurity attacks are one of the most serious dangers to CPS due to the system's complexity and interdependencies, owing to which risk management is difficult considering recent attack trends. The first section of the manuscript discusses the evolution of CPS and its wide range of applications in different areas, followed by in-depth insights into the industrial sector. Types of cyber and physical threats, as well as examples, various system components, related algorithms and models, attack characteristics, and defense measures, are explained. Current study classifications are assessed and summarized using various system modeling and analytic approaches along with the benefits and drawbacks of various techniques. The chapter is concluded by stating future research topics on secure CPS and potential solutions. 4 Cyber-physical systems -Advances and Applications Rajendran et al. 


Keywords: Bayesian detection, Binary hypothesis, Cyber security, Cryptography, Cyber-physical system, Denial of services, Deception attack, Digital twin, FACT graph, Industry 4.0, Privacy, Physical threats, Reply attack, RNN based security, Safety and Security, Security model, Security algorithm, Threat modeling, Threat model, Weighted least square.

Related Journals
Related Books
© 2024 Bentham Science Publishers | Privacy Policy