Skip to content
2000
image of A Comprehensive Survey on Cyber-Physical System Security in the 
Internet of Things (IoT): Addressing and Solutions

Abstract

Background

Cyber-Physical Systems (CPSs) integrate computing, control, and communication technologies, bridging cyberspace and the physical world to enhance critical infrastructure and safety-critical systems. Existing surveys often address CPS security from a single perspective, necessitating a more comprehensive approach.

Methods

This paper presents a thorough review of CPS security from three perspectives: the physical domain, the cyber domain, and the cyber-physical domain. We examine attacks on physical components like sensors, cyber-attacks targeting CPSs, and integrated cyber-physical attacks. For each domain, we analyse corresponding detection and defence mechanisms.

Results

Our review reveals that CPSs face significant security threats across all domains. In the physical domain, attacks on sensors can disrupt system operations, but various defences are available. In the cyber domain, CPSs are vulnerable to malware, hacking, and denial-of-service attacks, with several detection and defence strategies in place. The cyber-physical domain highlights complex threats where cyber-attacks cause physical damage, requiring comprehensive security approaches.

Conclusion

By examining CPS security from multiple perspectives, this review provides a holistic understanding of current threats and defence mechanisms. It identifies future research directions to enhance CPS security, aiming to better protect critical infrastructure against evolving cyber threats.

Loading

Article metrics loading...

/content/journals/rascs/10.2174/0126662558311697241023114206
2024-11-04
2025-01-12
Loading full text...

Full text loading...

References

  1. Shi W. Cao J. Zhang Q. Li Y. Xu L. Edge computing: Vision and challenges. IEEE Internet Things J. 2016 3 5 637 646 10.1109/JIOT.2016.2579198
    [Google Scholar]
  2. McLaughlin S. Von Laszewski G. Wang L. Younge A. Toward an elastic application model for augmenting the computing capabilities of mobile-edge computing. 2016 IEEE/ACM 7th International Conference on Utility and Cloud Computing (UCC), Berlin, Heidelberg, June 2011, pp. 263-268.
    [Google Scholar]
  3. Maheshwari A. Security issues in cyber physical systems: A survey. 2016 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC), 2016, pp. 1-7.
    [Google Scholar]
  4. Yao F. Song C. Huang L. Xu L. Song A. A comprehensive survey of enabling and emerging technologies for social internet of things. IEEE Access 2018 6 26999 27018
    [Google Scholar]
  5. Yaghmaee M.H. Gia T.N. Dastjerdi A.V. IoT security: Review, blockchain solutions, and open challenges. Future Gener. Comput. Syst. 2017 82 395 411
    [Google Scholar]
  6. Zhang W. Zheng Y. Xiang W. Lu S. Cyber-physical systems security: A review. IEEE Access 2019 7 90631 90653
    [Google Scholar]
  7. Alaba F. A. Othman M. Hashem I. A. T. Alotaibi F. Yaqoob I. Internet of things security: A survey. J. Netw. Comput. Appl. 2017 88 10 28 10.1016/j.jnca.2017.04.002
    [Google Scholar]
  8. Rajkumar R. Lee I. Sha L. Stankovic J. Cyber-physical systems: The next computing revolution. Proceedings of the 47th Design Automation Conference , Anaheim, CA, USA, 13-18 June 2010, pp. 731-736. 10.1145/1837274.1837461
    [Google Scholar]
  9. Zarpelão B.B. Miani R.S. Kawakani C.T. de Alvarenga S.C. A survey of intrusion detection in Internet of Things. J. Netw. Comput. Appl. 2017 84 25 37 10.1016/j.jnca.2017.02.009
    [Google Scholar]
  10. Ray P. P. A survey of internet of things architectures. J. King Saud Univ. Comput. Inf. Sci. 2018 30 3 291 319
    [Google Scholar]
  11. Gubbi J. Buyya R. Marusic S. Palaniswami M. Internet of Things (IoT): A vision, architectural elements, and future directions. Future Gener. Comput. Syst. 2013 29 7 1645 1660 10.1016/j.future.2013.01.010
    [Google Scholar]
  12. Atzori L. Iera A. Morabito G. Thl A survey. Comput. Netw. 2010 54 15 2787 2805 10.1016/j.comnet.2010.05.010
    [Google Scholar]
  13. Díaz M. Murillo J.M. Aguiar J.M. Challenges, opportunities, and future trends of emerging techniques for augmented reality-based maintenance. ScientificWorldJournal 2015 2015
    [Google Scholar]
  14. Farooq M. O. Kunzelmann H. The internet of things for smart homes: A review of recent trends. J. King Saud Univ. Comput. Inf. Sci. 2017
    [Google Scholar]
  15. Li S. Da Xu L. Wang X. Compressed sensing signal and data acquisition in wireless sensor networks and Internet of Things. IET Wirel. Sens. Syst. 2017 7 3 83 92
    [Google Scholar]
  16. Guo Y. Yu Z. Kim J. A survey of security architectures in the internet of things. J. King Saud Univ. Comput. Inf. Sci. 2018
    [Google Scholar]
  17. Roman R. Zhou J. Lopez J. On the features and challenges of security and privacy in distributed internet of things. Comput. Netw. 2013 57 10 2266 2279 10.1016/j.comnet.2012.12.018
    [Google Scholar]
  18. Halfond W.G. Viegas J. Orso A. A classification of SQL-injection attacks and countermeasures. Proceedings of the IEEE International Symposium on Secure Software Engineering, January 2006
    [Google Scholar]
  19. Mo Y. Bruno S. False data injection attacks against state estimation in electric power grids. ACM Trans. Inf. Syst. Secur. 2010 14 1 1 33
    [Google Scholar]
  20. Joseph A.D. Errin W. A framework for understanding and preventing identity theft. IEEE Secur. Priv. 2012 10 5 30 37
    [Google Scholar]
  21. Jagielski M. Oprea A. Biggio B. Liu C. Nita-Rotaru C. Li B. Manipulating machine learning: Poisoning attacks and countermeasures for regression learning. Proceedings of the 39th IEEE Symposium on Security and Privacy (SP 2018), San Francisco, CA, USA, 20-24 May 2018, pp. 19-35. 10.1109/SP.2018.00057
    [Google Scholar]
  22. Papernot N. McDaniel P. Sinha A. Wellman M.P. SoK: Security and privacy in machine learning. 2018 IEEE European Symposium on Security and Privacy (EuroS&P), London, UK, 24-26 April 2018, pp. 399-414.
    [Google Scholar]
  23. Xie T. Zhang L. Liu H. Feng D. An overview of recent advances in mobile cloud computing. Proceedings of the 2014 IEEE 5th International Conference on Software Engineering and Service Science (ICSESS 2014), 2014, pp. 113-116.
    [Google Scholar]
  24. Sun Q. Data-driven adaptive optimal control for constrained input nonlinear systems using reinforcement learning. IEEE Trans. Neural Netw. Learn. Syst. 2018 29 6 1701 1714 28504948
    [Google Scholar]
  25. Ahmad F. A survey on cyber-physical systems: Security and privacy issues, challenges, and solutions. Future Gener. Comput. Syst. 2020 105 509 525
    [Google Scholar]
  26. Zhu Q. Basar T. Game-theoretic methods for robustness, security, and resilience of cyber-physical control systems: Games-in-games principle for optimal cross-layer resilient control systems. IEEE Control Syst. 2015 35 1 46 65 10.1109/MCS.2014.2364710
    [Google Scholar]
  27. Cárdenas A.A. Attacks against process control systems: Risk assessment, detection, and response. Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security , New York, NY, USA, 22 March 2011, 355-366. 10.1145/1966913.1966959
    [Google Scholar]
  28. Krutz R.L. Vines R.D. Cloud Security: A Comprehensive Guide to Secure Cloud Computing. Wiley Publishing 2010
    [Google Scholar]
  29. Miller C. Valasek C. Remote exploitation of an unaltered passenger vehicle. Black Hat, USA 2015
    [Google Scholar]
  30. Koutsoukos X.D. Smart grid cyber security: Threats, vulnerabilities and countermeasures. IEEE Commun. Mag. 2010 48 8 104 109
    [Google Scholar]
  31. Reddy T.B. Reddy G.S. Network intrusion detection system based on feature selection and triangle-area support vector machine. Int. J. Commun. Netw. Syst. Sci. 2012 5 8 511 517
    [Google Scholar]
  32. Cherdantseva Y. Burnap P. Blyth A. Eden P. Jones K. Soulsby H. Stoddart K. A review of cyber security risk assessment methods for SCADA systems. Comput. Secur. 2016 56 1 27 10.1016/j.cose.2015.09.009
    [Google Scholar]
  33. Mitchell R. Chen I.R. A survey of intrusion detection techniques for cyber-physical systems. ACM Comput. Surv. 2014 46 4 1 29 [CSUR]. 10.1145/2542049
    [Google Scholar]
  34. Jafarian J.H. Al-Shaer E. Duan Q. Openflow random host mutation: Transparent moving target defense using software defined networking. Proceedings of the first workshop on Hot topics in software defined networks, New York, NY, USA, 13 August 2012, pp. 127 - 132. 10.1145/2342441.2342467
    [Google Scholar]
  35. Zhou Y. Pezaros D.P. Evaluation of machine learning classifiers for zero-day intrusion detection–an analysis on CIC-AWS-2018 dataset. IEEE International Conference on Cyber Security and Protection of Digital Services (Cyber Security), 2015, pp. 1-8.
    [Google Scholar]
  36. Ferrag M.A. Authentication protocols for Internet of Things: A comprehensive survey. Secur. Commun. Netw. 2018 ••• 2018
    [Google Scholar]
  37. He W. Security challenges in fog computing for Internet of Things: A survey. IEEE Internet Things J. 2018 5 4 3774 3784
    [Google Scholar]
  38. Ning H. Liu H. Yang L.T. Cyberentity security in the internet of things. Computer 2013 46 4 46 53 10.1109/MC.2013.74
    [Google Scholar]
  39. Park J.H. Shin D. A survey of IoT security based on multi-layer attack detection. Comput. Secur. 2019 84 39 51
    [Google Scholar]
  40. Ahmed M. A survey of network anomaly detection techniques. J. Netw. Comput. Appl. 2019 115 1 22
    [Google Scholar]
  41. Li W. A survey of deep neural network architectures and their applications. Neurocomputing 2018 324 34 48 10.1016/j.neucom.2018.05.034
    [Google Scholar]
  42. Farooq M.S. A survey of machine learning techniques in IoT-based network intrusion detection systems. IEEE Access 2018 6 4605 4622
    [Google Scholar]
  43. Zarpelão B.B. A survey of intrusion detection in IoT. IEEE Internet Things J. 2017 4 6 2660 2671
    [Google Scholar]
  44. Kaul S. Real-time security and privacy issues in sensor clouds for the IoT. IEEE Internet Things J. 2012 1 3 276 284
    [Google Scholar]
  45. Stankovic J.A. Research directions for the internet of things. IEEE Internet Things J. 2014 1 1 3 9 10.1109/JIOT.2014.2312291
    [Google Scholar]
  46. Yaqoob I. Hashem I.A.T. Gani A. Mokhtar S. Ahmed E. Anuar N.B. Vasilakos A.V. Big data: From beginning to future. Int. J. Inf. Manage. 2016 36 6 1231 1247 10.1016/j.ijinfomgt.2016.07.009
    [Google Scholar]
  47. Conti M. Security threats in the age of smart grid. IEEE Secur. Priv. 2018 16 5 77 85
    [Google Scholar]
/content/journals/rascs/10.2174/0126662558311697241023114206
Loading
/content/journals/rascs/10.2174/0126662558311697241023114206
Loading

Data & Media loading...


  • Article Type:
    Research Article
Keywords: CPS ; cyber domain ; cyber-physical domain ; physical domain
This is a required field
Please enter a valid email address
Approval was a Success
Invalid data
An Error Occurred
Approval was partially successful, following selected items could not be processed due to error
Please enter a valid_number test