Cyber Physical Systems: Analyses, challenges and possible solutions

被引:0
作者
Tyagi A.K. [1 ,2 ]
Sreenath N. [3 ]
机构
[1] Centre for Advanced Data Science, Vellore Institute of Technology, Tamilnadu, Chennai
[2] School of Computer Science and Engineering, Vellore Institute of Technology, Tamilnadu, Chennai
[3] Department of Computer Science and Engineering, Puducherry Technological University, Puducherry
来源
Internet of Things and Cyber-Physical Systems | 2021年 / 1卷
关键词
Challenges; Cyber-physical systems; Internet of everything; Internet of things; Security; and privacy;
D O I
10.1016/j.iotcps.2021.12.002
中图分类号
学科分类号
摘要
It is becoming more difficult to protect the authentication of our data in today's world of smart living. On the one hand, we are able to live in smart homes and smart cities with ease. Even if we use the most complicated passwords, we can't be sure that the Internet of Things and the Internet of Everything are safe. One way to make sure people and things are safe is to use Multi-Factor Authentication. Also, a big and complicated system needs more efficient and robust solutions for real, and strong, security, so this is important. There are a lot of smart ways to solve problems today. For this reason, the internet of things is being used in every possible field or application. This new ecosystem, which is called Cyber Physical Systems, was built by IoTs. Cyber-Physical Systems use computing, communication, and control to make new technology or the next generation of engineered systems. In the last decade, there has been a lot of work done on cyber physical systems that we didn't expect. There have been a lot of threats, challenges, and important issues in the last decade. We have a big problem with the security of CPS because the basic blocks used to make them are very different. Even if we're talking about natural gas systems or transportation systems or other automated systems, they all have something to do with CPS, no matter what. These days, CPSs systems are used for energy, transportation, the environment, and health care, among other things. This article talks about a number of problems that need to be solved by researchers and scientists (working related to respective area, i.e., CPS). As a result, this article also talks about a partial survey of important research issues, and an overview of several research projects that have been done in the last decade by a number of different people to improve CPS. © 2021 The Authors
引用
收藏
页码:22 / 33
页数:11
相关论文
共 35 条
[1]  
REGULATION (EU) 2016/679 OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/EC (General Data Protection Regulation),”, (2016)
[2]  
Vegh L., Cyber-physical systems security through multi-factor authentication and data analytics, 2018 IEEE International Conference on Industrial Technology (ICIT), (2018)
[3]  
Cardenas A., Amin S., Sastry S., Secure control: towards survivable cyber-physical systems, 2008 the 28th International Conference on Distributed Computing Systems Workshops, (2008)
[4]  
Wan J., Chen M., Xia F., Et al., From machine-to-machine communications towards cyber-physical systems, ComSIS, 10, 3, (2013)
[5]  
Tyagi M.K., Aswathy S.U., Aghila G., Sreenath N., AARIN: Affordable, Accurate, Reliable and INnovative Mechanism to Protect a Medical Cyber-Physical System using Blockchain Technology, IJIN, 2, pp. 175-183, (2021)
[6]  
Bartocci E., Cherry M., Glimm J., Grosu R., Smolka S.A., Fenton F.H., Toward real-time simulation of cardiac dynamics, Proceedings of the 9th International Conference on Computational Methods in Systems Biology - CMSB, 11, (2011)
[7]  
Tibrewal I., Srivastava M., Tyagi A.K., Blockchain Technology for Securing Cyber-Infrastructure and Internet of Things Networks, Intelligent Interactive Multimedia Systems for e-Healthcare Applications., (2022)
[8]  
Thomas M., Kumar P., Chandna V.K., Design, development, and commissioning of a supervisory control and data acquisition (SCADA) laboratory for research and training, IEEE Trans. Power Syst., 19, 3, pp. 1582-1588, (2004)
[9]  
Xu F., Qin Z., Tan C., Wang B., Et al., IMDGuard: securing implantable medical devices with the external wearable guardian, 2011 Proceedings, (2011)
[10]  
Bird G., Christensen M., Lutz D., Scandura P., Use of integrated vehicle health management in the field of commercial aviation, Proc. of NASA ISHEM, (2005)