A Survey on Cyber-Physical Systems Security

被引:71
作者
Yu, Zhenhua [1 ]
Gao, Hongxia [2 ]
Cong, Xuya [1 ]
Wu, Naiqi [3 ]
Song, Houbing Herbert [4 ]
机构
[1] Xian Univ Sci & Technol, Coll Comp Sci & Technol, Xian 710054, Peoples R China
[2] Shanxi Unicom Ind Internet Co Ltd, Taiyuan 030000, Shanxi, Peoples R China
[3] Macau Univ Sci & Technol, Inst Syst Engn, Macau, Peoples R China
[4] Univ Maryland, Baltimore Cty UMBC, Dept Informat Syst, Baltimore, MD 21250 USA
基金
中国国家自然科学基金;
关键词
Cyberattack; cyber-physical attack; cyber-physical systems (CPSs); defense; security; vulnerability; DATA-INJECTION ATTACKS; SENSOR NETWORKS; SERVICE; CHALLENGES; DEFENSE; DESIGN;
D O I
10.1109/JIOT.2023.3289625
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cyber-physical systems (CPSs) are new types of intelligent systems that integrate computing, control, and communication technologies, bridging the cyberspace and physical world. These systems enhance the capabilities of our critical infrastructure and are widely used in a variety of safety-critical systems. CPSs are susceptible to cyber attacks due to their vulnerabilities such that their security has become a critical issue. Therefore, it is important to classify and comprehensively investigate this issue. Most of the existing surveys on it are conducted from a single perspective. In this article, we present a comprehensive view of the security of CPSs from three perspectives: 1) the physical domain; 2) the cyber domain; and 3) the cyber-physical domain. In the physical domain, we review some attacks that directly damage the physical components of CPSs such as sensors and discuss corresponding defenses. We also review the attacks that CPSs in the cyber domain may face and study methods to detect and defend against them. In addition, we survey the intelligent attacks faced by CPSs and the corresponding defensive means. In the cyber-physical domain, we provide an overview of attacks that come from the cyber domain and eventually damage the physical parts, and discuss the corresponding detection and defense methods. Finally, we present the challenges and future research directions. Through this in-depth review, we attempt to summarize the current security threats to CPSs and the state-of-the-art security means to provide researchers with a comprehensive overview.
引用
收藏
页码:21670 / 21686
页数:17
相关论文
共 160 条
[1]   Deep Learning with Differential Privacy [J].
Abadi, Martin ;
Chu, Andy ;
Goodfellow, Ian ;
McMahan, H. Brendan ;
Mironov, Ilya ;
Talwar, Kunal ;
Zhang, Li .
CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, :308-318
[2]   Efficient Prevention Technique for False Data Injection Attack in Smart Grid [J].
Abdallah, Asmaa ;
Shen, Xuemin .
2016 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2016, :68-73
[3]   Vehicle Security: A Survey of Security Issues and Vulnerabilities, Malware Attacks and Defenses [J].
Abu Elkhail, Abdulrahman ;
Refat, Rafi Ud Daula ;
Habre, Ricardo ;
Hafeez, Azeem ;
Bacha, Anys ;
Malik, Hafiz .
IEEE ACCESS, 2021, 9 :162401-162437
[4]  
Adi Y, 2018, PROCEEDINGS OF THE 27TH USENIX SECURITY SYMPOSIUM, P1615
[5]  
Agah A, 2005, IEEE ICC, P3218
[6]  
Ahmad I, 2018, 2018 1ST INTERNATIONAL CONFERENCE ON COMPUTER APPLICATIONS & INFORMATION SECURITY (ICCAIS' 2018)
[7]   Man-in-the-Middle Attack on Contactless Payment over NFC Communications: Design, Implementation, Experiments and Detection [J].
Akter, Sajeda ;
Chellappan, Sriram ;
Chakraborty, Tusher ;
Khan, Taslim Arefin ;
Rahman, Ashikur ;
Al Islam, A. B. M. Alim .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (06) :3012-3023
[8]   Detection of SQL Injection Attack Using Machine Learning Techniques: A Systematic Literature Review [J].
Alghawazi, Maha ;
Alghazzawi, Daniyal ;
Alarifi, Suaad .
JOURNAL OF CYBERSECURITY AND PRIVACY, 2022, 2 (04) :764-777
[9]   Cyber-physical systems and their security issues [J].
Alguliyev, Rasim ;
Imamverdiyev, Yadigar ;
Sukhostat, Lyudmila .
COMPUTERS IN INDUSTRY, 2018, 100 :212-223
[10]  
Ali Saqib, 2015, Journal of Theoretical and Applied Information Technology, V71, P144