Security Perspective Analysis of Industrial Cyber Physical Systems (I-CPS): A Decade-wide Survey

被引:27
作者
Agrawal, Neha [1 ]
Kumar, Rohit [2 ]
机构
[1] IIIT Sri City, Chittoor 517646, Andhra Pradesh, India
[2] KREA Univ, Chittoor 517646, Andhra Pradesh, India
关键词
Cyber Physical Systems (CPS); Internet of Things (IoT); Industrial IoT (IIoT); Cloud; Edge; Fog computing; Unmanned Aerial Vehicle (UAV); ARTIFICIAL-INTELLIGENCE; THEORETIC APPROACH; INTEGRITY ATTACKS; ANOMALY DETECTION; INTERNET; THINGS; FRAMEWORK; SAFETY; MODEL; CHALLENGES;
D O I
10.1016/j.isatra.2022.03.018
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Considering the exceptional growth of Cyber Physical Systems (CPSs), multiple and potentially grave security challenges have emerged in this field. Different vulnerabilities and attacks are present in front of new generation CPSs, such as Industrial CPS (I-CPS). The underlying non-uniform standards, device heterogeneity, network complexity, etc., make it difficult to offer a systematized coverage on CPS security in an industrial environment. This work considers the security perspective of I-CPSs, and offers a decade-wide survey including different vulnerabilities, attacks, CPS components, and various other aspects. The comparative year-wise analysis of the existing works w.r.t objective, approach referred, testbed used and derived inference, is also presented over a decade. Additionally, the work details different security issues and research challenges present in I-CPS. This work attempts to offer a concise and precise literature study focused on the state-of-the-art I-CPS security. This work also encourages the young researchers to explore the wide possibilities present in this emerging field. (c) 2022 ISA. Published by Elsevier Ltd. All rights reserved.
引用
收藏
页码:10 / 24
页数:15
相关论文
共 102 条
[1]  
Abad FAT, 2013, 2013 IEEE 1ST INTERNATIONAL CONFERENCE ON CYBER-PHYSICAL SYSTEMS, NETWORKS, AND APPLICATIONS (CPSNA), P26, DOI 10.1109/CPSNA.2013.6614242
[2]   Dynamic load balancing assisted optimized access control mechanism for Edge-Fog-Cloud network in Internet of Things environment [J].
Agrawal, Neha .
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2021, 33 (21)
[3]   Defense Mechanisms Against DDoS Attacks in a Cloud Computing Environment: State-of-the-Art and Research Challenges [J].
Agrawal, Neha ;
Tapaswi, Shashikala .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2019, 21 (04) :3769-3795
[4]   Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications [J].
Al-Fuqaha, Ala ;
Guizani, Mohsen ;
Mohammadi, Mehdi ;
Aledhari, Mohammed ;
Ayyash, Moussa .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2015, 17 (04) :2347-2376
[5]   Cyber-physical systems and their security issues [J].
Alguliyev, Rasim ;
Imamverdiyev, Yadigar ;
Sukhostat, Lyudmila .
COMPUTERS IN INDUSTRY, 2018, 100 :212-223
[6]   An unsupervised anomaly-based detection approach for integrity attacks on SCADA systems [J].
Almalawi, Abdulmohsen ;
Yu, Xinghuo ;
Tari, Zahir ;
Fahad, Adil ;
Khalil, Ibrahim .
COMPUTERS & SECURITY, 2014, 46 :94-110
[7]  
[Anonymous], 2021, INTERNET THINGS IOT
[8]  
[Anonymous], 2021, IOT MARKET DEMANDS I
[9]  
[Anonymous], 2014, 2014 ANN IEEE INDIA
[10]   Cyber physical systems security: Analysis, challenges and solutions [J].
Ashibani, Yosef ;
Mahmoud, Qusay H. .
COMPUTERS & SECURITY, 2017, 68 :81-97