Analysis of Security Threats and Vulnerability for Cyber-physical Systems

被引:0
作者
Gao, Yang [1 ]
Peng, Yong [1 ]
Xie, Feng [1 ]
Zhao, Wei [1 ]
Wang, Dejin [1 ]
Han, Xuefeng [1 ]
Lug, Tianbo [2 ]
Lie, Zhao [2 ]
机构
[1] China Informat Technol Secur Evaluat Ctr, Beijing, Peoples R China
[2] Beijing Univ Posts & Telecommun, Beijing, Peoples R China
来源
2013 3RD INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT) | 2013年
基金
中国国家自然科学基金;
关键词
component; cyber-physical systems; security threats; vulnerabilities; AGGREGATION; PRIVACY;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Governments, enterprises and research institutions have participated the research and development of cyber-physical systems (CPS). However, the development of cyber-physical systems will be restricted by security threats and vulnerabilities. We summarize security threats and to the cyber-physical systems to provide a theoretical reference for research on cyber-physical systems and to provide effective security measures. The architecture of cyber-physical systems is used to classify threats in the physical layer, network layer and application layer. This paper presents the security threats in the three layers. Then it lists the vulnerabilities of cyber-physical systems from the three aspects of management and policy, platform and network. Correspondingly, it also provides some security measures and recommendations for the security threats and vulnerabilities in each section.
引用
收藏
页码:50 / 55
页数:6
相关论文
共 26 条
  • [1] [Anonymous], 2008, P 27 C COMP COMM
  • [2] [Anonymous], 2008, CYB PHYS SYST EX SUM
  • [3] [Anonymous], CYBER PHYS SYSTEMS I
  • [4] [Anonymous], 2008, INT S OBJ COMP SERV
  • [5] [Anonymous], 2007, Computing Foundations and Practice for Cyber-Physical Systems: A Preliminary Report
  • [6] Branicky M., 2008, P IEEE RSJ INT C ROB
  • [7] A new relaxation labeling architecture for secure localization in sensor networks
    Chang, Chih-Chieh Geoff
    Snyder, Wesley E.
    Wang, Cliff
    [J]. 2007 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-14, 2007, : 3076 - +
  • [8] Domingo-Ferrer J, 2002, LECT NOTES COMPUT SC, V2433, P471
  • [9] Eschenauer L., 2002, ACM CCS2002, DOI DOI 10.1145/586110.586117
  • [10] Ganesan P, 2003, P 2 ACM INT C WIR SE, P151, DOI [10.1145/941350.941372, DOI 10.1145/941350.941372]