Skip to main content

Context-Aware Security Solutions for Cyber Physical Systems

  • Conference paper
Context-Aware Systems and Applications (ICCASA 2012)

Abstract

The integration of physical systems and processes with networked computing has led to the emergence of a new generation of engineered systems, called Cyber-Physical Systems (CPS). These systems are large networked systems of systems, in which a component system may itself be a grid. In this paper we survey the current state of the art of CPS, identify the issues surrounding security control, and investigate the extent to which context information may be used to improve security and survivability of CPS.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Alagar, V., Wan, K.: Context Based Enforcement of Authorization for Privacy and Security in Identity Management. In: de Leeuw, E., Fischer-Hübner, S., Tseng, J., Borking, J. (eds.) Policies and Research in Identity Management. IFIP, vol. 261, pp. 25–37. Springer, Boston (2008)

    Chapter  Google Scholar 

  2. Cardénas, A.A., Amin, S., Sastry, S.: Secure Control: Towards Survivable Cyber-Physical Systems. In: 28th International Conference on Distributed Computing Systems Workshops, ICDCS 2008, pp. 495–500 (June 2008)

    Google Scholar 

  3. Cyber-Physical Systems: Executive Summary, CPS Steering Group (2008), http://varma.ece.cmu.edu/summit/CPS-Executive-Summary.pdf

  4. Dey, A.K., Abowd, G.D.: A Conceptual Framework and a Toolkit for Supporting Rapid Prototyping of Context-aware Applications. Human-Computer Interaction 16(2-4), 7–166 (2001)

    Google Scholar 

  5. Mohammad, M., Alagar, V.: A Formal Approach for the Specification and Verification of Trustworthy Component-Based Systems. Journal of Systems and Software 84, 77–104 (2011)

    Article  Google Scholar 

  6. USA NSF Program Solicitation NSF-08-611 (2008)

    Google Scholar 

  7. Wan, K.: Lucx: Lucid Enriched with Context. Ph.d thesis, Concordia University, Montreal, Canada (January 2006)

    Google Scholar 

  8. Wan, K.: A Brief History of Context. International Journal of Computer Science Issues 6(2) (November 2009)

    Google Scholar 

  9. Winograd, T.: Architectures for Context. Human-Computer Interaction (HCI) 16(2), 401–419 (2001)

    Article  Google Scholar 

  10. Weiss, J.M.: Control Systems Cyber Security - The Need for Appropriate Regulations to Assure the Cyber Security of Electric Grid. Testimony before The Committee on Homeland Security (October 2007), http://chsdemocrats.house.gov/SiteDocuments/20071017164638-60716.pdf

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Wan, K., Alagar, V. (2013). Context-Aware Security Solutions for Cyber Physical Systems. In: Vinh, P.C., Hung, N.M., Tung, N.T., Suzuki, J. (eds) Context-Aware Systems and Applications. ICCASA 2012. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 109. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-36642-0_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-36642-0_3

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-36641-3

  • Online ISBN: 978-3-642-36642-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics