Skip to main content
Log in

Context-Aware Security Solutions for Cyber-Physical Systems

  • Published:
Mobile Networks and Applications Aims and scope Submit manuscript

Abstract

The integration of physical systems and processes with networked computing has led to the emergence of a new generation of engineered systems, called Cyber-Physical Systems (CPS). These systems are large networked systems of systems, in which a component system may itself be a grid. In this paper we survey the current state of the art of CPS security, identify the issues surrounding secure control, and investigate the extent to which context information may be used to improve security and survivability of CPS.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

References

  1. Abrial JR, Börger E, Langmaack H. (eds.) (1996) Formal methods for industrial applications, specifying and programming the steam boiler control, vol. 1165 of lecture notes in computer science. Springer-Verlag, 1995, pp. 112

  2. Alagar VS, Wan K (2007) Context based enforcement of authorization for privacy and security in identity management. In: de Leeuw E, Fischer Hübner S, Tseng JC, Borking JJ (eds) Policies and Research in Identity Management - IFIP WG 11.6 working conference on policies & research in identity management (IDMAN’07), RSM Erasmus University, Rotterdam, The Netherlands, October 11–12, 2007, vol 261. Springer, New York, pp 25–37

  3. Amin S, Cárdenas AA, Sastry S (2009) Safe and secure networked control systems under denial of service attacks. Hybrid Syst Comput Control 5469:31–45

    Article  Google Scholar 

  4. Avizienis A, Laprie JC, Randell B, Landwehr C (2004) Basic concepts and taxonomy of dependable and secure computing. IEEE Trans Dependable Secure Comput 1(1):11–33

    Article  Google Scholar 

  5. Cárdenas AA, Amin S, Sastry S (2008) Secure Control: towards survivable cyber-physical systems. ICDS 2008 Workshop Proceedings, pp 495,500. http://doi.ieeecomputersociety.org/10.1109/ICDCS.Workshops.2008.40

  6. Cyber-Physical Systems: Executive Summary, CPS Steering Group, 2008, available online at: http://varma.ece.cmu.edu/summit/CPS-Executive-Summary.pdf

  7. Dan G, Sandberg H (2010) Stealth attacks and protection schemes for state estimators in power systems. In: IEEE International Conference on Smart Grid Communications, Gaithersburg, pp 214–219

    Google Scholar 

  8. Dey AK, Abowd GD (2001) A conceptual framework and a toolkit for supporting rapid prototyping of context-aware applications. Human-Computer Interaction (HCI) 16(2–4):7–166. Energy and the U.S. Department of Homeland Security, January 2006

    Google Scholar 

  9. Han T (2007) Security analysis of a cyber-physical system. Master’s Thesis, Computer Engineering, University of Missouri-Rolla

  10. Lee EA (2008) Cyber physical systems: design challenges. International Symposium on Object/Component/Service-Oriented Real-Time Distributed Computing (ISORC)

  11. Lee EA, Seshia SA (2011) Introduction to embedded systems - a cyber-physical systems approach. LeeSeshia.org

  12. Liu Y, Reiter MK, Ning P (2009) False data injection attacks against state estimation in electric power grids. In: ACM conference on computer and communication security. Chicago, pp 21–32

  13. Metke AR, Ekl RL (2010) Security technology for smart grid networks. IEEE Trans Smart Grid 1(1):99–107

    Article  Google Scholar 

  14. Mo Y, Kim TH-J, Brancik K, Dickinson D, Lee H, Perrig A, Sinopoli B (2012) CyberPhysical security of a smart grid infrastructure. Proc IEEE 100(1):195,209

    Google Scholar 

  15. Mo Y, Sinopoli B (2010) Secure control against replay attacks. In: Allerton conference on communications, control, and computing. Monticello, pp 911–918

  16. Mo Y, Sinopoli B (2010) False data injection attacks in control systems. In: First workshop on secure control systems. Stockholm

  17. Mohammad M, Wan K, Alsalman Hnaide S, Alagar V (2014) A Framework for developing Context-aware Systems. submitted for publication

  18. Mohammad M, Alagar V (2011) A formal approach for the specification and verification of trustworthy component-based systems. J Syst Softw 84:77–104

    Article  Google Scholar 

  19. Morris TH, Srivastava AK, Reaves B, Pavurapu K, Abdelwahed S, Vaughn R, McGrew W, Dandass Y (2009) Engineering future cyber-physical energy systems: challenges, research needs, and roadmap. North American Power Symposium (NAPS), Starkville, pp 1–6

    Google Scholar 

  20. Mostéfaoui GK, Brézillon P (2003) A generic framework for context-based distributed authorizations. In: Blackburn P, et al (eds) CONTEXT 2003 Proceedings. LNAI 2680, pp 204–217

  21. Pasqualetti F, Dörfler F, Bullo F (2012) Attack detection and identification in cyber-physical systems - part I: models and fundamental limitations. arXiv:1202.6144v2

  22. Sridhar S, Hahn A, Govindarasu M (2012) CyberPhysical system security for the electric power grid. Proc IEEE 100(1):210,224

    Article  Google Scholar 

  23. Smith R (2011) A decoupled feedback structures for covertly appropriating network control systems. In: IFAC world congress. Milan, pp 90–95

  24. Teixeira A, Amin S, Sandberg H, Johnson KH, Sastry S (2010) Cyber security analysis of state estimators in electric power systems. In: IEEE conference on decision and control. Atlanta, pp 5991–5998

  25. Toninelli A, Montanari R, Kagal L, Lassila OA semantic context-aware access control framework for secure collaborations in pervasive computing environments. In: Cruz J et al (eds) ISWC 2006 Proceedings. LNCS 4273, pp 473–486

  26. U. S. G. A. Office. Critical infrastructure protection (2007) Multiple efforts to Secure control systems are under way, but challenges remain. Technical Report GAO-07-1036, Report to Congressional Requesters

  27. USA NSF Program Solicitation NSF-08-611 (2008)

  28. Venkatasubramanian KK (2009) Security solutions for cyber-physical systems. Doctoral Dissertation, Arizona State University. ISBN: 978-1-109-40735-8

  29. Wan K (2006) Lucx: lucid enriched with context. Ph.d thesis, Concordia University, Montreal

  30. Wan K (2009) A brief history of context. Int J Comput Sci Issues 6(2)

  31. Winograd T (2001) Architectures for context. Human Comput Interact (HCI) 16(2):401–419

    Article  Google Scholar 

  32. Weiss JM (2007) Control systems cyber security - the need for appropriate regulations to assure cyber security of the electric grid. Testimony (Report) to Homeland Security’s Subcommittee on Emerging Threats, Cyber-security, and Science and Technology. http://chsdemocrats.house.gov/SiteDocuments/SiteDocuments/20071017164638-60716.pdf

  33. The Water Sector Coordinating Council (WSCC) Cyber Security Working Group (CSWG) (2008) Roadmap to Secure Control Systems in the Water Sector. www.tisp.org/index.cfm?pk=download&id=110&pid=10261?

  34. Wonham WM (1985) Linear multivariate control: a geometric approach, 3rd edn. Springer

Download references

Acknowledgments

This research is supported by Research Grants from National Natural Science Foundation of China (Project Number 61103029), Natural Science Foundation of Jiangsu Province, China (Project Number (BK2011351), and Natural Sciences and Engineering Research Council, Canada.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Vangalur Alagar.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Wan, K., Alagar, V. Context-Aware Security Solutions for Cyber-Physical Systems. Mobile Netw Appl 19, 212–226 (2014). https://doi.org/10.1007/s11036-014-0495-x

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11036-014-0495-x

Keywords

Navigation