Abstract
The integration of physical systems and processes with networked computing has led to the emergence of a new generation of engineered systems, called Cyber-Physical Systems (CPS). These systems are large networked systems of systems, in which a component system may itself be a grid. In this paper we survey the current state of the art of CPS security, identify the issues surrounding secure control, and investigate the extent to which context information may be used to improve security and survivability of CPS.
Similar content being viewed by others
References
Abrial JR, Börger E, Langmaack H. (eds.) (1996) Formal methods for industrial applications, specifying and programming the steam boiler control, vol. 1165 of lecture notes in computer science. Springer-Verlag, 1995, pp. 112
Alagar VS, Wan K (2007) Context based enforcement of authorization for privacy and security in identity management. In: de Leeuw E, Fischer Hübner S, Tseng JC, Borking JJ (eds) Policies and Research in Identity Management - IFIP WG 11.6 working conference on policies & research in identity management (IDMAN’07), RSM Erasmus University, Rotterdam, The Netherlands, October 11–12, 2007, vol 261. Springer, New York, pp 25–37
Amin S, Cárdenas AA, Sastry S (2009) Safe and secure networked control systems under denial of service attacks. Hybrid Syst Comput Control 5469:31–45
Avizienis A, Laprie JC, Randell B, Landwehr C (2004) Basic concepts and taxonomy of dependable and secure computing. IEEE Trans Dependable Secure Comput 1(1):11–33
Cárdenas AA, Amin S, Sastry S (2008) Secure Control: towards survivable cyber-physical systems. ICDS 2008 Workshop Proceedings, pp 495,500. http://doi.ieeecomputersociety.org/10.1109/ICDCS.Workshops.2008.40
Cyber-Physical Systems: Executive Summary, CPS Steering Group, 2008, available online at: http://varma.ece.cmu.edu/summit/CPS-Executive-Summary.pdf
Dan G, Sandberg H (2010) Stealth attacks and protection schemes for state estimators in power systems. In: IEEE International Conference on Smart Grid Communications, Gaithersburg, pp 214–219
Dey AK, Abowd GD (2001) A conceptual framework and a toolkit for supporting rapid prototyping of context-aware applications. Human-Computer Interaction (HCI) 16(2–4):7–166. Energy and the U.S. Department of Homeland Security, January 2006
Han T (2007) Security analysis of a cyber-physical system. Master’s Thesis, Computer Engineering, University of Missouri-Rolla
Lee EA (2008) Cyber physical systems: design challenges. International Symposium on Object/Component/Service-Oriented Real-Time Distributed Computing (ISORC)
Lee EA, Seshia SA (2011) Introduction to embedded systems - a cyber-physical systems approach. LeeSeshia.org
Liu Y, Reiter MK, Ning P (2009) False data injection attacks against state estimation in electric power grids. In: ACM conference on computer and communication security. Chicago, pp 21–32
Metke AR, Ekl RL (2010) Security technology for smart grid networks. IEEE Trans Smart Grid 1(1):99–107
Mo Y, Kim TH-J, Brancik K, Dickinson D, Lee H, Perrig A, Sinopoli B (2012) CyberPhysical security of a smart grid infrastructure. Proc IEEE 100(1):195,209
Mo Y, Sinopoli B (2010) Secure control against replay attacks. In: Allerton conference on communications, control, and computing. Monticello, pp 911–918
Mo Y, Sinopoli B (2010) False data injection attacks in control systems. In: First workshop on secure control systems. Stockholm
Mohammad M, Wan K, Alsalman Hnaide S, Alagar V (2014) A Framework for developing Context-aware Systems. submitted for publication
Mohammad M, Alagar V (2011) A formal approach for the specification and verification of trustworthy component-based systems. J Syst Softw 84:77–104
Morris TH, Srivastava AK, Reaves B, Pavurapu K, Abdelwahed S, Vaughn R, McGrew W, Dandass Y (2009) Engineering future cyber-physical energy systems: challenges, research needs, and roadmap. North American Power Symposium (NAPS), Starkville, pp 1–6
Mostéfaoui GK, Brézillon P (2003) A generic framework for context-based distributed authorizations. In: Blackburn P, et al (eds) CONTEXT 2003 Proceedings. LNAI 2680, pp 204–217
Pasqualetti F, Dörfler F, Bullo F (2012) Attack detection and identification in cyber-physical systems - part I: models and fundamental limitations. arXiv:1202.6144v2
Sridhar S, Hahn A, Govindarasu M (2012) CyberPhysical system security for the electric power grid. Proc IEEE 100(1):210,224
Smith R (2011) A decoupled feedback structures for covertly appropriating network control systems. In: IFAC world congress. Milan, pp 90–95
Teixeira A, Amin S, Sandberg H, Johnson KH, Sastry S (2010) Cyber security analysis of state estimators in electric power systems. In: IEEE conference on decision and control. Atlanta, pp 5991–5998
Toninelli A, Montanari R, Kagal L, Lassila OA semantic context-aware access control framework for secure collaborations in pervasive computing environments. In: Cruz J et al (eds) ISWC 2006 Proceedings. LNCS 4273, pp 473–486
U. S. G. A. Office. Critical infrastructure protection (2007) Multiple efforts to Secure control systems are under way, but challenges remain. Technical Report GAO-07-1036, Report to Congressional Requesters
USA NSF Program Solicitation NSF-08-611 (2008)
Venkatasubramanian KK (2009) Security solutions for cyber-physical systems. Doctoral Dissertation, Arizona State University. ISBN: 978-1-109-40735-8
Wan K (2006) Lucx: lucid enriched with context. Ph.d thesis, Concordia University, Montreal
Wan K (2009) A brief history of context. Int J Comput Sci Issues 6(2)
Winograd T (2001) Architectures for context. Human Comput Interact (HCI) 16(2):401–419
Weiss JM (2007) Control systems cyber security - the need for appropriate regulations to assure cyber security of the electric grid. Testimony (Report) to Homeland Security’s Subcommittee on Emerging Threats, Cyber-security, and Science and Technology. http://chsdemocrats.house.gov/SiteDocuments/SiteDocuments/20071017164638-60716.pdf
The Water Sector Coordinating Council (WSCC) Cyber Security Working Group (CSWG) (2008) Roadmap to Secure Control Systems in the Water Sector. www.tisp.org/index.cfm?pk=download&id=110&pid=10261?
Wonham WM (1985) Linear multivariate control: a geometric approach, 3rd edn. Springer
Acknowledgments
This research is supported by Research Grants from National Natural Science Foundation of China (Project Number 61103029), Natural Science Foundation of Jiangsu Province, China (Project Number (BK2011351), and Natural Sciences and Engineering Research Council, Canada.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Wan, K., Alagar, V. Context-Aware Security Solutions for Cyber-Physical Systems. Mobile Netw Appl 19, 212–226 (2014). https://doi.org/10.1007/s11036-014-0495-x
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11036-014-0495-x