2017
DOI: 10.1109/jiot.2017.2703172
|View full text |Cite
|
Sign up to set email alerts
|

Cyber-Physical Systems Security—A Survey

Abstract: Abstract-With the exponential growth of cyber-physical systems (CPS), new security challenges have emerged. Various vulnerabilities, threats, attacks, and controls have been introduced for the new generation of CPS. However, there lack a systematic study of CPS security issues. In particular, the heterogeneity of CPS components and the diversity of CPS systems have made it very difficult to study the problem with one generalized model.In this paper, we capture and systematize existing research on CPS security … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

2
358
0
8

Year Published

2017
2017
2022
2022

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 831 publications
(433 citation statements)
references
References 122 publications
2
358
0
8
Order By: Relevance
“…Table 5 shows some examples of cyberatacks to service robots indicating if it generates a privacy [1] or a safety problem [2].…”
Section: Examples Of Atacksmentioning
confidence: 99%
See 1 more Smart Citation
“…Table 5 shows some examples of cyberatacks to service robots indicating if it generates a privacy [1] or a safety problem [2].…”
Section: Examples Of Atacksmentioning
confidence: 99%
“…Cyber-physical atacks present several challenges that have to be faced [2]. In this study, we have focused in two particular cases: safety and privacy.…”
Section: Introductionmentioning
confidence: 99%
“…The realization of cyber threats disrupting SCADA systems and provoking physical consequences could be traced back to the Maroochy water breach in 2000 . This cyber‐attack against the Maroochy Water Services in Australia led to release of one million liters of untreated water into local rivers and parks.…”
Section: The Emergence Of Cps: Two Perspectives For Derivation Of Keymentioning
confidence: 99%
“…For more historical attacks to CPSs and empirical demonstrations in research environments, Humayed et al described an ample list of attacks to ICSs, smart grids, smart medical devices, and modern cars. They used the description of cross‐domain attacks proposed by Yampolskiy et al to discretize the influenced elements (targeted by the attack) from the affected elements (causing the actual damages).…”
Section: The Emergence Of Cps: Two Perspectives For Derivation Of Keymentioning
confidence: 99%
See 1 more Smart Citation