2018
DOI: 10.1007/978-3-319-75880-0_6
|View full text |Cite
|
Sign up to set email alerts
|

Embedded Systems Security for Cyber-Physical Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 81 publications
0
4
0
Order By: Relevance
“…The use of fault trees might give rise to overlook runtime faults in the system. The papers in our set of 312 shows that most of the work done in terms of the techniques proposed for risk identification, assessment, mitigation, and management is specific to smart grids. The focus of the aforementioned techniques was on safety, security, and risk management standards specific to smart grids as in previous works 62,104,105 . In one way, this is not a limitation for professionals working on smart grids; however, it opens up avenues for researchers to explore other domains also.…”
Section: Findings Of Our Reviewmentioning
confidence: 99%
See 1 more Smart Citation
“…The use of fault trees might give rise to overlook runtime faults in the system. The papers in our set of 312 shows that most of the work done in terms of the techniques proposed for risk identification, assessment, mitigation, and management is specific to smart grids. The focus of the aforementioned techniques was on safety, security, and risk management standards specific to smart grids as in previous works 62,104,105 . In one way, this is not a limitation for professionals working on smart grids; however, it opens up avenues for researchers to explore other domains also.…”
Section: Findings Of Our Reviewmentioning
confidence: 99%
“…Since trust, system reliability, and resilience against security threats in CPS are mainly based on data confidentiality, integrity, authenticity, and system's authorized access, 104 some papers have considered them along with availability, fault‐tolerance, and self‐healing to be a crucial factor being integrated in CPS 5 . In our selected set of papers, the most frequently covered security requirements are integrity (in 184 papers), confidentiality (170 papers), and authentication (165), while the most studied dependability attributes consisted of availability (177 papers), reliability (157 papers), and trust (108 papers).…”
Section: Findings Of Our Reviewmentioning
confidence: 99%
“…f) Man-in-the-middle attack: In CPSs, when an attacker tries to eavesdrop on communication between a system and a server, a man-in-the-middle (MITM) attack may occur [35]. The attacker sends forged information to the server, and the server performs unnecessary operations based on the received information, which may lead to some undesirable consequences [75]. The attack process is shown in Fig.…”
Section: Jamming Noisementioning
confidence: 99%
“…1) Vulnerabilities in the embedded systems: In [60], [61], a number of vulnerabilities in the embedded hardware have been reported in SG metering systems, e.g., lack of tamper protection, weak encryption module and algorithm, hardware design flaws, etc. In addition, numbers of embedded software flaws have been discussed in the smart metering systems, such as bugs in [67], [68], malware and lack of software update in [69]. Utilizing these software vulnerabilities, an attacker can pose huge impacts on the smart metering network, and on the consumers, e.g., a black out in home.…”
Section: A2 Vulnerabilities In Sg Metering Networkmentioning
confidence: 99%