publication . Preprint . Other literature type . Article . 2016

State of the art of cyber-physical systems security : An automatic control perspective

Maria Domenica Di Benedetto; Yuriy Zacchia Lun; Francesco Smarra; Ivano Malavolta; Alessandro D'Innocenzo;
Open Access English
  • Published: 31 May 2016
Cyber-physical systems are integrations of computation, networking, and physical processes. Due to the tight cyber-physical coupling and to the potentially disrupting consequences of failures, security here is one of the primary concerns. Our systematic mapping study sheds some light on how security is actually addressed when dealing with cyber-physical systems. The provided systematic map of 118 selected studies is based on, for instance, application fields, various system components, related algorithms and models, attacks characteristics and defense strategies. It presents a powerful comparison framework for existing and future research on this hot topic, impo...
free text keywords: Computer Science - Systems and Control, Computer Science - Cryptography and Security, Hardware and Architecture, Software, Information Systems, Data science, Systematic mapping, Automatic control, Computer security, computer.software_genre, computer, Computation, Cyber-physical system, Engineering, business.industry, business
Related Organizations
122 references, page 1 of 9

[1] E. Lee and S. Seshia, Introduction to Embedded Systems - A CyberPhysical Systems Approach, 1st ed. Lee and Seshia, 2010.

[2] A. Ca´rdenas, S. Amin, and S. Sastry, “Research challenges for the security of control systems,” in Proceedings of the 3rd Conference on Hot Topics in Security, ser. HOTSEC'08. Berkeley, CA, USA: USENIX Association, 2008, pp. 6:1-6:6.

[3] R. Poovendran, “Cyber-physical systems: Close encounters between two parallel worlds [Point of View],” Proceedings of the IEEE, vol. 98, no. 8, pp. 1363-1366, August 2010. [OpenAIRE]

[4] E. Lee, “Computing foundations and practice for cyber-physical systems: A preliminary report,” University of California, Berkeley, Tech. Rep. UCB/EECS-2007-72, May 2007.

[5] President's Council of Advisors on Science and Technology, “Report to the President and Congress: Designing a digital future: Federally funded research and development in networking and information technology,” December 2010.

[6] National Science Foundation, “Cyber-physical systems program solicitation NSF 13-502,” October 2012.

[7] E. Lee, “Cyber physical systems: Design challenges,” in ISORC, 2008, pp. 363-369.

[8] --, “CPS foundations,” in DAC, 2010, pp. 737-742.

[9] K. Petersen, S. Vakkalanka, and L. Kuzniarz, “Guidelines for conducting systematic mapping studies in software engineering: An update,” Information and Software Technology, vol. 64, pp. 1-18, 2015.

[10] B. Kitchenham and S. Charters, “Guidelines for performing systematic literature reviews in software engineering,” Keele University and University of Durham, Tech. Rep. EBSE-2007-01, 2007.

[11] N. Wiener, Cybernetics or Control and Communication in the Animal and the Machine. MIT press, 1965, vol. 25.

[12] A. Ca´rdenas, S. Amin, and S. Sastry, “Secure control: Towards survivable cyber-physical systems,” in Distributed Computing Systems Workshops, 2008. ICDCS '08. 28th International Conference on, June 2008, pp. 495-500.

[13] N. Institute of Standards and Technology (NIST), “Strategic vision and business drivers for 21st century cyber-physical systems,” January 2013.

[14] R. Rajkumar, I. Lee, L. Sha, and J. Stankovic, “Cyber-physical systems: The next computing revolution,” in Proceedings of the 47th Design Automation Conference, ser. DAC '10. ACM, 2010, pp. 731-736.

[15] K. Koscher, A. Czeskis, F. Roesner, S. Patel, T. Kohno, S. Checkoway, D. McCoy, B. Kantor, D. Anderson, H. Shacham, and S. Savage, “Experimental security analysis of a modern automobile,” in Security and Privacy (SP), 2010 IEEE Symposium on. IEEE, 2010, pp. 447- 462.

122 references, page 1 of 9
Any information missing or wrong?Report an Issue