Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Kim, Sangjun | - |
dc.contributor.author | Park, Kyung-Joon | - |
dc.contributor.author | Lu, Chenyang | - |
dc.date.accessioned | 2022-11-01T13:30:09Z | - |
dc.date.available | 2022-11-01T13:30:09Z | - |
dc.date.created | 2022-07-22 | - |
dc.date.issued | 2022-09 | - |
dc.identifier.issn | 1553-877X | - |
dc.identifier.uri | http://hdl.handle.net/20.500.11750/17013 | - |
dc.description.abstract | Cyber-physical systems (CPS) are considered the integration of physical systems in the real world and control software in computing systems. In CPS, the real world and the computing systems are connected through networks with real-time information exchange. The introduction of networking technologies in CPS has substantial advantages in terms of system efficiency, scalability, maintenance, and many more. However, CPS are vulnerable to malicious attackers intruding on the network. The attackers aim to destroy the physical systems with cyber-physical attacks, in which the main objective is to remotely cause malfunctions in physical systems through networks. Therefore, extensive research on cyber-physical security has been conducted to detect cyber-physical attacks and guarantee the stability of the physical systems under cyber-physical attacks. In this survey, we conduct an exhaustive review of the literature on threats to CPS and on resilient CPS design strategies. First, we discuss the structure of CPS, considering physical dynamics, computing systems, and networks. Then, we provide a taxonomy of cyber-physical attacks with three properties (attack space, attack location, and stealthiness). These three attributes represent the requirements for the implementation of cyber-physical attacks. We review existing studies on anomaly-detection strategies against cyber-physical attacks in terms of physics, networks, and machine learning techniques. Moreover, we analyze the impact of typical cyber-physical attacks and the constraints on attack implementations. In particular, for each of the well-established cyber-physical attacks, we present numerical examples that clearly illustrate the time responses of the physical systems with a conventional physics-based anomaly detector. We also review advances in the typical cyber-physical attacks and the detection methods for these attacks. Furthermore, we review resilient CPS designs in the context of control theory, network management, and data-driven technologies. We conclude the survey by identifying future research directions. IEEE | - |
dc.language | English | - |
dc.publisher | Institute of Electrical and Electronics Engineers | - |
dc.title | A Survey on Network Security for Cyber-Physical Systems: From Threats to Resilient Design | - |
dc.type | Article | - |
dc.identifier.doi | 10.1109/COMST.2022.3187531 | - |
dc.identifier.scopusid | 2-s2.0-85133788350 | - |
dc.identifier.bibliographicCitation | IEEE Communications Surveys and Tutorials, v.24, no.3, pp.1534 - 1573 | - |
dc.description.isOpenAccess | FALSE | - |
dc.subject.keywordAuthor | Real-time systems | - |
dc.subject.keywordAuthor | Resilience | - |
dc.subject.keywordAuthor | Security | - |
dc.subject.keywordAuthor | Time factors | - |
dc.subject.keywordAuthor | Tutorials | - |
dc.subject.keywordAuthor | attack detection | - |
dc.subject.keywordAuthor | attack resiliency | - |
dc.subject.keywordAuthor | Control theory | - |
dc.subject.keywordAuthor | cyber-physical attacks | - |
dc.subject.keywordAuthor | cyber-physical security | - |
dc.subject.keywordAuthor | Cyber-physical systems | - |
dc.subject.keywordAuthor | Encryption | - |
dc.subject.keywordPlus | MITIGATION | - |
dc.subject.keywordPlus | STEALTHY SENSOR ATTACK | - |
dc.subject.keywordPlus | INTRUSION DETECTION | - |
dc.subject.keywordPlus | INJECTION ATTACKS | - |
dc.subject.keywordPlus | FAULT-DETECTION | - |
dc.subject.keywordPlus | COMMUNICATION | - |
dc.subject.keywordPlus | SERVICE | - |
dc.subject.keywordPlus | INTERNET | - |
dc.subject.keywordPlus | VULNERABILITY | - |
dc.subject.keywordPlus | CHALLENGES | - |
dc.citation.endPage | 1573 | - |
dc.citation.number | 3 | - |
dc.citation.startPage | 1534 | - |
dc.citation.title | IEEE Communications Surveys and Tutorials | - |
dc.citation.volume | 24 | - |
There are no files associated with this item.