Cited time in webofscience Cited time in scopus

Full metadata record

DC Field Value Language
dc.contributor.author Kim, Sangjun -
dc.contributor.author Park, Kyung-Joon -
dc.contributor.author Lu, Chenyang -
dc.date.accessioned 2022-11-01T13:30:09Z -
dc.date.available 2022-11-01T13:30:09Z -
dc.date.created 2022-07-22 -
dc.date.issued 2022-09 -
dc.identifier.issn 1553-877X -
dc.identifier.uri http://hdl.handle.net/20.500.11750/17013 -
dc.description.abstract Cyber-physical systems (CPS) are considered the integration of physical systems in the real world and control software in computing systems. In CPS, the real world and the computing systems are connected through networks with real-time information exchange. The introduction of networking technologies in CPS has substantial advantages in terms of system efficiency, scalability, maintenance, and many more. However, CPS are vulnerable to malicious attackers intruding on the network. The attackers aim to destroy the physical systems with cyber-physical attacks, in which the main objective is to remotely cause malfunctions in physical systems through networks. Therefore, extensive research on cyber-physical security has been conducted to detect cyber-physical attacks and guarantee the stability of the physical systems under cyber-physical attacks. In this survey, we conduct an exhaustive review of the literature on threats to CPS and on resilient CPS design strategies. First, we discuss the structure of CPS, considering physical dynamics, computing systems, and networks. Then, we provide a taxonomy of cyber-physical attacks with three properties (attack space, attack location, and stealthiness). These three attributes represent the requirements for the implementation of cyber-physical attacks. We review existing studies on anomaly-detection strategies against cyber-physical attacks in terms of physics, networks, and machine learning techniques. Moreover, we analyze the impact of typical cyber-physical attacks and the constraints on attack implementations. In particular, for each of the well-established cyber-physical attacks, we present numerical examples that clearly illustrate the time responses of the physical systems with a conventional physics-based anomaly detector. We also review advances in the typical cyber-physical attacks and the detection methods for these attacks. Furthermore, we review resilient CPS designs in the context of control theory, network management, and data-driven technologies. We conclude the survey by identifying future research directions. IEEE -
dc.language English -
dc.publisher Institute of Electrical and Electronics Engineers -
dc.title A Survey on Network Security for Cyber-Physical Systems: From Threats to Resilient Design -
dc.type Article -
dc.identifier.doi 10.1109/COMST.2022.3187531 -
dc.identifier.scopusid 2-s2.0-85133788350 -
dc.identifier.bibliographicCitation IEEE Communications Surveys and Tutorials, v.24, no.3, pp.1534 - 1573 -
dc.description.isOpenAccess FALSE -
dc.subject.keywordAuthor Real-time systems -
dc.subject.keywordAuthor Resilience -
dc.subject.keywordAuthor Security -
dc.subject.keywordAuthor Time factors -
dc.subject.keywordAuthor Tutorials -
dc.subject.keywordAuthor attack detection -
dc.subject.keywordAuthor attack resiliency -
dc.subject.keywordAuthor Control theory -
dc.subject.keywordAuthor cyber-physical attacks -
dc.subject.keywordAuthor cyber-physical security -
dc.subject.keywordAuthor Cyber-physical systems -
dc.subject.keywordAuthor Encryption -
dc.subject.keywordPlus MITIGATION -
dc.subject.keywordPlus STEALTHY SENSOR ATTACK -
dc.subject.keywordPlus INTRUSION DETECTION -
dc.subject.keywordPlus INJECTION ATTACKS -
dc.subject.keywordPlus FAULT-DETECTION -
dc.subject.keywordPlus COMMUNICATION -
dc.subject.keywordPlus SERVICE -
dc.subject.keywordPlus INTERNET -
dc.subject.keywordPlus VULNERABILITY -
dc.subject.keywordPlus CHALLENGES -
dc.citation.endPage 1573 -
dc.citation.number 3 -
dc.citation.startPage 1534 -
dc.citation.title IEEE Communications Surveys and Tutorials -
dc.citation.volume 24 -
Files in This Item:

There are no files associated with this item.

Appears in Collections:
Department of Electrical Engineering and Computer Science CSI(Cyber-Physical Systems Integration) Lab 1. Journal Articles

qrcode

  • twitter
  • facebook
  • mendeley

Items in Repository are protected by copyright, with all rights reserved, unless otherwise indicated.

BROWSE