Open In App

Security of Cyber-Physical System

Pre-requisites: CPS

A cyber-physical system is a combination of closely integrated physical processes, networking, and computation. The physical process is monitored and controlled by embedded (cyber) subsystems via networked systems with a feedback loop to change their behavior when needed, and these subsystems work independently of each other with the ability to interact with the external environment.



CPS Security

The security of the CPS is classified into two areas:

For determining the security of the CPS, Availability comes first, then integrity, confidentiality, and authenticity. For example, if an unauthorized (e.g., malicious) party successfully accessed the system, confidential information will be released, and integrity will not be satisfied since such a party can manipulate information. A security attack happens without a failure incident in the system. Hence, the prime security challenge is the need to consider interactions among CPS components. 



Stages for Securing the CPS Systems

So, we can say that security should be implemented for the entire system as one end-to-end security scheme rather than for only the operating security mechanism at each layer. Each layer of CPS is susceptible to passive or active attacks. So, attacks on CPS could result in severe damage to the physical environment. 

Attacks can happen at the perception layer, for example, including attacks on nodes such as sensors and actuators; transmission layer attacks, including data leakage or damage and security issues during data transmission; and application layer attacks, including unauthorized access leading to a loss of user privacy.

Although each layer is susceptible to different attacks, some attacks could target all layers, and examples of these attacks include denial of service (DoS) attacks, man-in-the-middle (MITM) attacks, eavesdropping attacks, spoofing attacks, replay (playback) attacks, compromised keys, etc.

There are different kinds of risks at each level of the CPS, and based on the CPS architecture, common attacks for each layer can be classified as follows:

Attacks at the Perception Layer

Common attacks at the perception layer include equipment failure, line failure, tampering, sensing information leakage, physical destruction, and energy-exhausted attacks they are:

Attack on the Transmission Layer

An attack occurs in the transmission layer due to the openness of the transmission medium, especially in wireless communication. Such attacks capture a transmitted message through an HTTP audio interface, modify and retransmit it, or exchange information between heterogeneous networks, hence impersonating the legitimate user. 

Attack on the Application Layer

In this layer, large amounts of data are gathered due to data damage, privacy loss (such as user habits and health conditions), and unauthorized access to devices. Common examples of attacks on this include:

Risk Assessment

The CPS risk assessment mode can be divided into three steps, they are i)Defining what will happen to the system; ii) Evaluating the probability of the event; and iii) Estimating the consequences. It has three elements they are: asset (value), threat, and vulnerability identifications.


Article Tags :