Abstract

This chapter presents the security and privacy aspects in cyber physical systems. A deep look into the security and privacy aspects and issues in cyber physical systems are also presented in this chapter, which are the primary two challenges faced by cyber physical systems. This chapter also elaborates on the legal, social, and technical issues which may be necessary for cyber physical systems. This chapter provides future researchers with the data if they wanted to research and evolve in this particular sector. The making of cyber physical systems imposed real challenges to the people. Certifying the cyber physical systems information security is the complex problem in wide ranges of protection against cyberattacks. The basic principle related to the cyber physical systems is also explained and analyzed in this chapter. The consequences of attacks against cyber physical systems are noted and analyzed and the upcoming research concepts related to cyber physical systems are also elaborated. Physical security basics and classical information related with cyber physical systems across all the application domains are also elaborated in this chapter. Diverse communication that creates the vulnerabilities is also defined with examples. Privacy and security implications on the cyber physical systems are also an important concern. Various attacks which are to be done by the attacker on the cyber physicals systems are also elaborated. In order to make it simple for the researcher, the chapter also classified the cyber physical systems domain as like security, privacy, attacks, network security, attack defenses, research trends, and computational strategies. The analysis of security problems faced by cyber physical systems at different layers of cyber physical systems architecture, techniques for securing cyber physical systems, and the risk assessment is also presented in this chapter. Cyber physical systems are basically the combination of physical, networking, and computation process. Cyber physical systems mechanism is controlled by computer-based algorithms. The system’s impacts fall on society’s potential and economic growth which is to be developed worldwide. The design making for the security of cyber physical systems must take some common characteristics to relate to that system. There should be proper feedback between the physical and the cyber environment. The proposed framework that helps in the security design of the cyber physical system are also defined. A roadmap is also presented which helps in finding the missing approaches toward that. The main key challenges that are faced during securing the cyber physical systems are also presented: recognizing the assets of cyber physical systems and how they vary from conventional systems, as well as discussing about the many countermeasures available and understanding the concept of threats and their potential effects. The cyber physical system is basically a category of embedded systems. The cyber physical systems interconnect with the real-world systems by communication, computation, and control. The integration of physical units and computational techniques leads to the use of Internet of Things. And the Internet of Things and cyber physical systems are implemented to assist real-time applications. Advancement in cyber physical systems will enable security, protection, scalability, adaptability, capability, usability, and resiliency like that typically provided by today’s embedded systems. In the coming years, smart cyber physical systems could drive competition across the healthcare, transportation, administration, agriculture, energy, architecture, manufacturing, and industry sectors. This will result in an enormous effect on research evolution and in the education area. Medical monitoring, automobile systems, smart grid, industrial control systems, automatic pilot avionics, and robotics systems use the cyber physical systems as their main unit of operations. Cyber physical systems grow exponentially day by day; because of this, new security challenges have also been introduced. There are a number of threats, attacks, and vulnerabilities that are also been recognized for the new generation of cyber physical systems. The widespread use of modern communication and computing technology has led to the widespread adoption of cyber physical systems. These cyber physical systems are rising because of the rising concerns about privacy and security. Passive attacks are done by the attacker to gain confidential information about the cyber physical system. Encryption and k-anonymity are two methods that have been utilized in the past to make cyber physical system data more secure and to avoid such kinds of attacks. There may be improvement opportunities in these privacy methods in view of recent advances in the architectures underlying cyber physical systems. There are also some techniques which have a great response in the cyber physical systems data privacy. A comprehensive different privacy technique in the cyber physical systems is also elaborated. Future research direction along with the security and privacy aspects in cyber physical systems is also explained in this chapter. Data uploading in the modern cyber physical systems is also a big challenge to preserve privacy. In cyber physical systems, more effort is consumed to upload data. Since it requires a lot of power to operate, it runs the risk of excessively broadcasting sensitive information, especially if the user uploads sensitive data. We also detail the abstraction workflow of cyber physical systems, which are composed of the four key parts needed to carry out activities effectively. The primary objective of cyber physical systems is to monitor physical activity patterns and take corrective actions to enhance physical conditions for accurate operation. Cyber physical systems depend on two components: one is cyber systems and the other is physical process. Generally, the cyber system controls the physical process. The cyber system is basically a networked system of various small devices with the capabilities like computing, communication, and sensing. Natural circumstances and man-made systems or the combination of both go in the category of the physical process. As the intercommunication between the cyber system and physical process increases, it may lead to the chances of physical systems becoming more promising to the security-related vulnerabilities in the cyber systems. So, this chapter presents a complete overview and in-depth insight into the security and privacy aspects of the cyber physical systems.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call