2020
DOI: 10.1016/j.micpro.2020.103201
|View full text |Cite
|
Sign up to set email alerts
|

Cyber-physical systems security: Limitations, issues and future trends

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
147
0
1

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 290 publications
(148 citation statements)
references
References 305 publications
0
147
0
1
Order By: Relevance
“…As it has been presented in the previous sections, IBs and their related energy management systems employ communication networks and technologies, very often based on the IoT, which increase the vulnerability of the overall SG. In addition, according to the proposed vision, which considers the SG as a CPSoS, the interconnection between the cyber and physical parts creates additional vulnerabilities that need to be considered [122]. Consequently, attacks can be performed against the cyber, the physical, or the cyber-physical parts of an SG [123].…”
Section: Security Protocols and Privacy Issuesmentioning
confidence: 99%
“…As it has been presented in the previous sections, IBs and their related energy management systems employ communication networks and technologies, very often based on the IoT, which increase the vulnerability of the overall SG. In addition, according to the proposed vision, which considers the SG as a CPSoS, the interconnection between the cyber and physical parts creates additional vulnerabilities that need to be considered [122]. Consequently, attacks can be performed against the cyber, the physical, or the cyber-physical parts of an SG [123].…”
Section: Security Protocols and Privacy Issuesmentioning
confidence: 99%
“…malware intrusion, IP hijacking, denial-of-service attack, flooding attacks, jamming, modification, replay attacks due to the lack of encryption etc. [219][220][221]. The cyber-security is henceforth necessary for the MG cyber system as it collects, shares, process, and stores the control and measurement information.…”
Section: Communication Protocol and Prototypes: Some Basic Communicatmentioning
confidence: 99%
“…malware intrusion, IP hijacking, denial‐of‐service attack, flooding attacks, jamming, modification, replay attacks due to the lack of encryption etc. [219–221]. The cyber‐security is henceforth necessary for the MG cyber system as it collects, shares, process, and stores the control and measurement information.The security of the MG system must fulfil the following requirements: Availability: The MG CPS have a tight coupling between the physical and the communication layer, hence it is important that the system is available and continuous access should be guaranteed to the authorised user timely for making system operational decisions in the event of loss of synchronisation.…”
Section: Mg Communication Structure and Constraintsmentioning
confidence: 99%
“…The interconnecting cyber and physical worlds give rise to new risky security challenges. The smart Internet of Cyber-Physical Things (IoCPT) is easily one of the most versatile technologies in existence [1][2]. IoT devices in smart homes have become increasingly vulnerable to numerous security and privacy threats [3][4][5][6][7].…”
Section: A Background and Motivationmentioning
confidence: 99%