2021
DOI: 10.1109/comst.2021.3081450
|View full text |Cite
|
Sign up to set email alerts
|

Security and Privacy in the Emerging Cyber-Physical World: A Survey

Abstract: With the emergence of low-cost smart and connected IoT devices, the area of cyber-physical security is becoming increasingly important. Past research has demonstrated new threat vectors targeting the transition process between the cyber and physical domains, where the attacker exploits the sensing system as an attack surface for signal injection or extraction of private information. Recently, there have been attempts to characterize an abstracted model for signal injection, but they primarily focus on the path… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
2
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 21 publications
(4 citation statements)
references
References 167 publications
(298 reference statements)
0
2
0
Order By: Relevance
“…In [3], researchers have examined attacks targeting the sensing components from the perspective of cyber-physical interaction. A generalized system model of CPS and an attack model for every attack is developed, providing a new way to understand and motivate effective defenses based on the systemized threat model.…”
Section: Related Workmentioning
confidence: 99%
“…In [3], researchers have examined attacks targeting the sensing components from the perspective of cyber-physical interaction. A generalized system model of CPS and an attack model for every attack is developed, providing a new way to understand and motivate effective defenses based on the systemized threat model.…”
Section: Related Workmentioning
confidence: 99%
“…In the near future, vast number of things connected to the Internet will need an IPv6 address since the IPv4 address space will be effectively consumed [41]. Accordingly, IPv6 addressing is now desirable as it provides 2 128 unique addresses or approximately Presents a detailed review of the security-related challenges and sources of threat in the IoT applications Shapla Khanam et al [20] Presents an overview of IoT, its system architecture, enabling technologies, and discusses security challenges Bin Liao et al [21] Analyzes the security of IoT devices and provides the countermeasures in response to security problems and challenges by using mobile computing Salma et al [22] Presents the challenges of IoT security and the security requirements needed by IoT systems Vishal et al [23] Surveys the security, privacy and trust for Smart Mobile-Internet of Things Ismail et al [24] Presents a review of security attacks towards WSNs and IoT, along with the techniques for prevention, detection, and mitigation of those attacks Pawani et al [25] Surveys the security considerations with 6G enabling technologies Shalitha et al [26] Surveys the exploitation of Network Slicing for Internet of Things in 5G Networks Van-Linh Nguyen et al [27] Surveys the security and privacy issues based on prospective technologies for 6G Dinh C. Nguyen et al [28] Surveys wireless artificial intelligence applications in various data-driven domains Yasmine et al [29] Provides an up-to-date vision of the current research topics related to IoT security and propose a taxonomy of IoT attacks and analyze the security vulnerabilities of IoT at different layers Pasika et al [30] Analyse the security and privacy of the Multi-Access Edge Computing system Zhiyuan Yu et al [31] Surveys the security and privacy problems arising from the interaction of cyber world and physical world, with the context of broad cyber-physical applications Euijong Lee et al [32] Surveys the international standards related to interoperability and security for IoT environments Xing et al [33] Provides an overview of IoT equipment's physical security and safety, antitheft and antivandalism schemes along with circuit and system design, additional sensing devices, biometry and behavior analysis, and tracking methods Arup et al [34] Surveys the security and privacy threats for bluetooth low energy in IoT and wearable devices Lijun et al [35] Analyse various dimensions of trust, dynamic changes of context, privacy preserving, and cross-domain issues Jiani et al [36] Provides general security guidelines for IoT-enabled smart city developments, highlights common security challenges and reviews recent cryptographic security implementations for IoT-enabled smart cities Emilie et al…”
Section: Iot Ecosystemmentioning
confidence: 99%
“…The security of IoT, IIoT, and CPS environments is a very broad field of research, and it is possible to find a myriad of studies. Without going into much detail, we refer the readers to the works of Butun et al [15] and Makhdoom et al [5] for extensive overviews of vulnerabilities, threats, and attacks, the security surveys of Lee et al [16] on IoT standards and Granjal et al [17] on the existing IoT protocols, the study of Neshenko et al [7] for a recent comprehensive IoT security survey, the study of Sikder et al [18] for a survey of threats to IoT sensors, the study of Humayed et al [3] for an extensive survey on the threats, vulnerabilities, attacks, and defense solutions to CPS, the survey of Al-Garadi et al [19] for machine and deep learning techniques for IoT security, the comprehensive survey of Yu et al [10] for CPS security and Cintuglu et al [20] for CPS testbeds. There are also studies like that of Babun et al [21] which develop innovative ways to protect networks with vulnerable IoT devices.…”
Section: Related Workmentioning
confidence: 99%