2021
DOI: 10.1002/smr.2346
|View full text |Cite
|
Sign up to set email alerts
|

Security risks in cyber physical systems—A systematic mapping study

Abstract: The increased need for constant connectivity and complete automation of existing systems fuels the popularity of Cyber Physical Systems (CPS) worldwide. Increasingly more, these systems are subjected to cyber attacks. In recent years, many major cyber‐attack incidents on CPS have been recorded and, in turn, have been raising concerns in their users' minds. Unlike in traditional IT systems, the complex architecture of CPS consisting of embedded systems integrated with the Internet of Things (IoT) requires rathe… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(6 citation statements)
references
References 130 publications
(201 reference statements)
0
3
0
Order By: Relevance
“…The emergence of CPSs presents new challenges against cyberattack risks and threats. Ensuring data protection against security risks and cyberattacks is one of the most complex issues within the CPS environment [16], [17]. Such cyberattacks include denial of service (DoS), Trojans, worms, and buffer overflow.…”
Section: A Risks and Threatsmentioning
confidence: 99%
“…The emergence of CPSs presents new challenges against cyberattack risks and threats. Ensuring data protection against security risks and cyberattacks is one of the most complex issues within the CPS environment [16], [17]. Such cyberattacks include denial of service (DoS), Trojans, worms, and buffer overflow.…”
Section: A Risks and Threatsmentioning
confidence: 99%
“…Alternatively, we can implicitly document context information as constraints in logic formulae. However, to leverage the inherent ability of model-based development to overcome challenges due to the inherent complexity of CPS, 29,81,82 we propose a documentation format employing graphical models in the following. For each context perspective, we propose an example list of model elements motivated by our explanations from Section 3 along with a brief description and visual notational element.…”
Section: Notation and Examplesmentioning
confidence: 99%
“…On one hand, Security-by-Design can be realised by effective cybersecurity standards and risk assessment methodologies in the automotive industry. Different from the traditional Information Technology systems, it is necessary to consider a suitable approach to planning, implementation and monitoring cyber security due to the high complexity level in the design of connected vehicles [20]. ISO/SAE 21434 [10] is a standard that provides a framework for the development and implementation of cybersecurity measures in road vehicles, while Threat and Risk Assessment (TARA) is a methodology for identifying and assessing potential cybersecurity risks in connected and autonomous vehicles.…”
Section: Introductionmentioning
confidence: 99%