2015
DOI: 10.14257/ijsia.2015.9.3.04
|View full text |Cite
|
Sign up to set email alerts
|

Towards a Framework for Assuring Cyber Physical System Security

Abstract: Today, cyber physical systems (CPS)

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
17
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 34 publications
(17 citation statements)
references
References 87 publications
(80 reference statements)
0
17
0
Order By: Relevance
“…In addition, it is important to consider the evaluation of other aspects of the CPS, such as safety and, particularly, security; different aspects still in the focus of research in the past few years. Therefore, the design of the simulation framework for CPS should consider these aspects at three levels: security objectives, security approaches and security in specific applications [85]. However, the cyber part not only should be secured, but also the physical part should take into account possible threats.…”
Section: Cps-based Co-simulation Frameworkmentioning
confidence: 99%
“…In addition, it is important to consider the evaluation of other aspects of the CPS, such as safety and, particularly, security; different aspects still in the focus of research in the past few years. Therefore, the design of the simulation framework for CPS should consider these aspects at three levels: security objectives, security approaches and security in specific applications [85]. However, the cyber part not only should be secured, but also the physical part should take into account possible threats.…”
Section: Cps-based Co-simulation Frameworkmentioning
confidence: 99%
“…This argumentation can be also followed by consideration that cloud manufacturing systems, cyberphysical systems, and distributed manufacturing systems are facing barriers which prevent adoption by the market. Such barriers are security concerns, perceived complexity, missing use cases, and applicability in practice [18,54]. Managerial consequences to increase the diffusion rate of cloud manufacturing systems, cyberphysical systems, and distributed manufacturing systems should be to consider the six factors of the theory of diffusion in the designing phase of these concepts.…”
Section: Design Of Business Model Innovations Based On Collaborative mentioning
confidence: 99%
“…In [8], common attacks for each layer of ICS have been summarized. In supervisory and management layer, traditional IT attacks and deception (manipulating the right information) and denial of services (DoS) attacks (jamming communication channels to disturb information availability [9]) are common. Attacks can also be instantiated at the physical layer by intentionally altering the setup or configuration of the components of the plant.…”
Section: Introductionmentioning
confidence: 99%