Security Research and Challenges in Cyber-Physical Systems

A special issue of Applied Sciences (ISSN 2076-3417). This special issue belongs to the section "Computing and Artificial Intelligence".

Deadline for manuscript submissions: closed (10 October 2022) | Viewed by 4157

Special Issue Editors


E-Mail Website
Guest Editor
Department of Information Management, Dongguk University, Gyeongju-si, Gyeongsangbuk-do 38066, Korea
Interests: CPS; security; privacy; IoT; blockchain

E-Mail Website
Guest Editor
Department of Aviations Information & Communication Engineering, Kyungwoon University, Gumi-si, Gyeongsangbuk-do 39160, Korea
Interests: CPS; semiconductor; IoT; microprocessor

E-Mail Website
Guest Editor
Department of Multimedia Science, Chungwoon University, Michuhol-gu, Incheon-si 22100, Korea
Interests: CPS; security; privacy; IoT; blockchain

Special Issue Information

Dear Colleagues,

With the recent widespread increase in new hardware and software configurations that create smart and autonomous devices, cyber-physical systems (CPSs) are shifting the way we interact with the physical world. These CPSs are systems that connect computing and communication aspects in cyberspace and actively and autonomously perform cognition, judgment, and behavior.

In general, CPSs refer to computer-based components and systems that closely connect and utilize the real world and the digital models of the cyber world based on open services that access and process information through networks such as the Internet of Things (IoT).

These CPS applications can provide important services in various application areas such as manufacturing, medicine, energy management, traffic control, industrial measurement and monitoring, environmental and process control, etc. The performance of a CPS’ internal functions and processes depends heavily on the design and optimization of intelligent models and security algorithms. As such, CPSs are an important part of the economic and social processes of everyday life, which can increase concerns about cybersecurity and the safety aspects of the entire system.

Unintended malicious threats to CPSs can have a significant impact on the lifestyle of the environment in which we interact with the physical world. Therefore, it is very important to ensure the security of CPSs and related support systems. In addition, resilient services in CPSs are vital to provide an acceptable level of operational normality, such as state recognition, disability recognition, and response.

In the future, it will be necessary to design security algorithms and architectures to prevent data threats to CPS systems in the industrial Internet (IIoT) environment and to establish cybersecurity measures with innovative ideas and methods.

Meanwhile, a learning model that predicts and identifies future CPS security threats by reflecting recent advances in artificial intelligence and machine learning can be used to identify the malicious behavior of intruders and other cyber threats. In addition, technologies such as blockchain and cloud computing can contribute to effectively protecting cybersecurity in CPS systems.

This Special Issue of "Security Research and Challenges in Cyber-Physical Systems" publishes high-quality research papers, including discussing and reviewing various challenges and opportunities for implementing next-generation cybersecurity in CPS. This Special Issue targets academic and industrial researchers, engineers, and practitioners interested in intelligent models of CPS systems, cybersecurity and resilience issues. In addition, as a way to enhance security without compromising system availability, which is important for all CPS security issues, we would like to address, in depth, how to use artificial intelligence (AI) and the recent application of blockchain technology. This Special Issue provides new ideologies, methodologies, and solutions for addressing these challenges.

The Special Issue will select papers related to the following topics but will not be limited to these:

  • Data security in a cyber-physical system;
  • Service resilience in a cyber-physical system;
  • Intelligent models in a cyber-physical system;
  • Artificial intelligence for enhancing cybersecurity in CPSs;
  • Machine learning for cybersecurity and privacy protection in a CPS;
  • Advanced secure data analytics for CPSs;
  • Threat detection and reliable computing in a CPS;
  • Advances in anomaly detection and resiliency for CPSs;
  • Industrial CPSs and their transmission security;
  • Blockchain and distributed ledger technology for enhancing security in CPSs;
  • Enhancing cybersecurity for CPSs: a blockchain perspective;
  • Advanced security measures for protecting sensitive details in CPSs;
  • Recent developments in cybersecurity techniques for CPSs;
  • Case studies: cybersecurity and intelligent models for CPSs;
  • Security model of digital twin based on CPSs.

Dr. You-Jin Song
Prof. Dr. Howoon Kim
Dr. Hyun-Jong Cha

Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Applied Sciences is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • cyber-physical systems
  • industrial CPS
  • intelligent cyber-physical system models
  • data security
  • service resilience
  • machine learning and deep learning
  • blockchain
  • threat detection and reliability

Published Papers (2 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

21 pages, 12844 KiB  
Article
A Harmonized Information Security Taxonomy for Cyber Physical Systems
by Johannes Hendrik Pool and Hein Venter
Appl. Sci. 2022, 12(16), 8080; https://0-doi-org.brum.beds.ac.uk/10.3390/app12168080 - 12 Aug 2022
Cited by 1 | Viewed by 1634
Abstract
Cyber physical systems (CPSs) are found in many aspects of daily life, and they control and protect energy production, manufacturing and even healthcare. Due to long lifecycles and the use of legacy technologies, its associated security comes with many challenges. Security taxonomies are [...] Read more.
Cyber physical systems (CPSs) are found in many aspects of daily life, and they control and protect energy production, manufacturing and even healthcare. Due to long lifecycles and the use of legacy technologies, its associated security comes with many challenges. Security taxonomies are useful to classify and communicate security-related information and elements. Despite the existence of numerous taxonomies, they are fragmentary, limited to only specific lifecycle phases or cover only specific aspects. A harmonized taxonomy must be applicable to all lifecycle phases of the CPS. This paper presents well-established taxonomies that are combined into a single comprehensive and harmonized taxonomy and allows application throughout the different lifecycle phases. Application of the taxonomy to real-world scenarios requires a consistent implementation methodology. The use of the harmonized taxonomy methodology is demonstrated by applying it to an actual incident case study. The taxonomy is used to identify information security gaps through its implementation in the industrial facility in question. The identified gaps are then addressed as part of the security lifecycle of the CPS. The harmonized taxonomy can be expanded to apply it to industries with specific requirements. Full article
(This article belongs to the Special Issue Security Research and Challenges in Cyber-Physical Systems)
Show Figures

Figure 1

21 pages, 2351 KiB  
Article
A Study on Vehicle Monitoring Service Using Attribute-Based Security Scheme in Cyber–Physical Systems
by Hyun-Jong Cha, Ho-Kyung Yang and You-Jin Song
Appl. Sci. 2022, 12(9), 4300; https://0-doi-org.brum.beds.ac.uk/10.3390/app12094300 - 24 Apr 2022
Cited by 2 | Viewed by 1395
Abstract
Cyber–physical systems (CPSs) is a manufacturing infrastructure that requires high reliability real-time automatic control characteristics. It is widely used in industrial fields such as production and transportation. An example is a future transportation network system that controls information such as sensors and actuators [...] Read more.
Cyber–physical systems (CPSs) is a manufacturing infrastructure that requires high reliability real-time automatic control characteristics. It is widely used in industrial fields such as production and transportation. An example is a future transportation network system that controls information such as sensors and actuators based on a network. However, CPSs are susceptible to cyberattacks as network-based interconnections increase. Data handled between a car and a fog server can put personal privacy at risk, so it is essential to introduce security technologies such as encryption. A login/password method is required to satisfy the demand for secure sharing and utilization by service users. Based on the attributes of these target service users, the authority to decrypt data is delegated to legitimate users, and a pull-in encryption method is required. In this paper, we propose a method to safely protect the system from attacks through the method of managing attribute-based delegation of authority. Using a semantic security model, the proposed system is proven safe against public attacks by malicious users, and it can be used to protect against attacks on a smart car. Full article
(This article belongs to the Special Issue Security Research and Challenges in Cyber-Physical Systems)
Show Figures

Figure 1

Back to TopTop