Corpus ID: 38565163

Security Evaluation of Cyber-Physical Systems in Society- Critical Internet of Things

@inproceedings{Izosimov2016SecurityEO,
  title={Security Evaluation of Cyber-Physical Systems in Society- Critical Internet of Things},
  author={Viacheslav Izosimov and Martin T{\"o}rngren},
  year={2016}
}
In this paper, we present evaluation of security awareness of developers and users of cyber-physical systems. Our study includes interviews, workshops, surveys and one practical evaluation. We conducted 15 interviews and conducted survey with 55 respondents coming primarily from industry. Furthermore, we performed practical evaluation of current state of practice for a society-critical application, a commercial vehicle, and reconfirmed our findings discussing an attack vector for an off… Expand
1 Citations

Tables from this paper

Security Awareness in the Internet of Everything
TLDR
This chapter advocates that security awareness of users and developers is the foundation to deployment of interconnected system of systems, and provides recommendations for steps forward highlighting the roles of people, organizations and authorities. Expand

References

SHOWING 1-10 OF 24 REFERENCES
Designed-in Security for Cyber-Physical Systems
An expert from academia, one from a cyber-physical system (CPS) provider, and one from an end asset owner and user offer their different perspectives on the meaning and challenges of "designed-inExpand
Security analysis for Cyber-Physical Systems against stealthy deception attacks
TLDR
This paper investigates three kinds of stealthy deception attacks according to the attacker's ability to compromise the system, and derives the necessary and sufficient conditions under which the attacker could perform each kind of attack without being detected. Expand
Cyber–Physical Security of a Smart Grid Infrastructure
TLDR
It is argued that the “smart” grid, replacing its incredibly successful and reliable predecessor, poses a series of new security challenges, among others, that require novel approaches to the field of cyber security. Expand
Communication security for smart grid distribution networks
TLDR
This article targets the network security of the advanced metering infrastructure coupled with the data communication toward the transmission infrastructure, and discusses the security and feasibility aspects of possible communication mechanisms that could be adopted on that subpart of the grid. Expand
Hardware security in practice: Challenges and opportunities
  • N. Potlapally
  • Computer Science
  • 2011 IEEE International Symposium on Hardware-Oriented Security and Trust
  • 2011
TLDR
This paper exemplifies the challenges in correctly implementing security in commercial hardware platforms through representative examples of various classes of hardware-oriented security attacks, presents an overview of methods adopted to deal with the complexity of validating security of hardware in an industrial setting, and enumerates opportunities present for the security research community to contribute to hardware security validation. Expand
Physical layer security in wireless smart grid
TLDR
A general overview of the physical layer security in wireless smart grid is presented and the effective countermeasures proposed in the literature of smart grid to date are covered. Expand
Security analysis and enhancements of 3GPP authentication and key agreement protocol
This paper analyzes the authentication and key agreement protocol adopted by Universal Mobile Telecommunication System (UMTS), an emerging standard for third-generation (3G) wireless communications.Expand
Anti-counterfeiting with hardware intrinsic security
  • V. V. Leest, P. Tuyls
  • Engineering, Computer Science
  • 2013 Design, Automation & Test in Europe Conference & Exhibition (DATE)
  • 2013
TLDR
This paper shows how Hardware Intrinsic Security (HIS) can be used to prevent various forms of counterfeiting and over-production and provides an extensive overview of the results (both scientific and industrial) that IntRinsic-ID has achieved studying and implementing HIS. Expand
Coordinated data-injection attack and detection in the smart grid: A detailed look at enriching detection solutions
TLDR
The coordinated datainjection attack detection problem in the smart grid is considered and the data-injection attack model is first introduced and a thorough survey of existing detection methods is given. Expand
Modeling and characterization of GPS spoofing
TLDR
A novel attack modeling of GPS spoofing with event-driven simulation package is proposed that accelerates the development of defense technology against GPS-based attacks. Expand
...
1
2
3
...