Corpus ID: 38565163

Security Evaluation of Cyber-Physical Systems in Society- Critical Internet of Things

  title={Security Evaluation of Cyber-Physical Systems in Society- Critical Internet of Things},
  author={V. Izosimov and M. T{\"o}rngren},
  • V. Izosimov, M. Törngren
  • Published 2016
  • Engineering
  • In this paper, we present evaluation of security awareness of developers and users of cyber-physical systems. Our study includes interviews, workshops, surveys and one practical evaluation. We conducted 15 interviews and conducted survey with 55 respondents coming primarily from industry. Furthermore, we performed practical evaluation of current state of practice for a society-critical application, a commercial vehicle, and reconfirmed our findings discussing an attack vector for an off… CONTINUE READING
    1 Citations

    Tables from this paper

    Security Awareness in the Internet of Everything
    • 1
    • PDF


    Designed-in Security for Cyber-Physical Systems
    • 20
    • PDF
    Security analysis for Cyber-Physical Systems against stealthy deception attacks
    • 210
    Cyber–Physical Security of a Smart Grid Infrastructure
    • 804
    • PDF
    Communication security for smart grid distribution networks
    • 154
    • PDF
    Hardware security in practice: Challenges and opportunities
    • N. Potlapally
    • Computer Science
    • 2011 IEEE International Symposium on Hardware-Oriented Security and Trust
    • 2011
    • 20
    Physical layer security in wireless smart grid
    • 27
    Security analysis and enhancements of 3GPP authentication and key agreement protocol
    • 94
    • PDF
    Anti-counterfeiting with hardware intrinsic security
    • V. V. Leest, P. Tuyls
    • Engineering, Computer Science
    • 2013 Design, Automation & Test in Europe Conference & Exhibition (DATE)
    • 2013
    • 32
    • PDF
    Coordinated data-injection attack and detection in the smart grid: A detailed look at enriching detection solutions
    • 174
    Modeling and characterization of GPS spoofing
    • Jonathan A. Larcom, H. Liu
    • Computer Science
    • 2013 IEEE International Conference on Technologies for Homeland Security (HST)
    • 2013
    • 35