The concept of cybernetics, microelectronics, design, and process science are all intertwined in CPS. Embedded systems
are often used to describe process control. While a strong connection between the physical and computational aspects is still important
in certain embedded systems, it is less so in those systems as a whole. However, although sharing a fundamental architectural
framework with the Internet of Things (IoT), there is more integration and coordination between CPS's physical and computational
components in IoT. Data security and assurance refers to the protection of an asset, which might be a person, an organisation, or a
system. A system's assets might be material or intangible, but they all have a real worth. Assets for Computer and Communications
Security (CCS) are included in modern CPS, but so are assets produced from the features of CCS. With ever-increasing problems,
integration concerns and limitations in current solutions, such as lack of safety, confidentiality and precision, maintaining a safe CPS
ecosystem is not a simple process. Cryptographic and non-cryptographic methods may both help to reduce this problem.
Keywords
Cyber-Physical System (CPS), Internet of Things (IoT), Computer and Communications Security (CCS)
R. Johari, A. Kaur, M. Hashim, P. K. Rai, and K. Gupta, “SEVA: Secure E-voting application in cyber physical system,” Cyber-phys. syst., vol. 8, no. 1, pp. 1–31, 2022.
K. Takemoto, H. Yokoyama, T. Okuno, A. A. Moe, and G. Lee, “Tilling depth control of compact plowing robot toward Home Gardens,” in 2020 IEEE 9th Global Conference on Consumer Electronics (GCCE), 2020.
Z. Liu et al., “The architectural design and implementation of a digital platform for Industry 4.0 SME collaboration,” Comput. Ind., vol. 138, no. 103623, p. 103623, 2022.
R. Ponzini, R. Da Vià, S. Bnà, C. Cottini, and A. Benassi, “Coupled CFD-DEM model for dry powder inhalers simulation: Validation and sensitivity analysis for the main model parameters,” Powder Technol., vol. 385, pp. 199–226, 2021.
J. Zhang, H. Cho, and P. Mago, “Design and optimization of integrated distributed energy systems for off-grid buildings,” J. Energy Resour. Technol., pp. 1–27, 2021.
J. Gardiner, A. Eiffert, P. Garraghan, N. Race, S. Nagaraja, and A. Rashid, “Controller-in-the-middle: Attacks on software defined networks in industrial control systems,” in Proceedings of the 2th Workshop on CPS&IoT Security and Privacy, 2021.
S. Soloviov, State Research Testing Institute of Problems of Technical Protection of Information, Federal Service on Technical and Export Control of Russia, Y. Yazov, and State Research Testing Institute of Problems of Technical Protection of Information, Federal Service on Technical and Export Control of Russia, “Information support of the activity for technical protection of information,” Vopr. kiberbezopasnosti, no. 1(41), pp. 69–79, 2021.
A. Lamba, “A through analysis on protecting cyber threats and attacks on cps embedded subsystems,” SSRN Electron. J., 2020.
S. Zhou, Y. Hua, X. Dong, Q. Li, and Z. Ren, “Predefined containment control for general linear multiagent systems with time-varying delays and switching topologies: Containment control multiagent systems,” Advanced Control for Applications: Engineering and Industrial Systems, vol. 2, no. 2, p. e26, 2020.
D. J. Brooks, M. Coole, and P. Haskell-Dowland, “Intelligent building systems: security and facility professionals’ understanding of system threats, vulnerabilities and mitigation practice,” Secur. J., vol. 33, no. 2, pp. 244–265, 2020.
M. Younis, O. Farrag, S. Lee, and W. D’Amico, “Optimized packet formation in multi-level security wireless data acquisition networks,” Secur. Commun. Netw., vol. 4, no. 12, pp. 1420–1439, 2011.
V. Agarwal, P. Pareek, and M. Agarwal, “Ultrafast optical message encryption-decryption system using semiconductor optical amplifier based XOR logic gate,” in 2018 International Conference on Numerical Simulation of Optoelectronic Devices (NUSOD), 2018.
U. Maan and Y. Chaba, “Deep Q-network based fog node offloading strategy for 5 G vehicular Adhoc Network,” Ad Hoc Netw., vol. 120, no. 102565, p. 102565, 2021.
K. G. Lyn, L. W. Lerner, C. J. McCarty, and C. D. Patterson, “The trustworthy autonomic interface guardian architecture for cyber-physicalsystems,” in 2015 IEEE International Conference on Computer and InformationTechnology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing, 2015.
R. Ettiane, A. Chaoub, and R. Elkouch, “Toward securing the control plane of 5G mobile networks against DoS threats: Attack scenarios and
promising solutions,” J. Inf. Secur. Appl., vol. 61, no. 102943, p. 102943, 2021.
“Fog computing with IoT device’s data security management using density control weighted election and extensible authentication protocol,”
Int. j. intell. eng. syst., vol. 15, no. 1, 2022.
J. de J. N. Ayón, J. L. G. Sánchez, E. S. B. Cabral, J. S. Castañón, and M. J. R. Roblero, “An independent component analysis approach for
wide-area monitoring of power system disturbances,” Electr. Power Compon. Syst., vol. 48, no. 6–7, pp. 615–627, 2020.
Tamilarasi, R. Gandhi, and Palanisamy, “Privacy preserving partially homomorphic encryption with optimal key generation technique for
VANETs,” Research Square, 2021.
D. Robinson and G. Cybenko, “A cyber-based behavioral model,” J. Def. Model. Simul. Appl. Methodol. Technol., vol. 9, no. 3, pp. 195–203,
2012.
H. Chen, J. A. Clark, S. A. Shaikh, H. Chivers, and P. Nobles, “Optimising IDS Sensor Placement,” in 2010 International Conference on
Availability, Reliability and Security, 2010.
D. P. Et.al, “A novel technique for IDS in distributed data environment using Merkel based security mechanism for secure user allocation,”
Turk. J. Comput. Math. Educ. (TURCOMAT), vol. 12, no. 3, pp. 4284–4297, 2021.
A. Le, J. Loo, A. Lasebae, M. Aiash, and Y. Luo, “6LoWPAN: a study on QoS security threats and countermeasures using intrusion detection
system approach: IOT, 6LOWPAN, RPL, QOS SECURITY THREATS, IDS,” Int. J. Commun. Syst., vol. 25, no. 9, pp. 1189–1212, 2012.
M. Salameh, M. Shayanfar, and M. Barkhordarı̇, “Seismic performance of a hybrid coupled wall system using different coupling beam
arrangements,” Tek. dergi, 2022.
A. Blair, J. Debenham, and J. Edwards, “A comparative study of methodologies for designing IDSSs,” Eur. J. Oper. Res., vol. 103, no. 2, pp.
277–295, 1997.
L. I. Santos et al., “Decision tree and artificial immune systems for stroke prediction in imbalanced data,” Expert Syst. Appl., vol. 191, no.
116221, p. 116221, 2022.
D. S. Vijayakumar and S. Ganapathy, “Show-based logical profound learning demonstrates utilizing ECM fuzzy deduction rules in DDoS
assaults for WLAN 802.11,” in Advances in Intelligent Systems and Computing, Singapore: Springer Singapore, 2021, pp. 189–208.
K. A. Darabkh, M. Al-Akhras, and A. Khalifeh, “Improving routing protocol for low-power and lossy networks over IoT enviroment,” in 2021
30th Wireless and Optical Communications Conference (WOCC), 2021.
E. Kim and G. Cuskelly, “A systematic quantitative review of volunteer management in events,” Event manag., vol. 21, no. 1, pp. 83–100,
2017.
T. A. Tuan, H. V. Long, and D. Taniar, “On detecting and classifying DGA botnets and their families,” Comput. Secur., vol. 113, no. 102549,
p. 102549, 2022.
H. Gethoffer, “Polar plane blockquantization of speech signals using bit-pattern matching techniques,” in ICASSP ’77. IEEE International
Conference on Acoustics, Speech, and Signal Processing, 2005.
Y. Ogasahara, K. Kuribara, K. Oshima, Z. Qin, and T. Sato, “Yield and leakage current of organic thin-film transistor logic gates toward
reliable and low-power operation of large-scale logic circuits for IoT nodes,” Jpn. J. Appl. Phys. (2008), vol. 61, no. SC, p. SC1044, 2022.
S. Stone and M. Temple, “Radio-frequency-based anomaly detection for programmable logic controllers in the critical infrastructure,” Int. J.
Crit. Infrastruct. Prot., vol. 5, no. 2, pp. 66–73, 2012.
“IDS working paper research summary 332: Hybrid activism: Paths of globalisation in the Brazilian environmental movement,” IDS Work.
Pap., vol. 2009, no. 332, pp. i–ii, 2009.
L. E. J. Guterres and A. Ashari, “The analysis of web server security for multiple attacks in the tic Timor ip network,” IJCCS, vol. 14, no. 1, p.
103, 2020.
P. Tripicchio and S. D’Avella, “Welding defect detection with deep learning architectures,” in Welding Principles and Application [Working
Title], IntechOpen, 2022.
Acknowledgements
Author(s) thanks to Dr. Agada Martina for this research completion and Data validation support.
Funding
No funding was received to assist with the preparation of this manuscript.
Ethics declarations
Conflict of interest
The authors have no conflicts of interest to declare that are relevant to the content of this article.
Availability of data and materials
No data available for above study.
Author information
Contributions
All authors have equal contribution in the paper and all authors have read and agreed to the published version of the manuscript.
Open Access This article is licensed under a Creative Commons Attribution NoDerivs is a more restrictive license. It allows you to redistribute the material commercially or non-commercially but the user cannot make any changes whatsoever to the original, i.e. no derivatives of the original work. To view a copy of this license, visit https://creativecommons.org/licenses/by-nc-nd/4.0/
Cite this article
Iheanyi Emeka Ukamaka and Agada Martina, “Threats in Software CPS and Potential Security Solutions”, Journal of Machine and Computing, vol.2, no.2, pp. 053-063, April 2022. doi: 10.53759/7669/jmc202202007.