Journal of Machine and Computing


Threats in Software CPS and Potential Security Solutions



Journal of Machine and Computing

Received On : 25 December 2021

Revised On : 15 February 2022

Accepted On : 03 March 2022

Published On : 05 April 2022

Volume 02, Issue 02

Pages : 053-063


Abstract


The concept of cybernetics, microelectronics, design, and process science are all intertwined in CPS. Embedded systems are often used to describe process control. While a strong connection between the physical and computational aspects is still important in certain embedded systems, it is less so in those systems as a whole. However, although sharing a fundamental architectural framework with the Internet of Things (IoT), there is more integration and coordination between CPS's physical and computational components in IoT. Data security and assurance refers to the protection of an asset, which might be a person, an organisation, or a system. A system's assets might be material or intangible, but they all have a real worth. Assets for Computer and Communications Security (CCS) are included in modern CPS, but so are assets produced from the features of CCS. With ever-increasing problems, integration concerns and limitations in current solutions, such as lack of safety, confidentiality and precision, maintaining a safe CPS ecosystem is not a simple process. Cryptographic and non-cryptographic methods may both help to reduce this problem.


Keywords


Cyber-Physical System (CPS), Internet of Things (IoT), Computer and Communications Security (CCS)


  1. R. Johari, A. Kaur, M. Hashim, P. K. Rai, and K. Gupta, “SEVA: Secure E-voting application in cyber physical system,” Cyber-phys. syst., vol. 8, no. 1, pp. 1–31, 2022.
  2. K. Takemoto, H. Yokoyama, T. Okuno, A. A. Moe, and G. Lee, “Tilling depth control of compact plowing robot toward Home Gardens,” in 2020 IEEE 9th Global Conference on Consumer Electronics (GCCE), 2020.
  3. Z. Liu et al., “The architectural design and implementation of a digital platform for Industry 4.0 SME collaboration,” Comput. Ind., vol. 138, no. 103623, p. 103623, 2022.
  4. R. Ponzini, R. Da Vià, S. Bnà, C. Cottini, and A. Benassi, “Coupled CFD-DEM model for dry powder inhalers simulation: Validation and sensitivity analysis for the main model parameters,” Powder Technol., vol. 385, pp. 199–226, 2021.
  5. J. Zhang, H. Cho, and P. Mago, “Design and optimization of integrated distributed energy systems for off-grid buildings,” J. Energy Resour. Technol., pp. 1–27, 2021.
  6. J. Gardiner, A. Eiffert, P. Garraghan, N. Race, S. Nagaraja, and A. Rashid, “Controller-in-the-middle: Attacks on software defined networks in industrial control systems,” in Proceedings of the 2th Workshop on CPS&IoT Security and Privacy, 2021.
  7. S. Soloviov, State Research Testing Institute of Problems of Technical Protection of Information, Federal Service on Technical and Export Control of Russia, Y. Yazov, and State Research Testing Institute of Problems of Technical Protection of Information, Federal Service on Technical and Export Control of Russia, “Information support of the activity for technical protection of information,” Vopr. kiberbezopasnosti, no. 1(41), pp. 69–79, 2021.
  8. A. Lamba, “A through analysis on protecting cyber threats and attacks on cps embedded subsystems,” SSRN Electron. J., 2020.
  9. S. Zhou, Y. Hua, X. Dong, Q. Li, and Z. Ren, “Predefined containment control for general linear multiagent systems with time-varying delays and switching topologies: Containment control multiagent systems,” Advanced Control for Applications: Engineering and Industrial Systems, vol. 2, no. 2, p. e26, 2020.
  10. D. J. Brooks, M. Coole, and P. Haskell-Dowland, “Intelligent building systems: security and facility professionals’ understanding of system threats, vulnerabilities and mitigation practice,” Secur. J., vol. 33, no. 2, pp. 244–265, 2020.
  11. M. Younis, O. Farrag, S. Lee, and W. D’Amico, “Optimized packet formation in multi-level security wireless data acquisition networks,” Secur. Commun. Netw., vol. 4, no. 12, pp. 1420–1439, 2011.
  12. V. Agarwal, P. Pareek, and M. Agarwal, “Ultrafast optical message encryption-decryption system using semiconductor optical amplifier based XOR logic gate,” in 2018 International Conference on Numerical Simulation of Optoelectronic Devices (NUSOD), 2018.
  13. U. Maan and Y. Chaba, “Deep Q-network based fog node offloading strategy for 5 G vehicular Adhoc Network,” Ad Hoc Netw., vol. 120, no. 102565, p. 102565, 2021.
  14. K. G. Lyn, L. W. Lerner, C. J. McCarty, and C. D. Patterson, “The trustworthy autonomic interface guardian architecture for cyber-physicalsystems,” in 2015 IEEE International Conference on Computer and InformationTechnology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing, 2015.
  15. R. Ettiane, A. Chaoub, and R. Elkouch, “Toward securing the control plane of 5G mobile networks against DoS threats: Attack scenarios and promising solutions,” J. Inf. Secur. Appl., vol. 61, no. 102943, p. 102943, 2021.
  16. “Fog computing with IoT device’s data security management using density control weighted election and extensible authentication protocol,” Int. j. intell. eng. syst., vol. 15, no. 1, 2022.
  17. J. de J. N. Ayón, J. L. G. Sánchez, E. S. B. Cabral, J. S. Castañón, and M. J. R. Roblero, “An independent component analysis approach for wide-area monitoring of power system disturbances,” Electr. Power Compon. Syst., vol. 48, no. 6–7, pp. 615–627, 2020.
  18. Tamilarasi, R. Gandhi, and Palanisamy, “Privacy preserving partially homomorphic encryption with optimal key generation technique for VANETs,” Research Square, 2021.
  19. D. Robinson and G. Cybenko, “A cyber-based behavioral model,” J. Def. Model. Simul. Appl. Methodol. Technol., vol. 9, no. 3, pp. 195–203, 2012.
  20. H. Chen, J. A. Clark, S. A. Shaikh, H. Chivers, and P. Nobles, “Optimising IDS Sensor Placement,” in 2010 International Conference on Availability, Reliability and Security, 2010.
  21. D. P. Et.al, “A novel technique for IDS in distributed data environment using Merkel based security mechanism for secure user allocation,” Turk. J. Comput. Math. Educ. (TURCOMAT), vol. 12, no. 3, pp. 4284–4297, 2021.
  22. A. Le, J. Loo, A. Lasebae, M. Aiash, and Y. Luo, “6LoWPAN: a study on QoS security threats and countermeasures using intrusion detection system approach: IOT, 6LOWPAN, RPL, QOS SECURITY THREATS, IDS,” Int. J. Commun. Syst., vol. 25, no. 9, pp. 1189–1212, 2012.
  23. M. Salameh, M. Shayanfar, and M. Barkhordarı̇, “Seismic performance of a hybrid coupled wall system using different coupling beam arrangements,” Tek. dergi, 2022.
  24. A. Blair, J. Debenham, and J. Edwards, “A comparative study of methodologies for designing IDSSs,” Eur. J. Oper. Res., vol. 103, no. 2, pp. 277–295, 1997.
  25. L. I. Santos et al., “Decision tree and artificial immune systems for stroke prediction in imbalanced data,” Expert Syst. Appl., vol. 191, no. 116221, p. 116221, 2022.
  26. D. S. Vijayakumar and S. Ganapathy, “Show-based logical profound learning demonstrates utilizing ECM fuzzy deduction rules in DDoS assaults for WLAN 802.11,” in Advances in Intelligent Systems and Computing, Singapore: Springer Singapore, 2021, pp. 189–208.
  27. K. A. Darabkh, M. Al-Akhras, and A. Khalifeh, “Improving routing protocol for low-power and lossy networks over IoT enviroment,” in 2021 30th Wireless and Optical Communications Conference (WOCC), 2021.
  28. E. Kim and G. Cuskelly, “A systematic quantitative review of volunteer management in events,” Event manag., vol. 21, no. 1, pp. 83–100, 2017.
  29. T. A. Tuan, H. V. Long, and D. Taniar, “On detecting and classifying DGA botnets and their families,” Comput. Secur., vol. 113, no. 102549, p. 102549, 2022.
  30. H. Gethoffer, “Polar plane blockquantization of speech signals using bit-pattern matching techniques,” in ICASSP ’77. IEEE International Conference on Acoustics, Speech, and Signal Processing, 2005.
  31. Y. Ogasahara, K. Kuribara, K. Oshima, Z. Qin, and T. Sato, “Yield and leakage current of organic thin-film transistor logic gates toward reliable and low-power operation of large-scale logic circuits for IoT nodes,” Jpn. J. Appl. Phys. (2008), vol. 61, no. SC, p. SC1044, 2022.
  32. S. Stone and M. Temple, “Radio-frequency-based anomaly detection for programmable logic controllers in the critical infrastructure,” Int. J. Crit. Infrastruct. Prot., vol. 5, no. 2, pp. 66–73, 2012.
  33. “IDS working paper research summary 332: Hybrid activism: Paths of globalisation in the Brazilian environmental movement,” IDS Work. Pap., vol. 2009, no. 332, pp. i–ii, 2009.
  34. L. E. J. Guterres and A. Ashari, “The analysis of web server security for multiple attacks in the tic Timor ip network,” IJCCS, vol. 14, no. 1, p. 103, 2020.
  35. P. Tripicchio and S. D’Avella, “Welding defect detection with deep learning architectures,” in Welding Principles and Application [Working Title], IntechOpen, 2022.

Acknowledgements


Author(s) thanks to Dr. Agada Martina for this research completion and Data validation support.


Funding


No funding was received to assist with the preparation of this manuscript.


Ethics declarations


Conflict of interest

The authors have no conflicts of interest to declare that are relevant to the content of this article.


Availability of data and materials


No data available for above study.


Author information


Contributions

All authors have equal contribution in the paper and all authors have read and agreed to the published version of the manuscript.


Corresponding author


Rights and permissions


Open Access This article is licensed under a Creative Commons Attribution NoDerivs is a more restrictive license. It allows you to redistribute the material commercially or non-commercially but the user cannot make any changes whatsoever to the original, i.e. no derivatives of the original work. To view a copy of this license, visit https://creativecommons.org/licenses/by-nc-nd/4.0/


Cite this article


Iheanyi Emeka Ukamaka and Agada Martina, “Threats in Software CPS and Potential Security Solutions”, Journal of Machine and Computing, vol.2, no.2, pp. 053-063, April 2022. doi: 10.53759/7669/jmc202202007.


Copyright


© 2022 Iheanyi Emeka Ukamaka and Agada Martina. This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.