Journal of Computing and Natural Science


A Review of CPS Design and Vulnerability Analysis



Journal of Computing and Natural Science

Received On : 16 January 2022

Revised On : 10 April 2022

Accepted On : 05 May 2022

Published On : 05 July 2022

Volume 02, Issue 03

Pages : 110-119


Abstract


Cyber-Physical Systems (CPS) offer a wide array of applications. Integration of various heterogeneous infrastructures that generate data for intelligent analysis is discussed. The objective of this article is to review CPS and provide a discussion of the system's security flaws. Many earlier investigations have also been properly explained. Because of the increasing usage of CPS in sensitive organizations (e.g., healthcare and connected homes), the requirement for a risk assessment strategy is essential. The major concentration of risk evaluation has shifted from computer risk evaluation to network-based risk analysis as a result of our substantial dependence on the Internet. The goal of CPS vulnerability analysis is to develop a quantitative model for future system protection.


Keywords


Cyber-Physical Systems (CPS), Denial of Service (DoS), Radio Frequency Identification (RFID)


  1. G. Koutitas, "Control of Flexible Smart Devices in the Smart Grid", IEEE Transactions on Smart Grid, vol. 3, no. 3, pp. 1333-1343, 2012. Doi: 10.1109/tsg.2012.2204410.
  2. S. Shackelford, "Toward Cyber Peace: Managing Cyber Attacks Through Polycentric Governance", SSRN Electronic Journal, 2012. Doi: 10.2139/ssrn.2132526.
  3. M. Čepin, "Evaluation of the power system reliability if a nuclear power plant is replaced with wind power plants", Reliability Engineering & System Safety, vol. 185, pp. 455-464, 2019. Doi: 10.1016/j.ress.2019.01.010.
  4. H. Sugiyama, "Pulsed power network with potential gradient method for scalable power grid based on distributed generations", IET Smart Grid, vol. 3, no. 6, pp. 906-913, 2020. Doi: 10.1049/iet-stg.2019.0245.
  5. J. Taft, "Grid Architecture: A Core Discipline for Grid Modernization", IEEE Power and Energy Magazine, vol. 17, no. 5, pp. 18-28, 2019. Doi: 10.1109/mpe.2019.2921739.
  6. J. Geng, X. Sun, F. Li and X. Wu, "Prediction method of important nodes and transmission lines in power system transactive management", Electric Power Systems Research, vol. 208, p. 107898, 2022. Doi: 10.1016/j.epsr.2022.107898.
  7. M. Shafiee Kamalabad and M. Grzegorczyk, "Improving nonhomogeneous dynamic Bayesian networks with sequentially coupled parameters", Statistica Neerlandica, vol. 72, no. 3, pp. 281-305, 2018. Doi: 10.1111/stan.12136.
  8. F. Nian, S. Ren and Z. Dang, "The propagation-weighted priority immunization strategy based on propagation tree", Chaos, Solitons & Fractals, vol. 99, pp. 72-78, 2017. Doi: 10.1016/j.chaos.2017.03.049.
  9. R. Wu, B. Zhang, H. Wu and X. Yang, "Cascading Failure Model of Interdependent Power Networks Based on Load Redistribution", Applied Mechanics and Materials, vol. 602-605, pp. 2995-3000, 2014. Doi: 10.4028/www.scientific.net/amm.602-605.2995.
  10. "The Model of Electric Connection of a Low-Conducting Liquid in High-Frequency Electric Field", Прикладная механика и техническая физика, no. 2, 2018. Doi: 10.15372/pmtf20180202.
  11. P. Sudheendra and D. Krishnamurthy, "Novel Promising Algorithm to suppress Spoof Attack by Cryptography Firewall2014", International Journal of Trend in Scientific Research and Development, vol. -2, no. -5, pp. 102-109, 2018. Doi: 10.31142/ijtsrd15801.
  12. A. Naseri, W. Lucia and A. Youssef, "Confidentiality attacks against encrypted control systems", Cyber-Physical Systems, pp. 1-20, 2022. Doi: 10.1080/23335777.2022.2051209.
  13. T. Sakurai, "Trillion-node engine: open-innovation IoT/CPS platform—pioneering future of IoT/CPS for everyone, by everyone", Japanese Journal of Applied Physics, vol. 59, no., p. SG0804, 2020. Doi: 10.35848/1347-4065/ab7412.
  14. S. Stall, "Enabling Findable, Accessible, Interoperable, and Reusable Data", Eos, vol. 98, 2017. Doi: 10.1029/2018eo081907
  15. X. Cheng, D. Du, L. Wang and B. Xu, "Relay sensor placement in wireless sensor networks", Wireless Networks, vol. 14, no. 3, pp. 347-355, 2007. Doi: 10.1007/s11276-006-0724-8.
  16. V. Danos and T. Ehrhard, "Probabilistic coherence spaces as a model of higher-order probabilistic computation", Information and Computation, vol. 209, no. 6, pp. 966-991, 2011. Doi: 10.1016/j.ic.2011.02.001.
  17. S. Zhang, J. Li, X. Chen and L. Fan, "Building network attack graph for alert causal correlation", Computers & Security, vol. 27, no. 5-6, pp. 188-196, 2008. Doi: 10.1016/j.cose.2008.05.005.
  18. P. Jadhav, "Cloud Unified Threat Management System", International Journal for Research in Applied Science and Engineering Technology, vol. 6, no. 4, pp. 1712-1715, 2018. Doi: 10.22214/ijraset.2018.4288.
  19. X. Liu, "A network attack path prediction method using attack graph", Journal of Ambient Intelligence and Humanized Computing, 2020. Doi: 10.1007/s12652-020-02206-5.
  20. D. Sun, H. Zhao and S. Cheng, "A novel membership cloud model-based trust evaluation model for vehicular ad hoc network of T-CPS", Security and Communication Networks, vol. 9, no. 18, pp. 5710-5723, 2016. Doi: 10.1002/sec.1730.
  21. J. WU, L. HE and Y. FANG, "Social network matching model using dynamic Bayesian network", Journal of Computer Applications, vol. 28, no. 12, pp. 3102-3104, 2009. Doi: 10.3724/sp.j.1087.2008.03102.
  22. Amseh "TNF-Pathway Proteins Modulate Tumor Susceptibility to T-cell Attack", Cancer Discovery, vol. 9, no. 9, pp. 1157.2-1157, 2019. Doi: 10.1158/2159-8290.cd-rw2019-110.
  23. D. Le and N. Zincir-Heywood, "Exploring anomalous behaviour detection and classification for insider threat identification", International Journal of Network Management, p. e2109, 2020. Doi: 10.1002/nem.2109.
  24. R. Alavi, S. Islam and H. Mouratidis, "An information security risk-driven investment model for analysing human factors", Information & Computer Security, vol. 24, no. 2, pp. 205-227, 2016. Doi: 10.1108/ics-01-2016-0006.
  25. M. Poltavtseva, "Heterogeneous Data Aggregation and Normalization in Information Security Monitoring and Intrusion Detection Systems of Large-scale Industrial CPS", Proceedings of the Institute for System Programming of the RAS, vol. 32, no. 5, pp. 131-142, 2020. Doi: 10.15514/ispras-2020-32(5)-10.
  26. A. Fournaris, K. Lampropoulos and O. Koufopavlou, "End Node Security and Trust vulnerabilities in the Smart City Infrastructure", MATEC Web of Conferences, vol. 188, p. 05005, 2018. Doi: 10.1051/matecconf/201818805005.

Acknowledgements


Author(s) thanks to Dr. Pamela Walker for this research completion and Data validation support.


Funding


No funding was received to assist with the preparation of this manuscript.


Ethics declarations


Conflict of interest

The authors have no conflicts of interest to declare that are relevant to the content of this article.


Availability of data and materials


No data available for above study.


Author information


Contributions

All authors have equal contribution in the paper and all authors have read and agreed to the published version of the manuscript.


Corresponding author


Rights and permissions


Open Access This article is licensed under a Creative Commons Attribution NoDerivs is a more restrictive license. It allows you to redistribute the material commercially or non-commercially but the user cannot make any changes whatsoever to the original, i.e. no derivatives of the original work. To view a copy of this license, visit https://creativecommons.org/licenses/by-nc-nd/4.0/


Cite this article


Andrea Vilan and Pamela Walker, “A Review of CPS Design and Vulnerability Analysis", vol.2, no.3, pp. 110-119, July 2022. doi: 10.53759/181X/JCNS202202014.


Copyright


© 2022 Andrea Vilan and Pamela Walker. This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.