Journal of Computing and Natural Science

Security Evaluation of Side Channel Attacks on CPS Architectures

Journal of Computing and Natural Science

Received On : 24 May 2022

Revised On : 20 June 2022

Accepted On : 26 July 2022

Published On : 05 October 2022

Volume 02, Issue 04

Pages : 153-163


"Smart-Embedded Systems," or Cyber-Physical Systems (CPS), bring together physical, computational, and network resources into a single integrated system. These resources are put to work to provide a solid basis for a better quality of life and a more upscale standard of living. CPSs (Cyber-Physical Systems) are vital in supporting the need for smart products (e.g., airports, homes, cities, hospitals). Control the three sorts of resources Doi: physical, cognitive, and network. In order to uncover the essential knowledge in the various real-life segments, e.g., distribution, power transmission and telecommunication, CPSs stimulates human-to-human interaction via this regulatory measure Information security is a critical concern in today's technological world. Due to the complexity of the components and middleware in CPS, it is difficult to keep them safe from cyberattacks while yet allowing them to operate quickly and effectively. An in-depth explanation of CPS, their issues (including cyber threats), characteristics, and associated technology is provided in this paper Aside from security and performance, we also describe the prevalent Side Channel Attacks (SCA) e.g., Differential Power Analysis (DPA) and Simple Power Analysis (SPA), on cryptographic techniques (such as RSA and AES) and the countermeasures that may be used to protect against these attacks.


Cyber-Physical Systems (CPS), Side Channel Attacks (SCA), Differential Power Analysis (DPA), Simple Power Analysis (SPA)

  1. S. Yadav, "A resilient hierarchical distributed model of a cyber physical system", Cyber-Physical Systems, pp. 1-24, 2021. Doi: 10.1080/23335777.2021.1964101.
  2. I. Gronau and S. Moran, "Optimal implementations of UPGMA and other common clustering algorithms", Information Processing Letters, vol. 104, no. 6, pp. 205-210, 2007. Doi: 10.1016/j.ipl.2007.07.002.
  3. B. Susmita, D. Parween and V. Nikitha Reddy, "Security Challenges Faced Due to Increasing Data", International Journal of Scientific and Research Publications (IJSRP), vol. 8, no. 12, 2018. Doi: 10.29322/ijsrp.8.12.2018.p8431.
  4. S. Yadav, "A resilient hierarchical distributed model of a cyber physical system", Cyber-Physical Systems, pp. 1-24, 2021. Doi: 10.1080/23335777.2021.1964101.
  5. T. Chen, "On kernel design for regularized LTI system identification", Automatica, vol. 90, pp. 109-122, 2018. Doi: 10.1016/j.automatica.2017.12.039.
  6. A. Oluwafolake and O. Solomon, "A multi-algorithm data mining classification approach for bank fraudulent transactions", African Journal of Mathematics and Computer Science Research, vol. 10, no. 1, pp. 5-13, 2017. Doi: 10.5897/ajmcsr2017.0686.
  7. J. Xiao, "Trajectory planning of quadrotor using sliding mode control with extended state observer", Measurement and Control, vol. 53, no. 7-8, pp. 1300-1308, 2020. Doi: 10.1177/0020294020927419.
  8. H. Power, "New solution to a problem in Luenberger observer design", Electronics Letters, vol. 11, no. 3, p. 65, 1975. Doi: 10.1049/el:19750050.
  9. R. King and M. Phipps, "Shannon, TESPAR and approximation strategies", Computers & Security, vol. 18, no. 5, pp. 445-453, 1999. Doi: 10.1016/s0167-4048(99)80111-4.
  10. "Call for Contributions Special Issue on Cyber Security for Embedded Controls in Cyber Physical Systems", IEEE Design & Test, vol. 34, no. 6, pp. 127-127, 2017. Doi: 10.1109/mdat.2017.2772155.
  11. R. Ivanov and I. Raykov, "Parametric lyapunov function method for solving nonlinear systems in hilbert spaces", Numerical Functional Analysis and Optimization, vol. 17, no. 9-10, pp. 893-901, 1996. Doi: 10.1080/01630569608816732.
  12. L. Sepmeyer, "Prediction of Command Control System Dependability and Performance", IRE Transactions on Reliability and Quality Control, vol. -11, no. 3, pp. 35-42, 1962. Doi: 10.1109/ire-pgrqc.1962.5009617.
  13. R. Dhaouadi and K. Kubo, "A nonlinear control method for good dynamic performance elastic drives", IEEE Transactions on Industrial Electronics, vol. 46, no. 4, pp. 868-870, 1999. Doi: 10.1109/tie.1999.778264.
  14. S. Wildhagen, F. Dürr and F. Allgöwer, "Rollout event-triggered control: reconciling event- and time-triggered control", at - Automatisierungstechnik, vol. 70, no. 4, pp. 331-342, 2022. Doi: 10.1515/auto-2021-0111.
  15. Y. Ma, W. Che and C. Deng, "Dynamic event-triggered model-free adaptive control for nonlinear CPSs under aperiodic DoS attacks", Information Sciences, vol. 589, pp. 790-801, 2022. Doi: 10.1016/j.ins.2022.01.009.
  16. D. Schaller, M. Hellmuth and P. Stadler, "A simpler linear-time algorithm for the common refinement of rooted phylogenetic trees on a common leaf set", Algorithms for Molecular Biology, vol. 16, no. 1, 2021. Doi: 10.1186/s13015-021-00202-8.
  17. N. Zhang, X. Gao and T. Yu, "Heuristic Approaches to Attribute Reduction for Generalized Decision Preservation", Applied Sciences, vol. 9, no. 14, p. 2841, 2019. Doi: 10.3390/app9142841.
  18. F. Uribe, I. Papaioannou, Y. Marzouk and D. Straub, "Cross-Entropy-Based Importance Sampling with Failure-Informed Dimension Reduction for Rare Event Simulation", SIAM/ASA Journal on Uncertainty Quantification, vol. 9, no. 2, pp. 818-847, 2021. Doi: 10.1137/20m1344585.
  19. M. Hamdan and M. Mahmoud, "Secure Filter for Discrete-Time Delayed Systems Subject to Cyber Attacks", Cyber-Physical Systems, pp. 1-23, 2021. Doi: 10.1080/23335777.2021.1916230.
  20. C. Li and P. Tam, "An iterative algorithm for minimum cross entropy thresholding", Pattern Recognition Letters, vol. 19, no. 8, pp. 771-776, 1998. Doi: 10.1016/s0167-8655(98)00057-9.
  21. G. GUO and B. WANG, "Robust Kalman Filtering for Uncertain Discrete-time Systems with Multiple Packet Dropouts", Acta Automatica Sinica, vol. 36, no. 5, pp. 767-772, 2010. Doi: 10.3724/sp.j.1004.2010.00767.
  22. T. ZHANG and M. FAN, "Countermeasure for Cryptographic Chips to Resist Side-Channel Attacks", Journal of Software, vol. 19, no. 11, pp. 2990-2998, 2009. Doi: 10.3724/sp.j.1001.2008.02990.
  23. H. LIU, X. ZHAO, T. WANG, S. GUO, F. ZHANG and K. JI, "Research on Hamming Weight-Based Algebraic Side-Channel Attacks on SMS4", Chinese Journal of Computers, vol. 36, no. 6, pp. 1183-1193, 2014. Doi: 10.3724/sp.j.1016.2013.01183.
  24. "ENSURING PRIVACY ON E- MEDICAL HEALTH CARE USING TRIPLE-DES ALGORITHM", International Journal of Recent Trends in Engineering and Research, vol. 3, no. 3, pp. 201-207, 2017. Doi: 10.23883/ijrter.2017.3068.zfrnx.
  25. S. Akiyama and Y. Tanigawa, "The Selberg trace formula for modular correspondences", Nagoya Mathematical Journal, vol. 117, pp. 93-123, 1990. Doi: 10.1017/s0027763000001823.
  26. F. Gosselin, "Test of mathematical assumptions behind the `incidence function' estimation process of metapopulations' dynamic parameters", Mathematical Biosciences, vol. 159, no. 1, pp. 21-32, 1999. Doi: 10.1016/s0025-5564(99)00018-8.
  27. P. Sahil Gupta, "Speech Enhancement Using Modified Spectral Subtraction Algorithm", International Journal Of Engineering And Computer Science, 2016. Doi: 10.18535/ijecs/v4i12.35.
  28. D. Georg, T. Knöös and B. McClean, "Current status and future perspective of flattening filter free photon beams", Medical Physics, vol. 38, no. 3, pp. 1280-1293, 2011. Doi: 10.1118/1.3554643.
  29. M. Joye and Sung-Ming Yen, "Optimal left-to-right binary signed-digit recoding", IEEE Transactions on Computers, vol. 49, no. 7, pp. 740-748, 2000. Doi: 10.1109/12.863044.
  30. L. SHI and Z. HE, "Adaptive load balancing model based on prediction mechanism", Journal of Computer Applications, vol. 30, no. 7, pp. 1742-1745, 2010. Doi: 10.3724/sp.j.1087.2010.01742.


Author(s) thanks to Dr.Donglai LU for this research validation and verification support.


No funding was received to assist with the preparation of this manuscript.

Ethics declarations

Conflict of interest

The authors have no conflicts of interest to declare that are relevant to the content of this article.

Availability of data and materials

No data available for above study.

Author information


All authors have equal contribution in the paper and all authors have read and agreed to the published version of the manuscript.

Corresponding author

Rights and permissions

Open Access This article is licensed under a Creative Commons Attribution NoDerivs is a more restrictive license. It allows you to redistribute the material commercially or non-commercially but the user cannot make any changes whatsoever to the original, i.e. no derivatives of the original work. To view a copy of this license, visit

Cite this article

Xinhe HOU and Donglai LU, “Security Evaluation of Side Channel Attacks on CPS Architectures", vol.2, no.4, pp. 153-163, October 2022. doi: 10.53759/181X/JCNS202202018.


© 2022 Xinhe HOU and Donglai LU. This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.