Cyber-Physical Systems (CPS) have seen a dramatic increase in research and real-world application in recent
years. Many parts of our everyday lives have been affected, including electrical power systems, oil and gas delivery,
transportation networks, medical equipment, home appliances, and a host of other areas. For example, many critical
infrastructure and life support equipment are relying on these kinds of systems. As a result, they are required to be
completely secure and resistant to all forms of assaults, which is almost unachievable for any real-world system. This
paper focuses on security analysis in CPSs, whereby security in CPSs, security threats in CPSs, and security challenges in
CPSs, have been discussed
Cyber-Physical Systems (CPS), Industrial Control Systems (ICS), Information Technology (IT)
M. Mahmoud and M. Hamdan, "Improved control of cyber-physical systems subject to cyber and physical attacks", Cyber-Physical Systems, vol. 5, no. 3, pp. 173-190, 2019. Doi: 10.1080/23335777.2019.1631889.
"Programmable logic controller(PLC) in computer numeric controller(CNC)", International Journal of Recent Trends in Engineering and Research, vol. 4, no. 2, pp. 55-60, 2018. Doi: 10.23883/ijrter.2018.4063.fr80v.
D. Dietrich and H. Garn, "Embedded Vision System", EURASIP Journal on Embedded Systems, vol. 2007, pp. 1-2, 2007. Doi:10.1155/2007/34323.
A. BORGEAT, B. SCHAPPI, N. BIASCA and C. GERBER, "Patient-Controlled Analgesia After Major Shoulder Surgery", Survey of Anesthesiology, vol. 42, no. 6, p. 354, 1998. Doi: 10.1097/00132586-199812000-00049.
S. Maitanmi, S. Ogunlere and A. Adio, "Shaping ICT Infrastructure Through Creativity and Innovation", Indian Journal of Science and Technology, vol. 12, no. 41, pp. 1-6, 2019. Doi: 10.17485/ijst/2019/v12i41/147513.
J. Park, "Smart Factory and Cyber-Physical Systems: Analysis of CPS Case Study", Regional Industry Review, vol. 44, no. 1, pp. 161-181, 2021. Doi: 10.33932/rir.44.1.7.
R. Singla and A. Khosla, "Intelligent Security System for HMI in SCADA Applications", International Journal of Modeling and Optimization, pp. 444-448, 2012. Doi: 10.7763/ijmo.2012.v2.160.
N. Saputro and K. Akkaya, "On preserving user privacy in Smart Grid advanced metering infrastructure applications", Security and Communication Networks, vol. 7, no. 1, pp. 206-220, 2013. Doi: 10.1002/sec.706.
T. Ehlers, "System integrity in vehicles with networked electronic control units", ATZ worldwide, vol. 105, no. 9, pp. 30-32, 2003. Doi:10.1007/bf03224629.
G. Elber and E. Cohen, "A unified approach to verification in 5-axis freeform milling environments", Computer-Aided Design, vol. 31, no. 13, pp. 795-804, 1999. Doi: 10.1016/s0010-4485(99)00047-0.
The authors would like to thank to the reviewers for nice comments on the manuscript.
No funding was received to assist with the preparation of this manuscript.
Conflict of interest
The authors have no conflicts of interest to declare that are relevant to the content of this article.
Availability of data and materials
No data available for above study.
All authors have equal contribution in the paper and all authors have read and agreed to the published version of the manuscript.
School of Design, University of Washington, Seattle, WA.
Open Access This article is licensed under a Creative Commons Attribution NoDerivs is a more restrictive license. It allows you to redistribute the material commercially or non-commercially but the user cannot make any changes whatsoever to the original, i.e. no derivatives of the original work. To view a copy of this license, visit https://creativecommons.org/licenses/by-nc-nd/4.0/
Cite this article
AbneyWilliam, “Review on Security Analysis in Cyber Physical Systems”, Journal of Machine and Computing, vol.2, no.3, pp. 134-144, July 2022. doi: 10.53759/7669/jmc202202018.