In a Cyber-Physical System (CPS), multiple embedded subsystems interact with the external environment while operating semi-independently, creating complex contextual relationships, exposure to adversarial conditions, and inherent uncertainty. Ensuring secure communication across CPS infrastructure requires the application of fundamental security principles, supported by a combination of approaches such as social engineering awareness, implementation of security standards, vendor-specific controls, and effective network management. Trust emerges as a critical factor in maintaining the security and reliability of CPS communications. This paper reviews key usability challenges and associated risks in CPS environments, analyzes potential attack vectors across different system layers, and discusses strategies for effective trust management to enhance overall system resilience.
Keywords
Cyber Physical System (CPS), Radio Frequency Identification (RFID), Wireless Sensor Network (WSN), STP Management.
R. Johari, A. Kaur, M. Hashim, P. K. Rai, and K. Gupta, “SEVA: Secure E-Voting Application in Cyber Physical System,” Cyber-Physical Systems, vol. 8, no. 1, pp. 1–31, Nov. 2020, doi: 10.1080/23335777.2020.1837250.
E. S. Faden, “Assimilating New Technologies Early Cinema, Sound, and Computer Imagery,” Convergence: The International Journal of Research into New Media Technologies, vol. 5, no. 2, pp. 51–79, Jun. 1999, doi: 10.1177/135485659900500205.
R. Picciotto, “Why the world needs millennium security goals,” Conflict, Security & Development, vol. 6, no. 1, pp. 111–120, Apr. 2006, doi: 10.1080/14678800600590777.
E.-J. Yoon and K.-Y. Yoo, “An Improvement of the User Identification and Key Agreement Protocol with User Anonymity,” Informatica, vol. 23, no. 1, pp. 155–172, Jan. 2012, doi: 10.15388/informatica.2012.354.
N. Edwards, S. B. Kiser, and J. B. Haynes, “Answering the Cybersecurity Issues: Confidentiality, Integrity, and Availability,” Journal of Strategic Innovation and Sustainability, vol. 15, no. 4, Aug. 2020, doi: 10.33423/jsis.v15i4.2956.
G. R. K. RAO, “Preventing Mobile Blockade and DDOS Assaults in ICN Network Communication Using Routing Path Identifiers,” Journal of Research on the Lepidoptera, vol. 51, no. 1, pp. 234–245, Feb. 2020, doi: 10.36872/lepi/v51i1/301020.
A. Lamba, “A Through Analysis on Protecting Cyber Threats and Attacks on Cps Embedded Subsystems,” SSRN Electronic Journal, 2020, doi: 10.2139/ssrn.3517474.
S. A. Hussein, A. A. Mahmood, and E. O. Oraby, “Network Intrusion Detection System Using Ensemble Learning Approaches,” Webology, vol. 18, no. SI05, pp. 962–974, Oct. 2021, doi: 10.14704/web/v18si05/web18274.
С. П. Санников and Э. Ф. Герц, “Method of the monitoring illegal chopping tree with use RFID-device and WSN-network,” Известия СПбЛТА, no. 219(), Sep. 2017, doi: 10.21266/2079-4304.2017.219.173-183.
A. V. Tsiganov, “Duffing Oscillator and Elliptic Curve Cryptography,” Nelineinaya Dinamika, vol. 14, no. 2, pp. 235–241, 2018, doi: 10.20537/nd180207.
J. Huang, “Cross layer link adaptation scheme in wireless local area network,” Journal of Computer Applications, vol. 29, no. 2, pp. 518–520, Apr. 2009, doi: 10.3724/sp.j.1087.2009.00518.
S. Hermann and B. Fabian, “A Comparison of Internet Protocol (IPv6) Security Guidelines,” Future Internet, vol. 6, no. 1, pp. 1–60, Jan. 2014, doi: 10.3390/fi6010001.
Y. Wu, Y. Zhao, M. Riguidel, G. Wang, and P. Yi, “Security and trust management in opportunistic networks: a survey,” Security and Communication Networks, vol. 8, no. 9, pp. 1812–1827, Sep. 2014, doi: 10.1002/sec.1116.
CRediT Author Statement
The author reviewed the results and approved the final version of the manuscript.
Acknowledgements
Authors thank Reviewers for taking the time and effort necessary to review the manuscript.
Funding
No funding was received to assist with the preparation of this manuscript.
Ethics declarations
Conflict of interest
The authors have no conflicts of interest to declare that are relevant to the content of this article.
Availability of data and materials
Data sharing is not applicable to this article as no new data were created or analysed in this study.
Author information
Contributions
All authors have equal contribution in the paper and all authors have read and agreed to the published version of the manuscript.
Open Access This article is licensed under a Creative Commons Attribution NoDerivs is a more restrictive license. It allows you to redistribute the material commercially or non-commercially but the user cannot make any changes whatsoever to the original, i.e. no derivatives of the original work. To view a copy of this license, visit https://creativecommons.org/licenses/by-nc-nd/4.0/
Cite this article
Takeru Kobayashi, “Critical Usability Challenges and Risk Analysis in CPS: A Focus on STP Management”, Journal of Machine and Computing, vol.6, no.2, pp. 398-407, 2026, doi: 10.53759/7669/jmc202606029.