Journal of Machine and Computing


Critical Usability Challenges and Risk Analysis in CPS: A Focus on STP Management



Journal of Machine and Computing

Received On : 28 November 2025

Revised On : 10 January 2026

Accepted On : 16 January 2026

Published On : 05 April 2026

Volume 06, Issue 02

Pages : 398-407


Abstract


In a Cyber-Physical System (CPS), multiple embedded subsystems interact with the external environment while operating semi-independently, creating complex contextual relationships, exposure to adversarial conditions, and inherent uncertainty. Ensuring secure communication across CPS infrastructure requires the application of fundamental security principles, supported by a combination of approaches such as social engineering awareness, implementation of security standards, vendor-specific controls, and effective network management. Trust emerges as a critical factor in maintaining the security and reliability of CPS communications. This paper reviews key usability challenges and associated risks in CPS environments, analyzes potential attack vectors across different system layers, and discusses strategies for effective trust management to enhance overall system resilience.


Keywords


Cyber Physical System (CPS), Radio Frequency Identification (RFID), Wireless Sensor Network (WSN), STP Management.


  1. R. Johari, A. Kaur, M. Hashim, P. K. Rai, and K. Gupta, “SEVA: Secure E-Voting Application in Cyber Physical System,” Cyber-Physical Systems, vol. 8, no. 1, pp. 1–31, Nov. 2020, doi: 10.1080/23335777.2020.1837250.
  2. E. S. Faden, “Assimilating New Technologies Early Cinema, Sound, and Computer Imagery,” Convergence: The International Journal of Research into New Media Technologies, vol. 5, no. 2, pp. 51–79, Jun. 1999, doi: 10.1177/135485659900500205.
  3. R. Picciotto, “Why the world needs millennium security goals,” Conflict, Security & Development, vol. 6, no. 1, pp. 111–120, Apr. 2006, doi: 10.1080/14678800600590777.
  4. E.-J. Yoon and K.-Y. Yoo, “An Improvement of the User Identification and Key Agreement Protocol with User Anonymity,” Informatica, vol. 23, no. 1, pp. 155–172, Jan. 2012, doi: 10.15388/informatica.2012.354.
  5. N. Edwards, S. B. Kiser, and J. B. Haynes, “Answering the Cybersecurity Issues: Confidentiality, Integrity, and Availability,” Journal of Strategic Innovation and Sustainability, vol. 15, no. 4, Aug. 2020, doi: 10.33423/jsis.v15i4.2956.
  6. G. R. K. RAO, “Preventing Mobile Blockade and DDOS Assaults in ICN Network Communication Using Routing Path Identifiers,” Journal of Research on the Lepidoptera, vol. 51, no. 1, pp. 234–245, Feb. 2020, doi: 10.36872/lepi/v51i1/301020.
  7. A. Lamba, “A Through Analysis on Protecting Cyber Threats and Attacks on Cps Embedded Subsystems,” SSRN Electronic Journal, 2020, doi: 10.2139/ssrn.3517474.
  8. S. A. Hussein, A. A. Mahmood, and E. O. Oraby, “Network Intrusion Detection System Using Ensemble Learning Approaches,” Webology, vol. 18, no. SI05, pp. 962–974, Oct. 2021, doi: 10.14704/web/v18si05/web18274.
  9. С. П. Санников and Э. Ф. Герц, “Method of the monitoring illegal chopping tree with use RFID-device and WSN-network,” Известия СПбЛТА, no. 219(), Sep. 2017, doi: 10.21266/2079-4304.2017.219.173-183.
  10. A. V. Tsiganov, “Duffing Oscillator and Elliptic Curve Cryptography,” Nelineinaya Dinamika, vol. 14, no. 2, pp. 235–241, 2018, doi: 10.20537/nd180207.
  11. J. Huang, “Cross layer link adaptation scheme in wireless local area network,” Journal of Computer Applications, vol. 29, no. 2, pp. 518–520, Apr. 2009, doi: 10.3724/sp.j.1087.2009.00518.
  12. S. Hermann and B. Fabian, “A Comparison of Internet Protocol (IPv6) Security Guidelines,” Future Internet, vol. 6, no. 1, pp. 1–60, Jan. 2014, doi: 10.3390/fi6010001.
  13. Y. Wu, Y. Zhao, M. Riguidel, G. Wang, and P. Yi, “Security and trust management in opportunistic networks: a survey,” Security and Communication Networks, vol. 8, no. 9, pp. 1812–1827, Sep. 2014, doi: 10.1002/sec.1116.

CRediT Author Statement


The author reviewed the results and approved the final version of the manuscript.


Acknowledgements


Authors thank Reviewers for taking the time and effort necessary to review the manuscript.


Funding


No funding was received to assist with the preparation of this manuscript.


Ethics declarations


Conflict of interest

The authors have no conflicts of interest to declare that are relevant to the content of this article.


Availability of data and materials


Data sharing is not applicable to this article as no new data were created or analysed in this study.


Author information


Contributions

All authors have equal contribution in the paper and all authors have read and agreed to the published version of the manuscript.


Corresponding author


Rights and permissions


Open Access This article is licensed under a Creative Commons Attribution NoDerivs is a more restrictive license. It allows you to redistribute the material commercially or non-commercially but the user cannot make any changes whatsoever to the original, i.e. no derivatives of the original work. To view a copy of this license, visit https://creativecommons.org/licenses/by-nc-nd/4.0/


Cite this article


Takeru Kobayashi, “Critical Usability Challenges and Risk Analysis in CPS: A Focus on STP Management”, Journal of Machine and Computing, vol.6, no.2, pp. 398-407, 2026, doi: 10.53759/7669/jmc202606029.


Copyright


© 2026 Takeru Kobayashi. This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.