Security and Privacy in Cyber Physical Systems

A special issue of Electronics (ISSN 2079-9292). This special issue belongs to the section "Computer Science & Engineering".

Deadline for manuscript submissions: closed (29 February 2020) | Viewed by 17117

Special Issue Editors


E-Mail Website
Guest Editor
Department of Computer Science, Kennesaw State University, Marietta, GA 30060, USA
Interests: applied cryptography, security and privacy in various critical applications; data science in cybersecurity, and blockchains and smart contracts
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
Department of Computer Science, Kennesaw State University, Marietta, GA 30060, USA
Interests: mobile and pervasive computing; security and privacy

E-Mail Website
Guest Editor
Department of Computer Science, Georgia State University, Atlanta, GA 30303, USA
Interests: security; privacy and advanced computing technologies
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

Cyber-physical systems (CPS), including mobile CPS and Internet of Things (IoT), have proliferated into every aspect of life. They can be used for numerous critical applications in a wide spectrum of fields, such as aerospace, automotive, chemical processes, civil infrastructure, consumer appliances, energy, entertainment, healthcare, manufacturing, transportation, and so forth.

Due to its critical roles, the CPS attracts many cyber attackers who can cause serious security threats, which may result in system failure. In addition, most CPS applications collect and process sensitive information, and hence, failure to protect such information leads to privacy infringement. Therefore, CPS applications must be operated with proper security and privacy solutions in order to prevent any unexpected damages on systems and users.

This Special Issue solicits high-quality original research and survey papers with consolidated and thoroughly evaluated research on various aspects of security and privacy in CPS applications. This Special Issue will serve as a comprehensive collection of the current state-of-the-art technologies within the context.

Topics of interest include but are not limited to the following:

  • Data science-based solutions for CPS security and privacy issues;
  • Blockchain-based security and privacy solutions for CPS applications;
  • Smart contract-based trustable and verifiable computations for CPS applications;
  • Adaptive attack mitigation for CPS;
  • Authentication and access control for CPS;
  • Availability, recovery, and auditing for CPS;
  • Data security and privacy for CPS;
  • Embedded systems security and privacy;
  • Electric vehicle charging systems security and privacy;
  • Intrusion detection for CPS;
  • Legacy CPS system protection;
  • Security and privacy in industrial control systems;
  • Smart grid security and privacy;
  • Threat modeling for CPS;
  • Urban transportation system security and privacy;
  • Vulnerability analysis for CPS;
  • Wireless sensor network security and privacy.

Dr. Junggab Son
Dr. Daeyoung Kim
Dr. Donghyun Kim
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Electronics is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Published Papers (4 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

22 pages, 2989 KiB  
Article
An Attribute-Based Collaborative Access Control Scheme Using Blockchain for IoT Devices
by Yan Zhang, Bing Li, Ben Liu, Jiaxin Wu, Yazhou Wang and Xia Yang
Electronics 2020, 9(2), 285; https://doi.org/10.3390/electronics9020285 - 07 Feb 2020
Cited by 63 | Viewed by 5240
Abstract
The Internet of Things (IoT) benefits our lives by integrating physical devices to the real world and offers a crucial internet infrastructure for future civilization. Because IoT devices are widely distributed and restricted in resources, it is difficult for them to adopt traditional [...] Read more.
The Internet of Things (IoT) benefits our lives by integrating physical devices to the real world and offers a crucial internet infrastructure for future civilization. Because IoT devices are widely distributed and restricted in resources, it is difficult for them to adopt traditional security methods to resist malicious attacks. Unauthorized access to IoT devices, which results in severe privacy and security problems, has become a major challenge that has impeded IoT technology from being widely adopted. Therefore, the access control for IoT devices urgently needs to be improved when dealing with authorization issues. In this paper, we propose an attribute-based access control scheme that provides decentralized, flexible, and fine-grained authorization for IoT devices. Blockchain is utilized to provide authentic and reliable credentials. More importantly, a verifiable collaboration mechanism is designed to meet the needs of controlled access authorization in emergencies. Authority nodes are constructed to execute major computation tasks and interact with the blockchain. The security analysis shows that our scheme can reliably guarantee the security of authorized access. More than security assurance, a proof-of-concept prototype has been implemented to prove that our scheme is scalable, efficient, and accommodates IoT devices well. Full article
(This article belongs to the Special Issue Security and Privacy in Cyber Physical Systems)
Show Figures

Figure 1

24 pages, 1274 KiB  
Article
A Novel Intrusion Detection Model Using a Fusion of Network and Device States for Communication-Based Train Control Systems
by Yajie Song, Bing Bu and Li Zhu
Electronics 2020, 9(1), 181; https://doi.org/10.3390/electronics9010181 - 18 Jan 2020
Cited by 9 | Viewed by 3934
Abstract
Security is crucial in cyber-physical systems (CPS). As a typical CPS, the communication-based train control (CBTC) system is facing increasingly serious cyber-attacks. Intrusion detection systems (IDSs) are vital to protect the system against cyber-attacks. The traditional IDS cannot distinguish between cyber-attacks and system [...] Read more.
Security is crucial in cyber-physical systems (CPS). As a typical CPS, the communication-based train control (CBTC) system is facing increasingly serious cyber-attacks. Intrusion detection systems (IDSs) are vital to protect the system against cyber-attacks. The traditional IDS cannot distinguish between cyber-attacks and system faults. Furthermore, the design of the traditional IDS does not take the principles of CBTC systems into consideration. When deployed, it cannot effectively detect cyber-attacks against CBTC systems. In this paper, we propose a novel intrusion detection method that considers both the status of the networks and those of the equipment to identify if the abnormality is caused by cyber-attacks or by system faults. The proposed method is verified on a hardware-in-the-loop simulation platform of CBTC systems. Simulation results indicate that the proposed method has achieved 97.64% true positive rate, which can significantly improve the security protection level of CBTC systems. Full article
(This article belongs to the Special Issue Security and Privacy in Cyber Physical Systems)
Show Figures

Figure 1

16 pages, 453 KiB  
Article
An Efficient Encryption Algorithm for the Security of Sensitive Private Information in Cyber-Physical Systems
by Xiaogang Zhu, Gautam Srivastava and Reza M. Parizi
Electronics 2019, 8(11), 1220; https://doi.org/10.3390/electronics8111220 - 25 Oct 2019
Cited by 6 | Viewed by 4138
Abstract
The new developments in smart cyber-physical systems can be shown to include smart cities, Internet of things (IoT), and for the most part smart anything. To improve the security of sensitive personal information (SPI) in cyber-physical systems, we present some novel ideas related [...] Read more.
The new developments in smart cyber-physical systems can be shown to include smart cities, Internet of things (IoT), and for the most part smart anything. To improve the security of sensitive personal information (SPI) in cyber-physical systems, we present some novel ideas related to the encryption of SPI. Currently, there are issues in traditional encryption methods, such as low speed of information acquisition, low recognition rate, low utilization rate of effective information resources, and high delay of information query. To address these issues, we propose a novel efficient encryption algorithm for the security of incremental SPI. First, our proposed method analyzes user information resources and determines valid data to be encrypted. Next, it uses adaptive acquisition methods to collect information, and uses our encryption method to complete secure encryption of SPI according to the acquisition results. Our experimental analysis clearly shows that the algorithm effectively improves the speed of information acquisition as well as effective information recognition rate, thus enhancing the security of SPI. The encryption model in turn can provide a strong guarantee for user information security. Full article
(This article belongs to the Special Issue Security and Privacy in Cyber Physical Systems)
Show Figures

Figure 1

21 pages, 1965 KiB  
Article
Advanced Bad Data Injection Attack and Its Migration in Cyber-Physical Systems
by Wenping Deng, Ziyu Yang, Peng Xun, Peidong Zhu and Baosheng Wang
Electronics 2019, 8(9), 941; https://doi.org/10.3390/electronics8090941 - 26 Aug 2019
Cited by 6 | Viewed by 2681
Abstract
False data injection (FDI) attack is a hot topic in cyber-physical systems (CPSs). Attackers inject bad data into sensors or return false data to the controller to cause the inaccurate state estimation. Although there exists many detection approaches, such as bad data detector [...] Read more.
False data injection (FDI) attack is a hot topic in cyber-physical systems (CPSs). Attackers inject bad data into sensors or return false data to the controller to cause the inaccurate state estimation. Although there exists many detection approaches, such as bad data detector (BDD), sequence pattern mining, and machine learning methods, a smart attacker still can inject perfectly false data to go undetected. In this paper, we focus on the advanced false data injection (AFDI) attack and its detection method. An AFDI attack refers to the attack where a malicious entity accurately and successively changes sensory data, making the normal system state continuously evaluated as other legal system states, causing wrong outflow of controllers. The attack can lead to an automatic and long-term system failure/performance degradation. We first depict the AFDI attack model and analyze limitations of existing detectors for detecting AFDI. Second, we develop an approach based on machine learning, which utilizes the k-Nearest Neighbor (KNN) technique and heterogeneous data including sensory data and system commands to implement a classifier for detecting AFDI attacks. Finally, simulation experiments are given to demonstrate AFDI attack impact and the effectiveness of the proposed method for detecting AFDI attacks. Full article
(This article belongs to the Special Issue Security and Privacy in Cyber Physical Systems)
Show Figures

Figure 1

Back to TopTop