$20 Bonus + 25% OFF
Securing Higher Grades Costing Your Pocket? Book Your Assignment at The Lowest Price Now!

BSBLDR511-Security Challenge Of Cyber Physical Systems

tag 0 Download4 Pages / 917 Words tag Add in library Click this icon and make it bookmark in your library to refer it later. GOT IT
  • Course Code: BSBLDR511
  • University: Victoria University
  • Country: Australia


Discuss one security challenge in modern cyber-physical systems in detail. Research the literature for existing technology that could contribute in cybercrime detection and prevention in cyber physical systems. This comprises both evolutionary computation and other computational intelligence technology.



A CPS or cyber physical system is a significant mechanism, which is being controlled and monitored by certain computer based algorithms. This type of system is majorly integrated with the Internet connection as well as its users (He et al. 2016). Within such cyber physical systems, the physical and even the software elements are being intertwined, where every element is operating on various temporal and spatial scales and hence exhibiting distinctive behavioural modalities. The following report outlines a brief discussion on one security challenge within the modern CPS. Existing technology for detection and prevention of such challenge will be provided here.


Security Challenge of Cyber Physical Systems

CPS is quite similar to IoT or internet of things and they share same basic architecture. This type of system eventually presents a high combination as well as coordination within computational and physical elements. Various computational resources like local storage and processing capability are being considered in these cyber physical systems (Lee, Bagheri & Kao 2015). Numerous communication mechanisms like Wi-Fi, Bluetooth, EDGE and 4Gare used for interconnection of devices to other devices and Internet connectivity. Internet of Things even consider the high level programming languages like Java, C#, JavaScript and many more for the core purpose of allowing rapid development of mobile CPS node software.

One of the most important and significant security challenges for the cyber physical systems that is extremely vital to be eradicated on time is side channel attack. This type of side-channel attack is a specific kind of attack, which is on the basis of the core information, that is obtained from subsequent deployment of computerized system and the weaknesses are removed. The power consumption, sound, electromagnetic leaks and timing information could be provided for the attackers so that they could easily exploit them (Pasqualetti, Dörfler & Bullo 2013). Some of the side-channel attacks need core technical information of every internal operation of systems. However, others like differential power-analysis are extremely efficient than black-box attacks. Due to the increase of applications of Web 2.0 as well as SaaS or software as a service, a higher chance of the probability of side channel attacks have also raised over the web. This is done in spite of the fact that transmissions within a server and a browser are being encrypted.

In cyber physical systems, there could be several attempts for breaking a crypto system either by misleading or by forcing people with legal access. However, such attempts are not termed as side-channel attacks. The general sub divisions of side channel attacks are as follows: 


Cache Attacks: The first and the foremost attack class is cache attack. It is based on the ability of an attacker for monitoring the cache accesses that are made by victim within a CPS as in virtual environment (Monostori, 2014).

Timing Attack: Such attacks are mainly based on the measurement of how much time do several computations undertake for performing.

Power Monitoring Attacks: Such attacks eventually make use of the varying power-consumption by hardware while computing.

Electromagnetic Attacks: These types of attacks on the leaked electro magnetic radiation that could directly give plain texts and any other data.

Existing Technology for Detection and Prevention of Identified Security Challenge

The side channel attack in cyber physical systems could be easily identified as well as prevented with the help of an existing technology of cryptographic devices (Jazdi 2014). Although, the side-channel attack utilizes physical features of cryptographic devices for finding out the cryptographic algorithm as well as secret key. There are some distinctive forms of randomization of the cipher text, which is mainly responsible for transforming the data in such a manner that could be undone even after decryption is being executed. Since CPS is a type of IoT, it is quite important to find counter measures for side channel attacks as vulnerability of data is much higher than normal (Mitchell & Chen 2014). Jamming of entitled channel with noise is the next important technique for preventing from side channel attacks.


Therefore, from the above discussion, it can be concluded that cyber physical systems interact with one another in various ways, which change in context. The most prominent examples of cyber physical systems are smart grid, process control system, autonomous automobile system, robotics system, medical monitoring and many more. Transdisciplinary approaches are involved in CPS and thus embedded systems are considered in the case. The above provided report has clearly outlined one security challenge for CPS and the method of detecting and preventing it. 



He, H., Maple, C., Watson, T., Tiwari, A., Mehnen, J., Jin, Y. & Gabrys, B. (2016) The security challenges in the IoT enabled cyber-physical systems and opportunities for evolutionary computing & other computational intelligence. In: IEEE Congress on Evolutionary Computation (CEC). Vancouver, BC. pp. 1015-1021. DOI: 10.1109/CEC.2016.7743900

Jazdi, N. (2014, May). Cyber physical systems in the context of Industry 4.0. In 2014 IEEE international conference on automation, quality and testing, robotics (pp. 1-4). IEEE. DOI: 10.1109/AQTR.2014.6857843

Lee, J., Bagheri, B., & Kao, H. A. (2015). A cyber-physical systems architecture for industry 4.0-based manufacturing systems. Manufacturing letters, 3, 18-23. DOI: 10.1016/j.mfglet.2014.12.001

Mitchell, R., & Chen, I. R. (2014). A survey of intrusion detection techniques for cyber-physical systems. ACM Computing Surveys (CSUR), 46(4), 55. DOI: 10.1145/2542049

Monostori, L. (2014). Cyber-physical production systems: Roots, expectations and R&D challenges. Procedia Cirp, 17, 9-13. DOI: 10.1016/j.procir.2014.03.115

Pasqualetti, F., Dörfler, F., & Bullo, F. (2013). Attack detection and identification in cyber-physical systems. IEEE Transactions on Automatic Control, 58(11), 2715-2729. DOI: 10.1109/TAC.2013.2266831


Cite This Work

To export a reference to this article please select a referencing stye below:

My Assignment Help. (2020). Security Challenge Of Cyber Physical Systems. Retrieved from

"Security Challenge Of Cyber Physical Systems." My Assignment Help, 2020,

My Assignment Help (2020) Security Challenge Of Cyber Physical Systems [Online]. Available from:
[Accessed 27 May 2020].

My Assignment Help. 'Security Challenge Of Cyber Physical Systems' (My Assignment Help, 2020) <> accessed 27 May 2020.

My Assignment Help. Security Challenge Of Cyber Physical Systems [Internet]. My Assignment Help. 2020 [cited 27 May 2020]. Available from:

Presenting a brilliantly written college essay can get quite overwhelming at times. But having the assistance of allows you to let of that burden. Our experts can assist can guide on different essay topics regardless how complex those topics are. Our writers follow the college essay format exactly how according to the instructions provided by the students. In fact, the writers make sure they prepare a detailed essay outline before writing it. Our website comes with services for diverse types of essays for different academic levels. You can find college essay examples and samples on all those different types.

Latest It Write Up Samples

CO4512 Information Security Management

Download : 0 | Pages : 12
  • Course Code: CO4512
  • University: University Of Central Lancashire
  • Country: United Kingdom

Answer: Introduction There are different ISO standards that are used as a baseline for the security of the information in an organization. The ISO standards is used for avoiding breaches in the network, reassuring the customers, gaining an edge and access new market opportunities. It is internationally recognized and applied for management of the safety practices and used as a systematic approach for increasing reliability and enforcement of th...

Read More arrow

COIS13013 Business Intelligence

Download : 0 | Pages : 10

Answer: Part A The company, which has been chosen in this case, is “Cloud-Pty Limited”. It is actually a cloud-based software development company that is based in Brisbane, Australia. The organisation is deciding to start newer and better responsive cloud-based software applications in the required market. Not very long ago, the dynamic and competitive advantage has formulated some very wrong decisions of investment. At present the ...

Read More arrow

ITECH1001 Communications And Technology

Download : 0 | Pages : 5
  • Course Code: ITECH1001
  • University: Federation University
  • Country: Australia

Answer: [1] Journal Title of article:  A Forecast of the Adoption of Wearable Technology Author: Page, Tom URL (if available):  Date accessed:  18 Apr, 2018 Journal Title: International Journal of Technology Diffusion  Year of publication:  2015 Page Numbers: 12-29 Volume no: 6 Issue no: 2 Summary of article This article describes about the en...

Read More arrow

COIT20248 Information Systems Analysis And Design 2

Download : 0 | Pages : 10

Answer: Introduction  The report mainly focusses on the information system development for the “UNICEF Child Care” organization so that the problems that the organization is facing due to the utilization of manual system can be mitigated easily. The new system will provide the facility of depositing fees online and after the payment, a thanking email for the payment will be generated automatically. The data as well as informa...

Read More arrow

BUS5BIM Business Information Systems Management

Download : 0 | Pages : 2
  • Course Code: BUS5BIM
  • University: La Trobe University
  • Country: Australia

Answer: Business identification and IT goals This particular report is focused on the development of a coffee vending machine and its internal processes to be followed for its successful implementation. The aim of the system is to increase the efficiency of the process whenever a user will request for coffee by inserting coin into it..  In order to reduce the errors in the coffee vending machine advanced level of set up are acquired to b...

Read More arrow

Save Time & improve Grade

Just share Requriment and get customize Solution.

We will use e-mail only for:

arrow Communication regarding your orders

arrow To send you invoices, and other billing info

arrow To provide you with information of offers and other benefits




Overall Rating



Our Amazing Features


On Time Delivery

Our writers make sure that all orders are submitted, prior to the deadline.


Plagiarism Free Work

Using reliable plagiarism detection software, only provide customized 100 percent original papers.


24 X 7 Live Help

Feel free to contact our assignment writing services any time via phone, email or live chat.


Services For All Subjects

Our writers can provide you professional writing assistance on any subject at any level.


Best Price Guarantee

Our best price guarantee ensures that the features we offer cannot be matched by any of the competitors.

Our Experts

Assignment writing guide
student rating student rating student rating student rating student rating 5/5

2279 Order Completed

97% Response Time

Zachary Perez

PhD in Computer Science and Information System

Washington, United States

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

1692 Order Completed

98% Response Time

Alfred Dodd

PhD in Computer and Information Science with specialization in Database

Wellington, New Zealand

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

416 Order Completed

95% Response Time

Tyler Moore

MBA in Accounting

Washington, United States

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

529 Order Completed

95% Response Time

Ivan Blank

PhD in Functional Human Biology

Wellington, New Zealand

Hire Me

FREE Tools


Plagiarism Checker

Get all your documents checked for plagiarism or duplicacy with us.


Essay Typer

Get different kinds of essays typed in minutes with clicks.


GPA Calculator

Calculate your semester grades and cumulative GPa with our GPA Calculator.


Chemical Equation Balancer

Balance any chemical equation in minutes just by entering the formula.


Word Counter & Page Calculator

Calculate the number of words and number of pages of all your academic documents.

Refer Just 5 Friends to Earn More than $2000

Check your estimated earning as per your ability




Your Approx Earning

Live Review

Our Mission Client Satisfaction

Very well done. I\'m really happy with 5he result. I will be back for another assignment.


User Id: 406321 - 26 May 2020


student rating student rating student rating student rating student rating

Expert did an awesome job. Assignment was organized, in-depth and filled with a wealth of information. Although, I had to correct a few errors, they did not cause a distration from the content while reading. Great Job!


User Id: 413864 - 26 May 2020


student rating student rating student rating student rating student rating

pretty pleased with this assignment even though i had to add extra information and few edits grammatically


User Id: 416694 - 26 May 2020


student rating student rating student rating student rating student rating

The tutor make the assignments best without plagiarism and on time. I like the work they did for students . All the assignments are best . Thankyou


User Id: 417750 - 26 May 2020


student rating student rating student rating student rating student rating
callback request mobile
Have any Query?