A CPS or cyber physical system is a significant mechanism, which is being controlled and monitored by certain computer based algorithms. This type of system is majorly integrated with the Internet connection as well as its users (He et al. 2016). Within such cyber physical systems, the physical and even the software elements are being intertwined, where every element is operating on various temporal and spatial scales and hence exhibiting distinctive behavioural modalities. The following report outlines a brief discussion on one security challenge within the modern CPS. Existing technology for detection and prevention of such challenge will be provided here.
One of the most important and significant security challenges for the cyber physical systems that is extremely vital to be eradicated on time is side channel attack. This type of side-channel attack is a specific kind of attack, which is on the basis of the core information, that is obtained from subsequent deployment of computerized system and the weaknesses are removed. The power consumption, sound, electromagnetic leaks and timing information could be provided for the attackers so that they could easily exploit them (Pasqualetti, Dörfler & Bullo 2013). Some of the side-channel attacks need core technical information of every internal operation of systems. However, others like differential power-analysis are extremely efficient than black-box attacks. Due to the increase of applications of Web 2.0 as well as SaaS or software as a service, a higher chance of the probability of side channel attacks have also raised over the web. This is done in spite of the fact that transmissions within a server and a browser are being encrypted.
In cyber physical systems, there could be several attempts for breaking a crypto system either by misleading or by forcing people with legal access. However, such attempts are not termed as side-channel attacks. The general sub divisions of side channel attacks are as follows:
Cache Attacks: The first and the foremost attack class is cache attack. It is based on the ability of an attacker for monitoring the cache accesses that are made by victim within a CPS as in virtual environment (Monostori, 2014).
Timing Attack: Such attacks are mainly based on the measurement of how much time do several computations undertake for performing.
Power Monitoring Attacks: Such attacks eventually make use of the varying power-consumption by hardware while computing.
Electromagnetic Attacks: These types of attacks on the leaked electro magnetic radiation that could directly give plain texts and any other data.
The side channel attack in cyber physical systems could be easily identified as well as prevented with the help of an existing technology of cryptographic devices (Jazdi 2014). Although, the side-channel attack utilizes physical features of cryptographic devices for finding out the cryptographic algorithm as well as secret key. There are some distinctive forms of randomization of the cipher text, which is mainly responsible for transforming the data in such a manner that could be undone even after decryption is being executed. Since CPS is a type of IoT, it is quite important to find counter measures for side channel attacks as vulnerability of data is much higher than normal (Mitchell & Chen 2014). Jamming of entitled channel with noise is the next important technique for preventing from side channel attacks.
Therefore, from the above discussion, it can be concluded that cyber physical systems interact with one another in various ways, which change in context. The most prominent examples of cyber physical systems are smart grid, process control system, autonomous automobile system, robotics system, medical monitoring and many more. Transdisciplinary approaches are involved in CPS and thus embedded systems are considered in the case. The above provided report has clearly outlined one security challenge for CPS and the method of detecting and preventing it.
He, H., Maple, C., Watson, T., Tiwari, A., Mehnen, J., Jin, Y. & Gabrys, B. (2016) The security challenges in the IoT enabled cyber-physical systems and opportunities for evolutionary computing & other computational intelligence. In: IEEE Congress on Evolutionary Computation (CEC). Vancouver, BC. pp. 1015-1021. DOI: 10.1109/CEC.2016.7743900
Jazdi, N. (2014, May). Cyber physical systems in the context of Industry 4.0. In 2014 IEEE international conference on automation, quality and testing, robotics (pp. 1-4). IEEE. DOI: 10.1109/AQTR.2014.6857843
Lee, J., Bagheri, B., & Kao, H. A. (2015). A cyber-physical systems architecture for industry 4.0-based manufacturing systems. Manufacturing letters, 3, 18-23. DOI: 10.1016/j.mfglet.2014.12.001
Mitchell, R., & Chen, I. R. (2014). A survey of intrusion detection techniques for cyber-physical systems. ACM Computing Surveys (CSUR), 46(4), 55. DOI: 10.1145/2542049
Monostori, L. (2014). Cyber-physical production systems: Roots, expectations and R&D challenges. Procedia Cirp, 17, 9-13. DOI: 10.1016/j.procir.2014.03.115
Pasqualetti, F., Dörfler, F., & Bullo, F. (2013). Attack detection and identification in cyber-physical systems. IEEE Transactions on Automatic Control, 58(11), 2715-2729. DOI: 10.1109/TAC.2013.2266831
To export a reference to this article please select a referencing stye below:
My Assignment Help. (2020). Security Challenge Of Cyber Physical Systems. Retrieved from https://myassignmenthelp.com/free-samples/bsbldr511-security-challenge-of-cyber-physical-systems.
"Security Challenge Of Cyber Physical Systems." My Assignment Help, 2020, https://myassignmenthelp.com/free-samples/bsbldr511-security-challenge-of-cyber-physical-systems.
My Assignment Help (2020) Security Challenge Of Cyber Physical Systems [Online]. Available from: https://myassignmenthelp.com/free-samples/bsbldr511-security-challenge-of-cyber-physical-systems
[Accessed 27 May 2020].
My Assignment Help. 'Security Challenge Of Cyber Physical Systems' (My Assignment Help, 2020) <https://myassignmenthelp.com/free-samples/bsbldr511-security-challenge-of-cyber-physical-systems> accessed 27 May 2020.
My Assignment Help. Security Challenge Of Cyber Physical Systems [Internet]. My Assignment Help. 2020 [cited 27 May 2020]. Available from: https://myassignmenthelp.com/free-samples/bsbldr511-security-challenge-of-cyber-physical-systems.
Presenting a brilliantly written college essay can get quite overwhelming at times. But having the assistance of MyAssignmenthelp.com allows you to let of that burden. Our experts can assist can guide on different essay topics regardless how complex those topics are. Our writers follow the college essay format exactly how according to the instructions provided by the students. In fact, the writers make sure they prepare a detailed essay outline before writing it. Our website comes with services for diverse types of essays for different academic levels. You can find college essay examples and samples on all those different types.
Answer: Introduction There are different ISO standards that are used as a baseline for the security of the information in an organization. The ISO standards is used for avoiding breaches in the network, reassuring the customers, gaining an edge and access new market opportunities. It is internationally recognized and applied for management of the safety practices and used as a systematic approach for increasing reliability and enforcement of th...Read More
Answer: Part A The company, which has been chosen in this case, is “Cloud-Pty Limited”. It is actually a cloud-based software development company that is based in Brisbane, Australia. The organisation is deciding to start newer and better responsive cloud-based software applications in the required market. Not very long ago, the dynamic and competitive advantage has formulated some very wrong decisions of investment. At present the ...Read More
Answer:  Journal Title of article: A Forecast of the Adoption of Wearable Technology Author: Page, Tom URL (if available): http://irep.ntu.ac.uk/id/eprint/32219/1/9768_Page.pdf Date accessed: 18 Apr, 2018 Journal Title: International Journal of Technology Diffusion Year of publication: 2015 Page Numbers: 12-29 Volume no: 6 Issue no: 2 Summary of article This article describes about the en...Read More
Answer: Introduction The report mainly focusses on the information system development for the “UNICEF Child Care” organization so that the problems that the organization is facing due to the utilization of manual system can be mitigated easily. The new system will provide the facility of depositing fees online and after the payment, a thanking email for the payment will be generated automatically. The data as well as informa...Read More
Answer: Business identification and IT goals This particular report is focused on the development of a coffee vending machine and its internal processes to be followed for its successful implementation. The aim of the system is to increase the efficiency of the process whenever a user will request for coffee by inserting coin into it.. In order to reduce the errors in the coffee vending machine advanced level of set up are acquired to b...Read More
Just share Requriment and get customize Solution.
Our writers make sure that all orders are submitted, prior to the deadline.
Using reliable plagiarism detection software, Turnitin.com.We only provide customized 100 percent original papers.
Feel free to contact our assignment writing services any time via phone, email or live chat.
Our writers can provide you professional writing assistance on any subject at any level.
Our best price guarantee ensures that the features we offer cannot be matched by any of the competitors.
Get all your documents checked for plagiarism or duplicacy with us.
Get different kinds of essays typed in minutes with clicks.
Calculate your semester grades and cumulative GPa with our GPA Calculator.
Balance any chemical equation in minutes just by entering the formula.
Calculate the number of words and number of pages of all your academic documents.
Our Mission Client Satisfaction
Very well done. I\'m really happy with 5he result. I will be back for another assignment.
Expert did an awesome job. Assignment was organized, in-depth and filled with a wealth of information. Although, I had to correct a few errors, they did not cause a distration from the content while reading. Great Job!
pretty pleased with this assignment even though i had to add extra information and few edits grammatically
The tutor make the assignments best without plagiarism and on time. I like the work they did for students . All the assignments are best . Thankyou