Loughborough University
Leicestershire, UK
LE11 3TU
+44 (0)1509 263171
Loughborough University

Loughborough University Institutional Repository

Please use this identifier to cite or link to this item: https://dspace.lboro.ac.uk/2134/26721

Title: Cyber-physical system security for networked industrial processes
Authors: Huang, Shuang
Zhou, Chunjie
Yang, Shuang-Hua
Qin, Yuanqing
Issue Date: 2015
Publisher: Springer (© Institute of Automation, Chinese Academy of Science and Springer)
Citation: HUANG, S. ... et al., 2015. Cyber-physical system security for networked industrial processes. International Journal of Automation and Computing, 12 (6), pp.567-578.
Abstract: Cyber-physical systems (CPSs) are integrations of networks, computation and physical processes, where embedded computing devices continually sense, monitor, and control the physical processes through networks. Networked industrial processes combining internet, real-time computer control systems and industrial processes together are typical CPSs. With the increasingly frequent cyber-attack, security issues have gradually become key problems for CPSs. In this paper, a cyber-physical system security protection approach for networked industrial processes, i.e., industrial CPSs, is proposed. In this approach, attacks are handled layer by layer from general information technology (IT) security protection, to active protection, then to intrusion tolerance and physical security protection. The intrusion tolerance implemented in real-time control systems is the most critical layer because the real time control system directly affects the physical layer. This novel intrusion tolerance scheme with a closed loop defense framework takes into account the special requirements of industrial CPSs. To illustrate the effectiveness of the CPS security protection approach, a networked water level control system is described as a case study in the architecture analysis and design language (AADL) environment. Simulation results show that 3 types of injected attacks can be quickly defended by using the proposed protection approach.
Sponsor: This work was partially supported by Natural Science Foundation of China (Nos. 61272204 and 61433006) and the Fundamental Research Funds for the Central Universities, China (No. 2013ZZGH006).
Version: Published
DOI: 10.1007/s11633-015-0923-9
URI: https://dspace.lboro.ac.uk/2134/26721
Publisher Link: https://doi.org/10.1007/s11633-015-0923-9
ISSN: 1476-8186
Appears in Collections:Closed Access (Computer Science)

Files associated with this item:

File Description SizeFormat
IJAC-2014-04-103.pdfPublished version5.01 MBAdobe PDFView/Open

 

SFX Query

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.