Security Challenges in Next Generation Cyber Physical Systems
نویسندگان
چکیده
The advent of low-powered wireless networks of embedded sensors has spurred the development of new applications at the interface between the real world and its digital manifestation. Following this trend, the next generation Supervisory Control And Data Acquisition (SCADA) system is expected to replace traditional data gathering – a distributed network of Remote Terminal Units (RTU) or Programmable Logic Controllers (PLC), with devices such as the wireless sensing devices. Before these intelligent systems can be deployed in critical infrastructure such as emergency rooms and power plants, the security properties of sensors must be fully understood. Existing wisdom has been to apply the traditional security models and techniques to sensor networks: as in conventional computing environments, the goal has been to protect physical entities: devices, packets, links, and ultimately networks. Sensors have unique characteristics that warrant novel security considerations: the geographic distribution of the devices allows an attacker to physically capture nodes and learn secret key material, or to intercept or inject messages; the hierarchical nature of sensor networks and their route maintenance protocols permit the attacker to determine where the root node is placed. Perhaps most importantly, most sensor networks rely on redundancy (followed by aggregation) to accurately capture environmental information even with poorly calibrated and unreliable devices. This results in a fundamental distinction between a physical message in a sensor network and a logical unit of sensed information: a message with a single sensor reading may reveal very little information about the real environment, whereas a message containing an aggregate or collection of readings may reveal a great deal more. These characteristics open the door for an entirely new security paradigm: one that acknowledges that there is a fundamental distinction between physical messages and logical information, and that focuses on how to minimize the correlation between the two in order to limit opportunities for compromise. In this position paper, we enlist challenges for sensor networks – security obstacles that, when overcome, move us closer to deploying them in large numbers for monitoring and protecting critical infrastructures.
منابع مشابه
A Survey on Security and Privacy in Emerging Sensor Networks: From Viewpoint of Close-Loop
Nowadays, as the next generation sensor networks, Cyber-Physical Systems (CPSs) refer to the complex networked systems that have both physical subsystems and cyber components, and the information flow between different subsystems and components is across a communication network, which forms a closed-loop. New generation sensor networks are found in a growing number of applications and have rece...
متن کاملAn Overview and Some Challenges in Cyber-Physical Systems
Technological advances in computing, communications, and control, have set the stage for a next generation of engineered systems, called cyber-physical systems (CPS). These systems can potentially be important in overcoming many challenges in energy, environment, transportation, and health care. In this paper, we discuss some of these grand challenges that necessitate further advances in CPS. W...
متن کاملCyber-Physical Systems: A Perspective at the Centennial
Cyber-Physical Systems (CPS) are a next generation of engineered systems in which computing, communication, and control technologies are tightly integrated. Research on CPSs is fundamentally important for engineered systems in many important application domains such as transportation, energy, and medical systems. We overview CPS research from both a historical point of view in terms of technolo...
متن کاملDesign and Implementation of Attack-Resilient Cyber-Physical Systems
In recent years, we have witnessed a significant increase in the number of security related incidents in control systems. These include high-profile attacks in a wide range of application domains – from attacks on critical infrastructure, as in the case of the Maroochy Water breach [1], and industrial systems (e.g., the StuxNet virus attack on an industrial SCADA system [2], [3]), to attacks on...
متن کاملApproaches to Modeling and Simulation for Dynamic, Distributed Cyber-Physical Systems
In this paper we discuss challenges and new directions in modeling and simulation for effects-based what-if and sensitivity analysis of dynamic, distributed cyber-physical systems. We are motivated on one hand by the critical need to reliably understand how mission-critical cyber-physical systems would respond to unanticipated effects, and on the other hand by the technology gap that has preven...
متن کاملThe Advanced Course in Engineering on Cyber Security
The Advanced Course in Engineering on Cyber Security (ACE-CS) is a publicprivate partnership to develop top ROTC cadets into the next generation of cyber security leaders. Modeled after the General Electric Advanced Course in Engineering, ACE-CS immerses students in the cyber-security discipline through a combination of intense coursework, open-ended problems, and concurrent internships. In thi...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2006