Autonomous Defenses for Security Attacks in Pervasive CPS Infrastructure

نویسندگان

  • Anthony D. Wood
  • Vijay Srinivasan
  • John A. Stankovic
چکیده

Cyber-physical systems (CPS) integrate computation with sensing, control, and physical systems and will enable development of next-generation services and smart infrastructure across many application domains. However, a significant impediment to the use of CPS in trusted and trustworthy systems is their vulnerability to security attacks. Some properties of CPS that exacerbate security concerns are intrinsic to the systems, and so cannot be deferred for later reconciliation with an already functional system. First, risk of security threats grows with the value and criticality of the assets under control of the CPS. Second, an open, distributed, pervasive system has a large attack surface because it is easily accessible by attackers. These concerns are exacerbated by the long lifetimes of CPS that guarantee the evolution of unforeseen attacks after the systems are fielded. Finally, as a platform for CPS, wireless sensor networks (WSN) also have resource constraints that increase asymmetries between the system and its attackers. In this article, we first describe examples of active and passive attacks on CPS security and then propose design requirements and solution approaches based on results from our previous work. We argue that trustworthy CPS must be designed for robustness using autonomous defenses, clusters of solutions, and the right mix of randomization and regularization to allow continued operation despite unforeseen attacks.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Towards the Science of Security and Privacy in Machine Learning

Advances in machine learning (ML) in recent years have enabled a dizzying array of applications such as data analytics, autonomous systems, and security diagnostics. ML is now pervasive—new systems and models are being deployed in every domain imaginable, leading to rapid and widespread deployment of software based inference and decision making. There is growing recognition that ML exposes new ...

متن کامل

A Security Architecture in Cyber-Physical Systems: Security Theories, Analysis, Simulation and Application Fields

Governments, companies, universities and research institutes are pushing the research and development of cyber-physical systems (CPS). However, the development of cyberphysical systems is constrained by security factors. According to this situation, this paper put forward a CPS security model, which contains security objectives, basic theories, simulation, and CPS framework, summarizes security...

متن کامل

Managing and Securing Critical Infrastructure - A Semantic Policy and Trust driven approach∗

Cyber physical systems (CPS) and cyber infrastructure are a key elements of the national infrastructure, and securing them is of vital importance to national security. There is ample evidence that these systems are vulnerable to disruption and damage due to natural disasters social crises, and terrorism. CPS applications are becoming more widespread, ranging from healthcare patient monitoring s...

متن کامل

Security Issues of Cyber Physical System: A Review

Cyber Physical System (CPS) is extensively used in various fields like critical infrastructure control, vehicular system and transportation, social networking, medical and healthcare systems. The security concern for CPS is of utmost importance. CPS is vulnerable to many kinds of attacks that may cause major loss and potential security risk. In this paper, we will elaborate the requirement of s...

متن کامل

The Economic Incentives Of Providing Network Security Services On The Internet Infrastructure

Distributed denial-of-service (DDOS) attacks have emerged as a prevalent way to compromise the availability of networks/servers, which imposed financial losses for e-commerce businesses. Many defenses that mitigate the effect of ongoing DDOS attacks have been proposed. However, none of the defenses have been widely deployed on the Internet infrastructure at this point because of a lack of under...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009