scholarly journals Approach to classification of the information security state of elements for cyber-physical systems by applying side electromagnetic radiation

Author(s):  
V.V. Semenov ◽  
I.S. Lebedev ◽  
M.E. Sukhoparov
Author(s):  
Dmitry Levshun ◽  
Diana Gaifulina ◽  
Andrey Chechulin ◽  
Igor Kotenko

This paper is an analysis and systematization of modern research in the field of cyber-physical system information security. The problematic issues of information security of such systems are considered: «what is being attacked?», «who is attacking?», «why is someone attacking?», «how is someone attacking?» and «how to protect the system?». As an answer to the first question, the paper proposes a definition and classification of cyber-physical systems according to such criteria as complexity, connectivity, criticality and social aspect. As an answer to the second and the third questions, the paper describes a classification of attacker according to such criteria as type of access, method of access, intentions, knowledge and resources. As  an answer to the fourth question, the paper contains a classification of attack actions according to such criteria as subject and object, method of influence, prerequisites and consequences. As an answer to the fifth question, the paper proposes a classification of protection methods and security tools according to such criteria as principle of operation, object of protection and task to be solved. The scientific significance of the paper is systematization of a current state of the art in the subject area. The practical value of the paper is providing information about security issues that are specific to cyber-physical systems, which will allow one to develop, manage and use such systems in a more secure way.


Information security can be efficiently provided by the sound structured information and a set of specialized experts in the field of IT and CPS. The interconnection among the systems in the CPS imposes a new challenge in providing security to CPS. A concise study of CPS security is given in this chapter. The problem of secure control systems is also indentified and defined. The way the information security and control theory guards the system is explored. The security of CPSs can be enhanced using a particular set of challenges, which are also described later in this chapter. The resistance to malicious events is strengthening as cyber physical systems are part of critical structures. The CPSs are time sensitive in nature, unlike the distributed system where a little amount of delay is acceptable.


2020 ◽  
Vol 175 ◽  
pp. 05038
Author(s):  
Marina Ganzhur ◽  
Nikita Dyachenko ◽  
Andrey Gazizov ◽  
Arthur Otakulov ◽  
Dmitry Romanov

Cyber-physical systems are actively explored in the global and domestic scientific community. It is expected that cyber-physical systems will minimize human participation in the production process, as well as in many other areas of society. At the same time, the information security aspect of the interaction of elements remains insufficiently studied. The classical approach to ensuring security is aimed at counteracting a clear destructive information impact - when information security breaches have obvious signs. The risk of failure of one object of the system can lead to critical conditions. Safety modeling of managerial structures is reduced to considering the operability of the functions of the intermediate link and the interaction between objects that make decisions on the management and generating teams. By analyzing these transitions in limiting cases, it allows the use of analysis and synthesis approaches based on structural schemes and logical relationships.


2021 ◽  
Vol 16 (92) ◽  
pp. 72-81
Author(s):  
Emil A. Gumerov ◽  
◽  
Tamara V. Alekseeva ◽  

Cyber-physical systems are a means of effectively managing industrial applications of the Internet of things. Physical layer cyber-physical system implements the control devices of the industrial Internet of things and intelligent algorithms digital system level provide management and information security applications. Effective management and information security determine the success of the industrial Internet of things, so the research topic is relevant. The purpose of this article is to develop an optimal architecture of a cyber-physical system based on the principles of data processing at the place of their occurrence and the application of a control action at the place of the problem occurrence. The authors were faced with the task of exploring all the possibilities associated with the application of the proposed principles and developing an optimal application architecture for the industrial Internet of things. In the study proposed the concept of intelligent application of industrial Internet of things, which enables processing of continuously generated data in their source and provides application control action to the location of the problem. The proposed solution: a) increases the information security of the industrial application of the Internet of things (data is not transmitted over the network) and b) prevents an attack on the software of the Industrial application of the Internet of things. The solution can be used by developers of industrial IoT systems to effectively launch and implement projects


Sign in / Sign up

Export Citation Format

Share Document