Cyber Physical Systems: The Role of Machine Learning and Cyber Security in Present and Future
Today’s technology are changing very rapidly and making an important place in the heart of humans. For example, when internet connected things after connect with other devices, they make a big system which solve complex problems and make people life easier and longer to live. One of biggest/ popular revolution of technology is “Cyber Physical System”. Cyber Physical systems (CPSs) are the systems/ mechanism which are controlled and monitored remotely. CPSs system work with connecting other systems through Internet and its users (by computer-based algorithms). In near future in Industry 4.0 revolution, the uses of cyber physical systems will be on top position. Using such systems give invitation to attackers for performing attacks. But, an attacker can harm a physical and cyber space easily, i.e., affecting physical processes will affect computations (also efficiency of CPS systems). For example, nuclear facilities were affected in 2010 (in Iran) by poplar attack “Stuxnet”. Also, an attacker can control a medical device remotely which will be affected the condition of patients (also will leak private information of patient/ hospital employee). Such serious concerns are being highlighted in this article using machine learning and cyber security frequently (time to time) or an alternative schedule. Maintaining such system is really a difficult task, so if do we can save a lot of energies and unwanted attacks, etc., in overall. Hence, this article is being written with considering future serious concerns and challenges with CPSs, and listing out of such critical issues one by one (in detail).
V.Perez and Alberto, “Applications of AI to Network Security”, 2018.doi: 10.13140/RG.2.2.29373. 56803
J. Z. Li, H. Gao, and B. Yu, “Concepts, features, challenges, and research progresses of CPSs,” Development Report of China Computer Science in 2009, pp. 1-17.
R. Rajkumar, “CPS briefing,” Carnegie Mellon University, May 2007.
B. H. Krogh, “Cyber Physical Systems: the need for new models and design paradigms,” Presentation Report, Carnegie Mellon University.
B. X. Huang, “Cyber Physical Systems: A survey,” Presentation Report, Jun 2008.
H.A.Nasser , A.Gasim and P.Shahbaz. “IOT Services Impact as a Driving Force on Future Technologies by Addressing Missing Dots”.16th International Conference on Applied Computer Science (ACS '16), Istanbul, Turkey, 15-17 April 2016
S. Abu-Nimeh, D. Nappa, X. Wang, and S. Nair, “A Comparison of Machine Learning Techniques for Phishing Detection”, APWG eCrime Researchers Summit, October 4-5, 2007, Pittsburg, PA.
W. Zhuang, Y. Ye, Y. Chen, and T. Li, “Ensemble Clustering for Internet Security Applications”, in IEEE xplore, December 17, 2012.
T. Subbulakshmi, S. M. Shalinie, and A. Ramamoorthi, “Detection and Classification of DDoS Attacks using Machine Learning Algorithms”, European Journal of Scientific Research, ISSN 1450216X, Volume 47, No. 3, pp. 334 – 346, 2010.
H. Sedjelmaci, and M. Feham, “Novel Hybrid Intrusion Detection System for Clustered Wireless Sensor Network”, International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.4, July 2011.
K. Revett et al., “A machine learning approach to keystroke dynamics based user authentication”, International Journal of Electronic Security and Digital Forensics, Vol. 1, No. 1, 2007.
K. Chellapilla and P. Y. Simard, “Using Machine Learning to Break Visual Human Interaction Proofs (HIPs)”, in Advances in Neural Information Processing Systems 17, pp. 265-272, 2005.
P.Y.Simard, D. Steinkraus and J.Platt. “Best Practice for Convolutional Neural Networks Applied to Visual Document Analysis,” in International Conference on Document Analysis and Recognition (ICDAR),2003. pp. 958-962, IEEE Computer Society, Los Alamitos.
W. Yu and J. Cao, “Cryptography based on delayed chaotic neural networks”, Physics Letters A, Vol. 356, Issues 4–5, pp. 333-338, ISSN 0375-9601, August 14, 2006.
W. Kinzel and I. Kanter, “Neural Cryptography”, in Proceedings of the 9th International Conference on Neural Information Processing, Vol. 3, pp. 1351-1354, November 18-22, 2002.
K. Lee, J. Caverlee, and S. Webb, “Uncovering social spammers: social honeypots + machine learning”, SIGIR’10, July 19-23, 2010, Geneva, Switzerland
Mackenzie Gavel,ABI research blog, https://www.prnewswire.com/
M. Shamila, K. Vinuthna and T. Amit Kumar.” A Review on Several Critical Issues and Challenges in IoT based e-Healthcare System”. IEEE
Networking and Information Technology Research and Development Subcommittee. The National Artiﬁcial Intelligence Research and Development Strategic Plan; Executive Ofﬁce of the President or the United States: Washington, DC, USA, 2016.
M.Törngren and U.Sellgren, “Complexity Challenges in Development of Cyber-Physical Systems”, In Principles of Modelling, Springer: Cham, Switzerland, 2018, Volume 10760, doi:10.1007/978-3-319-95246-8_27.
M.Zhang, B.Selic, S.Ali, T.Yue, O.Okariz, and R.Norgren, “Understanding Uncertainty in Cyber-Physical Systems: A Conceptual Model”, In Proceedings of the 12th European Conference on Modelling Foundations and Applications, Vienna, Austria, 4–8 July 2016,Springer-Verlag: Berlin/Heidelberg, Germany, 2016, Volume 9764, pp. 247–264, doi:10.1007/978-3-319-42061-5_16.
L.Bainbridge, “Ironies of automation”, Automatica,1983, 19, 775–779, doi:10.1016/B978-0-08-029348-6.50026-9.
W.Waymo, “ Safety Report: On the road to Fully Self-Driving”, 2018,Available online: https://storage. googleapis.com/sdc-prod/v1/safety-report/Safety%20Report%202018.pdf.
M.Wagner and P.Koopman, “A Philosophy for Developing Trust in Self-driving cars”, In Road Vehicle Automation2, Springer: Cham, Switzerland, 2015, pp. 163–171, doi:10.1007/978-3-319-19078-5_14.
D.Amodei, C.Olah, J.Steinhardt, P.Christiano, J.Schulman and D.Mané, “Concrete Problems in AI Safety”, arXiv 2016, arXiv:1606.06565.
S.Engells, “European Research Agenda for Cyber-Physical Systems of Systems and Their Engineering Needs”, 2015, Available online: http://www.cpsos.eu/wp-content/uploads/2016/06/CPSoS-D3.2-Policy-ProposalEuropean-Research-Agenda-for-CPSoS-and-their-engineering-needs.pdf
N.Falliere, L.O.Murchu and E.Chien, W32, stuxnet dossier, White paper, Symantec Corp., Security Response, 2011.
D.Potop-Butucaru, R.de Simone and J.P.Talpin, “The synchronous hypothesis and synchronous languages”, In Richard, Z. (ed.): Embedded Systems Handbook, CRC Press, 2006.
R.Okuda, Y.Kajiwara and K.Terashima, “A survey of technical trend of ADAS and autonomous driving”, In: Proceedings of Technical Program, 2014, International Symposium on VLSI Technology, Systems and Application (VLSI-TSA), pp. 1–4 (2014). doi:10.1109/ VLSI-TSA.2014.6839646
C.Auffermann, A.Kamagaev, A.Nettsträter, M.tenHompel, A.Vastag, K.Verbeek and O. Wolf, “Cyber physical systems in logistics”, http://www.efﬁzienzcluster.de/ﬁles/9/5/938_ scientiﬁc_paper_cyber_physical_systems_in_logistics.pdf
K.Morik, et al., “Collaborative research centre on resource constrained machine learning”, 2015, http://www.sfb876.tu-dortmund.de
“National Instruments: Overview of structural health monitoring solutions”, 2014,www.ni. com/white-paper/8426/en/pdf
Tyagi. Amit Kumar, “Cyber physical systems (cpss) â [euro]" opportunities and challenges for improving cyber security”, International Journal of Computer Applications, 2016,137 (14).
Meghna Manoj Nair,Tyagi Amit Kumar, Richa Goyal, “Medical Cyber Physical Systems and Its Issues,International Conference on Recent Trends in Advanced Computing 2019, ICRTAC 2019, Procedia Computer Science 00 (2019) 000–000, 2019.
Shah Ahsanul Haque,Syed Mahfuzul Aziz, Mustafizur Rahman,“Review of Cyber-Physical System in Healthcare”, International Journal of Distributed SensorNetworks, 2014.
Chunxiao Li, A. Raghunathan, and N.K. Jha. Hijacking an insulin pump: Security attacks and defenses for a diabetes therapy system. In e-Health Networking Applications and Services (Healthcom), 2011 13th IEEE International Conference on, pages 150–156, June 2011.
D. Halperin, T.S. Heydt-Benjamin, B. Ransford, S.S. Clark, B. Defend, W. Morgan, K. Fu, T. Kohno, and W.H. Maisel. Pacemakers and implantable cardiac defibrillators: Software radio attacks and zeropowerdefenses. In Security and Privacy, 2008. SP 2008. IEEE Symposium on, pages 129–142, May 2008.
Chun-Hao Lo and Nirwan Ansari, “ The Progressive Smart Grid System from Both Power and Communications Aspects”, IEEE Communications Surveys & Tutorials, Vol. 14, No. 3, Third Quarter 2012.
Zhuo Lu, Xiang Lu, Wenye Wang, and Cliff Wang. Review and evaluation of security threats on the communication networks in the smart grid. In MILITARY COMMUNICATIONS CONFERENCE, 2010- MILCOM 2010, pages 1830–1835. IEEE, 2010.
Yao Liu, Peng Ning, and Michael K Reiter. False data injection attacks against state estimation in electric power grids. ACM Transactions on Information and System Security (TISSEC), 14(1):13, 2011.
Andres Molina-Markham, Prashant Shenoy, Kevin Fu, Emmanuel ´ Cecchet, and David Irwin. Private memoirs of a smart meter. In Proceedings of the 2nd ACM workshop on embedded sensing systems for energy-efficiency in building, pages 61–66. ACM, 2010.
Eric Byres and Justin Lowe. The myths and facts behind cyber security risks for industrial control systems. In Proceedings of the VDE Kongress, volume 116, 2004.
Ellen Nakashima and Steven Mufson. Hackers have attacked foreign utilities, cia analyst says. Washington Post, 19, 2008.
FOX News Network. Threat to the grid? details emerge of sniper attack on power station. http://www.foxnews.com/politics/2014/02/06/ 2013- sniper-attack- on- power- grid- still-concern-in-washington-andfor-utilities/, 2014.
InvestmentWatch. First time in history, a terrorist attack on the electric power grid has blacked-out an entire nation in this case yemen. http: //investmentwatchblog.com/first-time-in-history-a-terrorist-attack-onthe - electric - power- grid - has - blacked - out - an - entire - nation - in - this - case-yemen, 2014.
Stephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, HovavShacham, Stefan Savage, Karl Koscher, Alexei Czeskis, Franziska Roesner, and Tadayoshi Kohno. Comprehensive experimental analyses of automotive attack surfaces. In USENIX Security Symposium, 2011.
Tobias Hoppe, Stefan Kiltz, and Jana Dittmann. Security threats to automotive can networks — practical examples and selected short-term countermeasures. In Proceedings of the 27th International Conference on Computer Safety, Reliability, and Security, SAFECOMP ’08, pages 235–248, Berlin, Heidelberg, 2011. Springer-Verlag.
K. Koscher, A. Czeskis, F. Roesner, S. Patel, T. Kohno, S. Checkoway, D. McCoy, B. Kantor, D. Anderson, H. Shacham, and S. Savage. Experimental security analysis of a modern automobile. In Security and Privacy (SP), 2010 IEEE Symposium on, pages 447–462, May 2010.
Yasser Shoukry, Paul Martin, Paulo Tabuada, and Mani Srivastava. Non-invasive spoofing attacks for anti-lock braking systems. In Cryptographic Hardware and Embedded Systems-CHES 2013, pages 55–72. Springer, 2013.
D. Mourtzis, “Challenges and future perspectives for the life cycle of manufacturing networks in the mass customisation era”, Springer Berlin Heidelberg,2016.
Symantec Security Response. Dragonfly: Western energy companies under sabotage threat. http://www. symantec.com/connect/ blogs/ dragonfly-western-energy-companies-under-sabotage-threat, 2014.
Alvaro A Cardenas, Saurabh Amin, and Shankar Sastry. Research ´ challenges for the security of control systems. In HotSec, 2008.
Cristina Alcaraz and SheraliZeadally. Critical control system protection in the 21st century: Threats and solutions. 2013.
Igor NaiFovino, Andrea Carcano, Marcelo Masera, and Alberto Trombetta. An experimental investigation of malware attacks on scada systems. International Journal of Critical Infrastructure Protection, 2(4):139–145, 2009.
M.Khalil, Ahmad Yousef, Anas AlMajali,Salah Abu Ghalyon,Waleed Dweik,and Bassam J. Mohd1 “Analyzing Cyber-Physical Threats on Robotic Platforms”, Sensors (Basel, Switzerland), vol. 18,5 1643, 21 May. 2018, doi:10.3390/s18051643
Chowdhury, Abdullahi, GourKarmakar and JoarderKamruzzaman. "Survey of Recent Cyber Security Attacks on Robotic Systems and Their Mitigation Approaches." Detecting and Mitigating Robotic Cyber Security Risks. IGI Global, 2017. 284-299. Web. 30 Oct. 2019. doi:10.4018/978-1-5225-2154-9.ch019.
A. Vuorio, T. Laukkala, I. Junttila, R. Bor, B. Budowle, E. Pukkala, and A. Sajantila, “Aircraft-Assisted Pilot Suicides in the General Aviation Increased for One-Year Period after 11 September 2001 Attack in the United States”, International journal of environmental research and public health, 15(11), 2525, doi:10.3390/ijerph15112525, 2018.
Kumar, Kadupukotla Satish and P. S. Ramaiah. “Hazard Analysis and Metrics Identification for Software Safety in Medical Cyber-Physical Systems”, 2016.
Cyber-Security in Smart Grid: Survey and Challenges Z. Elmrabet1 , H. Elghazi1 , N. Kaabouch2 , H. Elghazi1,https://arxiv.org ›
Amara, Dinesh &Chebrolu, Naga & R, Vinayakumar&Kp, Soman. (2018). A Brief Survey on Autonomous Vehicle Possible Attacks, Exploits and Vulnerabilities.
Alvaro A. Cárdenas, Saurabh Amin, Zong-Syun Lin, Yu-Lun Huang, Chi-Yen Huang, Shankar Sastry, “highAttacks against process control systems: risk assessment, detection, and response”, ASIACCS '11 Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security,355-366.
Francisco J. Rodríguez Lera, Camino Fernández Llamas, Ángel Manuel Guerrero and Vicente Matellán Olivera, “Cybersecurity of Robotics and Autonomous Systems: Privacy and Safety”, DOI: 10.5772/intechopen.69796.
Copyright (c) 2019 sravanthi reddy k, sHAMILA M, Amit Kumar Tyagi
This work is licensed under a Creative Commons Attribution 4.0 International License.
The author warrants that the article is original, written by stated author(s), has not been published before, contains no unlawful statements, does not infringe the rights of others, is subject to copyright that is vested exclusively in the author and free of any third party rights, and that any necessary written permissions to quote from other sources have been obtained by the author(s).