[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
survey

Cybersecurity of Industrial Cyber-Physical Systems: A Review

Published: 09 September 2022 Publication History

Abstract

Industrial cyber-physical systems (ICPSs) manage critical infrastructures by controlling the processes based on the “physics” data gathered by edge sensor networks. Recent innovations in ubiquitous computing and communication technologies have prompted the rapid integration of highly interconnected systems to ICPSs. Hence, the “security by obscurity” principle provided by air-gapping is no longer followed. As the interconnectivity in ICPSs increases, so does the attack surface. Industrial vulnerability assessment reports have shown that a variety of new vulnerabilities have occurred due to this transition. Although there are existing surveys in this context, very little is mentioned regarding the outputs of these reports. While these reports show that the most exploited vulnerabilities occur due to weak boundary protection, these vulnerabilities also occur due to limited or ill-defined security policies. However, current literature focuses on intrusion detection systems (IDSs), network traffic analysis (NTA) methods, or anomaly detection techniques. Hence, finding a solution for the problems mentioned in these reports is relatively hard. We bridge this gap by defining and reviewing ICPSs from a cybersecurity perspective. In particular, multi-dimensional adaptive attack taxonomy is presented and utilized for evaluating real-life ICPS cyber incidents. Finally, we identify the general shortcomings and highlight the points that cause a gap in existing literature while defining future research directions.

References

[1]
Ferran Adelantado, Xavier Vilajosana, Pere Tuset-Peiro, Borja Martinez, Joan Melia-Segui, and Thomas Watteyne. 2017. Understanding the limits of LoRaWAN. IEEE Commun. Mag. 55, 9 (2017), 34–40.
[2]
Jai Agaram, John Andary, Douglas Effenberger, Kent Peterson, Steven Strauss, and Steve Taylor. 2018. Building Automation System Procurement Guide. Retrieved August 13, 2020 from https://www2.calstate.edu/csu-system/doing-business-with-the-csu/capital-planning-design-construction/operations-center/Documents/guidelines/Controls-Procurement-Guide-12-Dec-2018%20.pdf.
[3]
Mohiuddin Ahmed, Abdun Naser Mahmood, and Jiankun Hu. 2016. A survey of network anomaly detection techniques. J. Netw. Comput. Appl. 60 (2016), 19–31.
[4]
Ian F. Akyildiz, Weilian Su, Yogesh Sankarasubramaniam, and Erdal Cayirci. 2002. Wireless sensor networks: A survey. Comput. Netw. 38, 4 (2002), 393–422.
[5]
Saba Al-Rubaye, Ekhlas Kadhum, Qiang Ni, and Alagan Anpalagan. 2019. Industrial Internet of Things driven by SDN platform for smart grid resiliency. IEEE Internet Things J. 6, 1 (Feb. 2019), 267–277.
[6]
Cristina Alcaraz, Rodrigo Roman, Pablo Najera, and Javier Lopez. 2013. Security of industrial sensor network-based remote substations in the context of the Internet of Things. Ad Hoc Netw. 11, 3 (May 2013), 1091–1104.
[7]
Thiago Alves and Thomas Morris. 2018. OpenPLC: An IEC 61,131–3 compliant open source industrial controller for cyber security research. Comput. Secur. 78 (Sept. 2018), 364–379.
[8]
Sharath Anand and Riya Regi. 2018. Remote monitoring of water level in industrial storage tanks using NB-IoT. In 2018 International Conference on Communication Information and Computing Technology (ICCICT’18). IEEE, Mumbai, 1–4.
[9]
Manos Antonakakis, Tim April, Michael Bailey, Matthew Bernhard, Elie Bursztein, Jaime Cochran, Zakir Durumeric, J. Alex Halderman, Luca Invernizzi, Michalis Kallitsis, Deepak Kumar, Chaz Lever, Zane Ma, Joshua Mason, Damian Menscher, Chad Seaman, Nick Sullivan, Kurt Thomas, and Yi Zhou. 2017. Understanding the Mirai Botnet. In 26th USENIX Security Symposium (USENIX Security’17). USENIX, Vancouver, BC, Canada, 1093–1110.
[10]
Scott D. Applegate and Angelos Stavrou. 2013. Towards a cyber conflict taxonomy. In 2013 5th International Conference on Cyber Conflict (CYCON’13). IEEE, Tallinn, Estonia, 1–18.
[11]
Michael J. Assante and Robert M. Lee. 2015. The Industrial Control System Cyber Kill Chain. Retrieved August 15, 2020 from https://scadahacker.com/library/Documents/White_Papers/SANS%20-%20ICS%20Cyber%20Kill%20Chain.pdf.
[12]
Smak Azad and K. Srinivasan. 2017. Delay analysis of ControlNet and DeviceNet in distributed control system. In Proceedings of the 2nd International Conference on Intelligent Computing and Applications, P. Deiva Sundari, Subhransu Sekhar Dash, Swagatam Das, and Bijaya Ketan Panigrahi (Eds.). Vol. 467. Springer Singapore, Singapore, 617–626. Series Title: Advances in Intelligent Systems and Computing.
[13]
bacnet.org. 2020. BACnet. Retrieved August 22, 2020 from http://www.bacnet.org/.
[14]
Craig Bakker, Arnab Bhattacharya, Samrat Chatterjee, and Draguna L. Vrabie. 2020. Hypergames and cyber-physical security for control systems. ACM Trans. Cyber-Physical Syst. 4, 4 (Aug. 2020), 1–41.
[15]
Viacheslav Belenko, Vasiliy Krundyshev, and Maxim Kalinin. 2018. Synthetic datasets generation for intrusion detection in VANET. In Proceedings of the 11th International Conference on Security of Information and Networks. 1–6.
[16]
Paolo Bellagente, Paolo Ferrari, Alessandra Flammini, Stefano Rinaldi, and Emiliano Sisinni. 2016. Enabling PROFINET devices to work in IoT: Characterization and requirements. In IEEE International Instrumentation and Measurement Technology Conference Proceedings. IEEE, Taipei, Taiwan, 1–6.
[17]
Stephan Berger, Olga Bürger, and Maximilian Röglinger. 2020. Attacks on the Industrial Internet of Things—Development of a multi-layer taxonomy. Comput. Secur. 93 (June 2020), 101790.
[18]
Naoufel Boulila. 2019. Cyber-Physical Systems and Industry 4.0: Properties, Structure, Communication, and Behavior. Technical Report. Siemens Corporate Technology.
[19]
Harmandeep Singh Brar and Gulshan Kumar. 2018. Cybercrimes: A proposed taxonomy and challenges. J. Comput. Netw. Commun. 2018 (2018), 1–11.
[20]
Bill Briggs. 2019. Hackers Hit Norsk Hydro With Ransomware. The Company Responded With Transparency. Retrieved August 27, 2020 from https://news.microsoft.com/transform/hackers-hit-norsk-hydro-ransomware-company-responded-transparency/.
[21]
Christopher Bronk and Eneken Tikk-Ringas. 2013. The cyber attack on Saudi Aramco. Survival 55, 2 (May 2013), 81–96.
[22]
Steven T. Bushby and H. Michael Newman. 2002. BACnet today. ASHRAE J. 10 (2002), 10–18.
[23]
Bin Cao, Jianwei Zhao, Yu Gu, Shanshan Fan, and Peng Yang. 2020. Security-aware industrial wireless sensor network deployment optimization. IEEE Trans. Ind. Inform. 16, 8 (Aug. 2020), 5309–5316.
[24]
capec.mitre.org. 2019. CAPEC - CAPEC List Version 3.3. Retrieved August 21, 2020 from http://capec.mitre.org/data/index.html.
[25]
Ian M. Chapman, Sylvain P. Leblanc, and Andrew Partington. 2011. Taxonomy of cyber attacks and simulation of their effects. In Proceedings of the 2011 Military Modeling and Simulation Symposium (MMS’11). Society for Computer Simulation Int., San Diego, CA, 73–80.
[26]
Abdellah Chehri and Rachid Saadane. 2019. Zigbee-based remote environmental monitoring for smart industrial mining. In Proceedings of the 4th International Conference on Smart City Applications (SCA’19). Association for Computing Machinery, New York, NY, Article 111, 6 pages.
[27]
Manuel Cheminod, Luca Durante, and Adriano Valenzano. 2013. Review of security issues in industrial networks. IEEE Trans. Ind. Inform. 9, 1 (Feb. 2013), 277–293.
[28]
A. Chemudupati, S. Kaulen, M. Mertens, and S. Zimmermann. 2012. The Convergence of It and Operational Technology. Retrieved August 11, 2020 from https://fieldcommgroup.org/services/product-testing-registration.
[29]
Rui-Yang Chen. 2017. An intelligent value stream-based approach to collaboration of food traceability cyber physical system by fog computing. Food Control 71 (Jan. 2017), 124–136.
[30]
Thomas M. Chen. 2010. Stuxnet, the real start of cyber warfare? [Editor’s Note]. IEEE Netw. 24, 6 (Nov. 2010), 2–3.
[31]
CISCO. 2018. IT/OT Convergence: Moving Digital Manufacturing Forward. Technical Report. CISCO. 9 pages.
[32]
Daniel-Ioan Curiac. 2016. Towards wireless sensor, actuator and robot networks: Conceptual framework, challenges and perspectives. J. Netw. Comput. Appl. 63 (March 2016), 14–23.
[33]
Li Da Xu, Wu He, and Shancang Li. 2014. Internet of Things in industries: A survey. IEEE Trans. Ind. Inform. 10, 4 (Nov. 2014), 2233–2243.
[34]
Seyed Mahdi Darroudi and Carles Gomez. 2017. Bluetooth low energy mesh networks: A survey. Sensors 17, 7 (June 2017), 1467.
[35]
Ashok Kumar Das, Mohammad Wazid, Neeraj Kumar, Athanasios V. Vasilakos, and Joel J. P. C. Rodrigues. 2018. Biometrics-based privacy-preserving user authentication scheme for cloud-based industrial Internet of Things deployment. IEEE Internet Things J. 5, 6 (Dec. 2018), 4900–4913.
[36]
Raimarius Delgado, Shin-Young Kim, Bum-Jae You, and Byoung-Wook Choi. 2016. An EtherCAT-based real-time motion control system in mobile robot application. In Proceedings of the 2016 13th International Conference on Ubiquitous Robots and Ambient Intelligence (URAI’16). IEEE, Xian, China, 710–715.
[37]
Jerker Delsing, Fredrik Rosenqvist, Oscar Carlsson, Armando W. Colombo, and Thomas Bangemann. 2012. Migration of industrial process control systems into service oriented architecture. In IECON 2012-38th Annual Conference on IEEE Industrial Electronics Society. IEEE, Montreal, QC, Canada, 5786–5792.
[38]
Yuri Demchenko, Canh Ngo, Cees De Laat, and Craig Lee. 2014. Federated access control in heterogeneous intercloud environment: Basic models and architecture patterns. In 2014 IEEE International Conference on Cloud Engineering. IEEE, 439–445.
[39]
Derui Ding, Qing-Long Han, Zidong Wang, and Xiaohua Ge. 2019. A Survey on model-based distributed control and filtering for industrial cyber-physical systems. IEEE Trans. Ind. Inform. 15 (May 2019), 2483–2499.
[40]
Derui Ding, Qing-Long Han, Yang Xiang, Xiaohua Ge, and Xian-Ming Zhang. 2018. A survey on security control and attack detection for industrial cyber-physical systems. Neurocomputing 275 (Jan. 2018), 1674–1683.
[41]
dnp.org. 2004. DNP Users Group. Retrieved June 11, 2020 from https://www.dnp.org/About/DNP-Users-Group.
[42]
Zakarya Drias, Ahmed Serhrouchni, and Olivier Vogel. 2015. Taxonomy of attacks on industrial control protocols. In Proceedings of the 2015 International Conference on Protocol Engineering (ICPE’15) and International Conference on New Technologies of Distributed Systems (NTDS’15). IEEE, Paris, France, 1–6.
[43]
Chethana Dukkipati, Yunpeng Zhang, and Liang Chieh Cheng. 2018. Decentralized, blockchain based access control framework for the heterogeneous internet of things. In Proceedings of the 3rd ACM Workshop on Attribute-Based Access Control. 61–69.
[44]
Samuel East, Jonathan Butts, Mauricio Papa, and Sujeet Shenoi. 2009. A taxonomy of attacks on the DNP3 protocol. In International Conference on Critical Infrastructure Protection, Charles Palmer and Sujeet Shenoi (Eds.). Vol. 311. Springer, Berlin, 67–81. Series Title: IFIP Advances in Information and Communication Technology.
[45]
[46]
Ahmad E. Elhabashy, Lee J. Wells, Jaime A. Camelio, and William H. Woodall. 2019. A cyber-physical attack taxonomy for production systems: A quality control perspective. J. Intell. Manuf. 30, 6 (Aug. 2019), 2489–2504.
[47]
Alireza Esfahani, Georgios Mantas, Rainer Matischek, Firooz B. Saghezchi, Jonathan Rodriguez, Ani Bicaku, Silia Maksuti, Markus G. Tauber, Christoph Schmittner, and Joaquim Bastos. 2019. A lightweight authentication mechanism for M2M communications in industrial IoT environment. IEEE Internet Things J. 6, 1 (Feb. 2019), 288–296.
[48]
ethercat.org. 2020. EtherCAT Technology Group. Retrieved September 03, 2020 from https://www.ethercat.org/en/tech_group.html.
[49]
fieldcommgroup.org. 2016. Product Testing & Registration. Retrieved August 27, 2020 from https://fieldcommgroup.org/services/product-testing-registration.
[50]
first.org. 2019. Common Vulnerability Scoring System SIG. Retrieved June 02, 2020 from https://www.first.org/cvss/specification-document.
[51]
David Fisher, Bernhard Isler, and Michael Osborne. 2019. BACnet Secure Connect: A Secure Infrastructure for Building Automation. Retrieved June 21, 2020 from http://www.bacnet.org/Bibliography/B-SC-Whitepaper-v15_Final_20190521.pdf.
[52]
Brendan Galloway and Gerhard P. Hancke. 2012. Introduction to industrial control networks. IEEE Commun. Surv. Tutorials 15, 2 (2012), 860–880.
[53]
ge.com. 2020. Everything You Need to Know About the Industrial Internet of Things. Retrieved August 13, 2020 from https://www.ge.com/digital/blog/everything-you-need-know-about-industrial-internet-things.
[54]
M. Gidlund, G. P. Hancke, M. H. Eldefrawy, and J. Akerberg. 2020. Guest editorial: Security, privacy, and trust for Industrial Internet of Things. IEEE Trans. Ind. Inform. 16, 1 (Jan. 2020), 625–628.
[55]
Jairo Giraldo, Esha Sarkar, Alvaro A. Cardenas, Michail Maniatakos, and Murat Kantarcioglu. 2017. Security and privacy in cyber-physical systems: A survey of surveys. IEEE Des. Test 34, 4 (Aug. 2017), 7–17.
[56]
Jairo Giraldo, David Urbina, Alvaro Cardenas, Junia Valente, Mustafa Faisal, Justin Ruths, Nils Ole Tippenhauer, Henrik Sandberg, and Richard Candell. 2018. A survey of physics-based attack detection in c yber-physical systems. ACM Comput. Surv. 51, 4 (Sept. 2018), 1–36.
[58]
gov.uk. 2020. Nature of Business: Standard Industrial Classification (SIC) Codes. Retrieved August 27, 2020 from http://resources.companieshouse.gov.uk/sic/.
[59]
Edward R. Griffor, Chris Greer, David A. Wollman, and Martin J. Burns. 2017. Framework for Cyber-Physical Systems: Volume 1, Overview. Technical Report. National Institute of Standards and Technology.
[60]
Vehbi C. Gungor and Gerhard P. Hancke. 2009. Industrial Wireless sensor networks: Challenges, design principles, and technical approaches. IEEE Trans. Ind. Electron. 56, 10 (Oct. 2009), 4258–4265.
[61]
Mohammad Hassan, Shamsul Huda, Shaila Sharmeen, Jemal Abawajy, and Giancarlo Fortino. 2020. An adaptive trust boundary protection for IIoT networks using deep-learning feature extraction based semi-supervised model. IEEE Trans. Ind. Inform. 17, 4 (2021), 2860–2870.
[62]
Sabo Miya Hassan, Rosdiazli Ibrahim, Kishore Bingi, Tran Duc Chung, and Nordin Saad. 2017. Application of wireless technology for control: A WirelessHART perspective. Procedia Comput. Sci. 105, Suppl. C (2017), 240–247.
[63]
hms networks.com. 2019. Industrial Network Market Shares 2019 According to HMS. Retrieved July 16, 2020 from https://www.hms-networks.com/news-and-insights/news-from-hms/2019/05/07/industrial-network-market-shares-2019-according-to-hms.
[64]
hms networks.com. 2020. Industrial Network Market Shares 2020 According to HMS Networks. Retrieved July 16, 2020 from https://www.hms-networks.com/news-and-insights/news-from-hms/2020/05/29/industrial-network-market-shares-2020-according-to-hms-networks.
[65]
Grant Ho, Derek Leung, Pratyush Mishra, Ashkan Hosseini, Dawn Song, and David Wagner. 2016. Smart locks: Lessons for securing commodity Internet of Things devices. In Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security - ASIA (CCS’16). ACM Press, Xi’an, China, 461–472.
[66]
Hannes Holm, Martin Karresand, Arne Vidström, and Erik Westring. 2015. A survey of industrial control system testbeds. In Nordic Conference on Secure IT Systems. Springer, 11–26.
[67]
John D. Howard and Thomas A. Longstaff. 1998. A Common Language for Computer Security Incidents. Technical Report SAND98-8667, 751004. Office of Scientific and Technical Information (OSTI). SAND98–8667, 751004 pages.
[68]
https://airbus-cybersecurity.com/. 2020. OT Simulation Platform. Retrieved June 22, 2020 from https://airbus-cyber-security.com/wp-content/uploads/2020/01/Airbus-CyberSecurity_Brochure-OT-Simulation-Platform.pdf.
[69]
https://netflixtechblog.com/. 2018. The Netflix Simian Army. Retrieved September 3, 2020 from https://netflixtechblog.com/the-netflix-simian-army-16e57fbab116.
[70]
Jiankun Hu, Hemanshu R. Pota, and Song Guo. 2013. Taxonomy of attacks for agent-based smart grids. IEEE Trans. Parallel Distrib. Syst. 25, 7 (July 2013), 1886–1895.
[71]
Kaixing Huang, Chunjie Zhou, Yu-Chu Tian, Shuanghua Yang, and Yuanqing Qin. 2018. Assessing the physical impact of cyberattacks on industrial cyber-physical systems. IEEE Trans. Ind. Electron. 65, 10 (Oct. 2018), 8153–8162.
[72]
Sheng Huang, Yaoliang Chen, Xiaoyan Chen, Kai Liu, Xiaomin Xu, Chen Wang, Kevin Brown, and Inge Halilovic. 2014. The next generation operational data historian for IoT based on informix. In Proceedings of the 2014 ACM SIGMOD International Conference on Management of Data (SIGMOD’14). ACM Press, 169–176.
[73]
Abdulmalik Humayed, Jingqiang Lin, Fengjun Li, and Bo Luo. 2017. Cyber-physical systems security–A survey. IEEE Internet Things J. 4, 6 (Dec. 2017), 1802–1831.
[74]
ietf.org. 2019. IPv6 over Networks of Resource-Constrained Nodes (6lo). Retrieved August 25, 2020 from https://datatracker.ietf.org/wg/6lo/about/.
[75]
info.publicintelligence.net. 2012. Situational Information Report Federal Bureau of Investigation. Technical Report. Federal Bureau of Investigation. Retrieved August 17, 2020 from https://info.publicintelligence.net/FBI-AntisecICS.pdf.
[76]
Sohail Jabbar, Murad Khan, Bhagya Nathali Silva, and Kijun Han. 2018. A rest-based industrial Web of Things’ framework for smart warehousing. J. Supercomput. 74, 9 (Sept. 2018), 4419–4433.
[77]
Juergen Jasperneite, Markus Schumacher, and Karl Weber. 2007. Limits of increasing the performance of Industrial Ethernet Protocols. In 2007 IEEE Conference on Emerging Technologies and Factory Automation (EFTA’07). IEEE, 17–24.
[78]
Mohammad Jbair, Bilal Ahmad, Mus’ab H. Ahmad, and Robert Harrison. 2018. Industrial cyber physical systems: A survey for control-engineering tools. In Proceedings of the 2018 IEEE Industrial Cyber-Physical Systems (ICPS’18). IEEE, 270–276.
[79]
Jehn-Ruey Jiang. 2018. An improved cyber-physical systems architecture for Industry 4.0 smart factories. Adv. Mech. Eng. 10, 6 (June 2018), 1–15.
[80]
Ning Jiang, Hu Lin, Zhenyu Yin, and Liaomo Zheng. 2018. Performance research on industrial demilitarized zone in defense-in-depth architecture. In Proceedings of the 2018 IEEE International Conference on Information and Automation (ICIA’18). IEEE, 534–537.
[81]
Ezgi Karabulut, Necati Aras, and İ. Kuban Altınel. 2017. Optimal sensor deployment to increase the security of the maximal breach path in border surveillance. Eur. J. Oper. Res. 259, 1 (May 2017), 19–36.
[82]
Stamatis Karnouskos. 2011. Stuxnet worm impact on industrial cyber-physical system security. In IECON 2011—37th Annual Conference of the IEEE Industrial Electronics Society. IEEE, 4490–4494.
[83]
Alexander Kern and Reiner Anderl. 2018. Using RBAC to enforce the principle of least privilege in industrial remote maintenance sessions. In Proceedings of the 2018 5th International Conference on Internet of Things: Systems, Management and Security. IEEE, 107–114.
[84]
Nacer Khalil, Mohamed Riduan Abid, Driss Benhaddou, and Michael Gerndt. 2014. Wireless sensors networks for Internet of Things. In Proceedings of the 2014 IEEE 9th International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP’14). IEEE, 1–6.
[85]
Ansam Khraisat, Iqbal Gondal, Peter Vamplew, and Joarder Kamruzzaman. 2019. Survey of intrusion detection systems: Techniques, datasets and challenges. Cybersecurity 2, 1 (2019), 20.
[86]
Seungmin Kim, Gyunyoung Heo, Enrico Zio, Jinsoo Shin, and Jae-gu Song. 2020. Cyber attack taxonomy for digital environment in nuclear power plants. Nucl. Eng. Tech. 52, 5 (May 2020), 995–1001.
[87]
Younghwan Kim, Minki Kim, and Wonjoon Kim. 2013. Effect of the Fukushima nuclear disaster on global public acceptance of nuclear energy. Energy Policy 61 (Oct. 2013), 822–828.
[88]
Keith Kirkpatrick. 2019. Protecting industrial control systems. Commun. ACM 62, 10 (Oct. 2019), 14–16.
[89]
William Knowles, Daniel Prince, David Hutchison, Jules Ferdinand Pagna Disso, and Kevin Jones. 2015. A survey of cyber security management in industrial control systems. Int. J. Crit. Infrastruct. Protect. 9 (June 2015), 52–80.
[90]
Matus Korman, Margus Välja, Gunnar Björkman, Mathias Ekstedt, Alexandre Vernotte, and Robert Lagerström. 2017. Analyzing the effectiveness of attack countermeasures in a SCADA system. In Proceedings of the 2nd Workshop on Cyber-Physical Security and Resilience in Smart Grids (CPSR-SG’17). ACM Press, 73–78.
[91]
Shitij Kumar, Celal Savur, and Ferat Sahin. 2018. Dynamic awareness of an industrial robotic arm using time-of-flight laser-ranging sensors. In Proceedings of the 2018 IEEE International Conference on Systems, Man, and Cybernetics (SMC’18). IEEE, 2850–2857.
[92]
Lucie Langer, Florian Skopik, Paul Smith, and Markus Kammerstetter. 2016. From old to new: Assessing cybersecurity risks for an evolving smart grid. Comput. Secur. 62 (2016), 165–176.
[93]
Ralph Langner. 2011. Stuxnet: Dissecting a cyberwarfare weapon. IEEE Secur. Privacy Mag. 9, 3 (May 2011), 49–51.
[94]
Heiner Lasi, Peter Fettke, Hans-Georg Kemper, Thomas Feld, and Michael Hoffmann. 2014. Industry 4.0. Bus. Inf. Syst. Eng. 6, 4 (Aug. 2014), 239–242.
[95]
Edward A. Lee. 2008. Cyber physical systems: Design challenges. In Proceedings of the 2008 11th IEEE International Symposium on Object and Component-Oriented Real-Time Distributed Computing (ISORC’08). IEEE, 363–369.
[96]
Jay Lee, Behrad Bagheri, and Hung-An Kao. 2015. A cyber-physical systems architecture for Industry 4.0-based manufacturing systems. Manuf. Lett. 3 (Jan. 2015), 18–23.
[97]
Robert M. Lee, Michael J. Assante, and Tim Conway. 2014. German steel mill cyber attack. Ind. Control Syst. 30 (2014), 62.
[98]
Robert M. Lee, Michael J. Assante, and Tim Conway. 2016. Analysis of the Cyber Attack on the Ukrainian Power Grid. Retrieved August 17, 2020 from https://ics.sans.org/media/E-ISAC_SANS_Ukraine_DUC_5.pdf.
[99]
Paulo Leitao, Stamatis Karnouskos, Luis Ribeiro, Jay Lee, Thomas Strasser, and Armando W. Colombo. 2016. Smart agents in industrial cyber–physical systems. Proc. IEEE 104, 5 (May 2016), 1086–1101.
[100]
John Leyden. 2016. Water Treatment Plant Hacked, Chemical MIX Changed for Tap Supplies. (March 2016). Retrieved August 17, 2020 from https://www.theregister.com/2016/03/24/water_utility_hacked/.
[101]
Xiaomin Li, Di Li, Jiafu Wan, Athanasios V. Vasilakos, Chin-Feng Lai, and Shiyong Wang. 2017. A review of industrial wireless networks in the context of Industry 4.0. Wireless Netw. 23, 1 (Jan. 2017), 23–41.
[102]
Xiong Li, Jianwei Niu, Md Zakirul Alam Bhuiyan, Fan Wu, Marimuthu Karuppiah, and Saru Kumari. 2017. A robust ECC-based provable secure authentication protocol with privacy preserving for industrial Internet of Things. IEEE Trans. Ind. Inform. 14, 8 (Aug. 2017), 3599–3609.
[103]
Yongxin Liao, Eduardo de Freitas Rocha Loures, and Fernando Deschamps. 2018. Industrial Internet of Things: A systematic literature review and insights. IEEE Internet Things J. 5, 6 (Dec. 2018), 4515–4525.
[104]
Zhihong Lin and Stephanie Pearson. 2013. An Inside Look at Industrial Ethernet Communication Protocols. Technical Report. Texas Instruments.
[105]
Lindsey O’Donnell. 2020. Post-Ransomware Attack, Florida City Decides to Pay $600K. Retrieved August 22, 2020 from https://threatpost.com/ransomware-florida-city-pays-600k-ransom/145869/.
[106]
Sai Ho Ling, Kit Yan Chan, Frank Hung Fat Leung, Frank Jiang, and Hung Nguyen. 2016. Quality and robustness improvement for real world industrial systems using a fuzzy particle swarm optimization. Eng. Appl. Artif. Intell. 47 (Jan. 2016), 68–80.
[107]
Yuxin Liu, Xiao Liu, Anfeng Liu, Neal N. Xiong, and Fang Liu. 2019. A trust computing-based security routing scheme for cyber physical systems. ACM Trans. Intell. Syst. Tech. 10, 6 (Dec. 2019), 1–27.
[108]
lockheedmartin.com. 2018. The Cyber Kill Chain. Retrieved August 26, 2020 from https://www.lockheedmartin.com/en-us/capabilities/cyber/cyber-kill-chain.html.
[109]
lora alliance.org. 2015. LoRa Alliance. Retrieved August 22, 2020 from https://lora-alliance.org/.
[110]
George Loukas, Diane Gan, and Tuan Vuong. 2013. A taxonomy of cyber attack and defence mechanisms for emergency management networks. In Proceedings of the 2013 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops). IEEE, 534–539.
[111]
Chenyang Lu, Abusayeed Saifullah, Bo Li, Mo Sha, Humberto Gonzalez, Dolvara Gunatilaka, Chengjie Wu, Lanshun Nie, and Yixin Chen. 2016. Real-time wireless sensor-actuator networks for industrial cyber-physical systems. Proc. IEEE 104, 5 (May 2016), 1013–1024.
[112]
Yang Lu. 2017. Cyber physical system (CPS)-based Industry 4.0: A survey. J. Ind. Integr. Manage. 2, 3 (Sept. 2017), 1750014.
[113]
N. J. Mahwah. 2020. Radiflow Reveals First Documented Cryptocurrency Malware Attack on a SCADA Network. Retrieved August 17, 2020 from https://radiflow.com/news/radiflow-reveals-first-documented-cryptocurrency-malware-attack-on-a-scada-network/.
[114]
David C. Mazur, Rob A. Entzminger, Pete A. Morell, John A. Kay, and Erik Syme. 2016. Defining the industrial demilitarized zone and its benefits for mining applications. IEEE Trans. Ind. Appl. 52, 3 (May 2016), 2731–2736.
[115]
Stephen McLaughlin, Charalambos Konstantinou, Xueyang Wang, Lucas Davi, Ahmad-Reza Sadeghi, Michail Maniatakos, and Ramesh Karri. 2016. The cybersecurity landscape in industrial control systems. Proc. IEEE 104, 5 (2016), 1039–1057.
[116]
Robert Mitchell and Ing-Ray Chen. 2014. A survey of intrusion detection techniques for cyber-physical systems. ACM Comput. Surv. 46, 4 (April 2014), 1–29.
[117]
Kenrick Mock, Bogdan Hoanca, Justin Weaver, and Mikal Milton. 2012. Real-Time continuous iris recognition for authentication using an eye tracker. In Proceedings of the 2012 ACM Conference on Computer and Communications Security (CCS’12). ACM Press, 1007–1009.
[118]
modbus.org. 2005. About Modbus Organization. Retrieved August 15, 2020 https://www.modbus.org/about_us.php.
[119]
Smita S. Mudholkar, Pradnya M. Shende, and Milind V. Sarode. 2012. Biometrics authentication technique for intrusion detection systems using fingerprint recognition. Int. J. Comput. Sci. Eng. Inf. Tech. 2, 1 (Feb. 2012), 57–65.
[120]
Geoff Mulligan. 2007. The 6LoWPAN architecture. In Proceedings of the 4th Workshop on Embedded Networked Sensors (EmNets’07). ACM Press, 78–82.
[121]
Bhawna Narwal, Amar Kumar Mohapatra, and Kaleem Ahmed Usmani. 2019. Towards a taxonomy of cyber threats against target applications. J. Statist. Manage. Syst. 22, 2 (Feb. 2019), 301–325.
[122]
Angelia Nedić, Alex Olshevsky, and Michael G. Rabbat. 2018. Network topology and communication-computation tradeoffs in decentralized optimization. Proc. IEEE 106, 5 (May 2018), 953–976.
[123]
Vinh Quang Nguyen and Jae Wook Jeon. 2016. Ethercat network latency analysis. In Proceedings of the 2016 International Conference on Computing, Communication and Automation (ICCCA’16). IEEE, 432–436.
[124]
odva.org. 2020. DeviceNet. Retrieved August 21, 2020 from https://www.odva.org/technology-standards/key-technologies/devicenet/.
[125]
odva.org. 2020. EtherNet/IP. Retrieved August 21, 2020 from https://www.odva.org/technology-standards/key-technologies/ethernet-ip/.
[126]
A Dean Papadopoulos, Newton Center, and West Newbury. 2000. System for remotely accessing an industrial control system over a commercial communications network. US Patent No. 6,061,603., 11 pages. Filed Oct. 16, 1998. Issued May 9, 2000. Retrieved August 21, 2020 from https://patents.google.com/patent/US6061603A/en.
[127]
Luca Parolini, Niraj Tolia, Bruno Sinopoli, and Bruce H. Krogh. 2010. A cyber-physical systems approach to energy management in data centers. In Proceedings of the 1st ACM/IEEE International Conference on Cyber-Physical Systems (ICCPS’10). ACM Press, 168–177.
[128]
Charith Perera, Arkady Zaslavsky, Peter Christen, and Dimitrios Georgakopoulos. 2014. Context aware computing for The Internet of Things: A survey. IEEE Commun. Surv. Tutorials 16, 1 (2014), 414–454.
[129]
Adrian Perrig, John Stankovic, and David Wagner. 2004. Security in wireless sensor networks. Commun. ACM 47, 6 (June 2004), 53–57.
[130]
Stig Petersen and Simon Carlsen. 2011. WirelessHART versus ISA100. 11a: The format war hits the factory floor. IEEE Ind. Electron.Mag. 5, 4 (2011), 23–34.
[131]
Alessandro Di Pinto, Younes Dragoni, and Andrea Carcano. 2018. TRITON: The First ICS Cyber Attack on Safety Instrument Systems. Retrieved July 02, 2020 from https://i.blackhat.com/us-18/Wed-August-8/us-18-Carcano-TRITON-How-It-Disrupted-Safety-Systems-And-Changed-The-Threat-Landscape-Of-Industrial-Control-Systems-Forever-wp.pdf.
[132]
Miloslova Plachkinova and Chris Maurer. 2019. Security breach at target. J. Inf. Syst. Educ. 29, 1 (2019), 7.
[133]
Gregory J. Pottie and William J. Kaiser. 2000. Wireless integrated network sensors. Commun. ACM 43, 5 (May 2000), 51–58.
[134]
Radislav A. Potyrailo. 2016. Multivariable sensors for ubiquitous monitoring of gases in the era of Internet of Things and industrial internet. Chem. Rev. 116, 19 (Oct. 2016), 11877–11923.
[135]
Associated Press. 2021. Hacker Tries to Poison Water Supply in Florida City. Retrieved May 3, 2021 from https://www.telegraph.co.uk/news/2021/02/09/hacker-tries-poison-water-supply-florida-city/.
[136]
profibus.com. 2009. PROFINET - The Leading Industrial Ethernet Standard. Retrieved August 18, 2020 from https://www.profibus.com/technology/profinet/.
[137]
Bin Qian, Jie Su, Zhenyu Wen, Devki Nandan Jha, Yinhao Li, Yu Guan, Deepak Puthal, Philip James, Renyu Yang, Albert Y. Zomaya, et al. 2020. Orchestrating the development lifecycle of machine learning-based IoT applications: A taxonomy and survey. ACM Computing Surveys (CSUR) 53, 4 (2020), 1–47.
[138]
Diego V. Queiroz, Marcelo S. Alencar, Ruan D. Gomes, Iguatemi E. Fonseca, and Cesar Benavente-Peces. 2017. Survey and systematic mapping of industrial Wireless Sensor Networks. J. Netw. Comput. Appl. 97 (Nov. 2017), 96–125.
[139]
Ragunathan (Raj) Rajkumar, Insup Lee, Lui Sha, and John Stankovic. 2010. Cyber-physical systems: The next computing revolution. In Design Automation Conference. IEEE, 731–736.
[140]
Daniel Ramotsoela, Adnan Abu-Mahfouz, and Gerhard Hancke. 2018. A survey of anomaly detection in industrial wireless sensor networks with critical water system infrastructure as a case study. Sensors 18, 8 (Aug. 2018), 2491.
[141]
Yongjun Ren, Fujian Zhu, Jian Qi, Jin Wang, and Arun Kumar Sangaiah. 2019. Identity management and access control based on blockchain under edge computing for the industrial Internet of Things. Appl. Sci. 9, 10 (2019), 2058.
[142]
Robert J. Kretschmann. 2000. Mobile human/machine interface for use with industrial control systems for controlling the operation of process executed on spatially separate machines. US Patent No. 6,167,464. Filed Sep. 23, 1998 || Issued Dec. 26, 2000 Retrieved August 21, 2020 from https://patents.google.com/patent/US6167464A/en.
[143]
Alina Roitberg, Nikhil Somani, Alexander Perzylo, Markus Rickert, and Alois Knoll. 2015. Multimodal human activity recognition for industrial manufacturing processes in robotic workcells. In Proceedings of the 2015 ACM on International Conference on Multimodal Interaction (ICMI’15). Assoc. Comput. Machinery, New York, NY, 259–266.
[144]
Michael Roza, William Ho, Sabri Khemissa, and Darnell Washington. 2020. Cloud Industrial Internet of Things (IIoT) - Industrial Control Systems Security Glossary. Technical Report. Cloud Security Alliance.
[145]
Regner Sabillon, Victor Cavaller, Jeimy Cano, and Jordi Serra-Ruiz. 2016. Cybercriminals, cyberattacks and cybercrime. In {roceedings of the 2016 IEEE International Conference on Cybercrime and Computer Forensic. IEEE, 1–9.
[146]
Ahmad-Reza Sadeghi, Christian Wachsmann, and Michael Waidner. 2015. Security and privacy challenges in industrial Internet of Things. In Proceedings of the 52nd Annual Design Automation Conference (DAC’15). IEEE, ACM Press, 1–6.
[147]
Krishna Sampigethaya and Radha Poovendran. 2013. Aviation cyber–physical systems: Foundations for future aircraft and air transport. Proc. IEEE 101, 8 (Aug. 2013), 1834–1855.
[148]
José Carlos Sancho, Andrés Caro, Mar Ávila, and Alberto Bravo. 2020. New approach for threat classification and security risk estimations based on security event management. Future Gen. Comput. Syst. 113 (Dec. 2020), 488–505.
[149]
Sajal Sarkar, Sudip Sarkar, Kajal Sarkar, and Soumalya Ghosh. 2015. Cyber security password policy for industrial control networks. In Proceedings of the 2015 1st International Conference on Next Generation Computing Technologies (NGCT’15). IEEE, 408–413.
[150]
Bharadwaj Satchidanandan and Panganamala R. Kumar. 2017. Dynamic watermarking: Active defense of networked cyber–physical systems. Proc. IEEE 105, 2 (Feb. 2017), 219–240.
[151]
Peter Schneider and Konstantin Böttinger. 2018. High-performance unsupervised anomaly detection for cyber-physical system networks. In Proceedings of the 2018 Workshop on Cyber-Physical Systems Security and PrivaCy(CPS-SPC’18). ACM Press, 1–12.
[152]
Karsten Schweichhart. 2016. Reference Architectural Model Industrie 4.0 (RAMI 4.0). Retrieved September 05, 2020 from https://www.wapz.net/down/remi-4/f4f.pdf.
[153]
se.com. 2015. Guide to Open Protocols in Building Automation. Retrieved August 26, 2020 from https://blog.se.com/wp-content/uploads/2015/11/SE-Protocols-Guide_A4_v21.pdf.
[154]
Abraham Serhane, Mohammad Shraif, Hassan Chehadi, Adnan Harb, and Ali Mohsen. 2017. Optimizing solar systems using DeviceNET. In Proceedings of the 2017 29th International Conference on Microelectronics (ICM’17). IEEE, 1–4.
[155]
Gauri Shah and Aashis Tiwari. 2018. Anomaly detection in IIoT: A case study using machine learning. In Proceedings of the ACM India Joint International Conference on Data Science and Management of Data. 295–300.
[156]
Christos Siaterlis, Andres Perez Garcia, and Béla Genge. 2012. On the use of Emulab testbeds for scientifically rigorous experiments. IEEE Commun. Surv. Tutorials 15, 2 (2012), 929–942.
[157]
Waqas Ahmed Siddique, Muhammad Farhan Siddiqui, and Awais Khan. 2020. Controlling and monitoring of industrial parameters through cloud computing and HMI using OPC Data Hub software. Indian J. Sci. Tech. 13, 2 (March 2020), 114–126.
[158]
Chris Simmons, Charles Ellis, Sajjan Shiva, Dipankar Dasgupta, and Qishi Wu. 2014. AVOIDIT: A cyber attack taxonomy. In Proceedings of the 9th Annual Symposium on Information Assurance (ASIA’14). 2–12.
[159]
Jill Slay and Michael Miller. 2007. Lessons learned from the Maroochy water breach. In Critical Infrastructure Protection, Eric Goetz and Sujeet Shenoi (Eds.). Vol. 253. Springer US, 73–82. Series Title: IFIP Int. Federation for Information Processing.
[160]
Fabrizio Smeraldi and Pasquale Malacaria. 2014. How to spend it: Optimal investment for cyber security. In Proceedings of the 1st International Workshop on Agents and CyberSecurity (ACySE’14). ACM Press, 1–4.
[161]
Bin Srinidhi, Jia Yan, and Giri Kumar Tayi. 2015. Allocation of resources to cyber-security: The effect of misalignment of interest between managers and investors. Decis. Support Syst. 75 (July 2015), 49–62.
[162]
Keith Stouffer, Suzanne Lightman, Victoria Pillitteri, Marshall Abrams, and Adam Hahn. 2014. Guide to Industrial Control Systems (ICS) Security Supervisory Control and Data Acquisition (SCADA) Systems, Distributed Control Systems (DCS), and Other Control System Configurations such as Programmable Logic Controllers (PLC). Technical Report. National Institute of Standards and Technology. 255 pages.
[163]
Hai Tao, Md Zakirul Alam Bhuiyan, Md Arafatur Rahman, Tian Wang, Jie Wu, Sinan Q. Salih, Yafeng Li, and Thaier Hayajneh. 2019. TrustData: Trustworthy and secured data collection for event detection in industrial cyber-physical system. IEEE Trans. Ind. Inform. 16, 5 (May 2019), 3311–3321.
[164]
J.-P. Thomesse. 2005. Fieldbus technology in industrial automation. Proc. IEEE 93, 6 (June 2005), 1073–1101.
[165]
Ted Thornhill. 2014. San Francisco Pranksters Hack Road Sign to Warn Drivers of Godzilla Attack. Retrieved August 21, 2020 from https://www.dailymail.co.uk/news/article-2632556/Godzilla-Attack-Turn-Pranksters-hack-San-Francisco-road-sign-warn-drivers-just-movie-makes-monster-93-2million-box-office.html.
[167]
us cert.cisa.gov. 2013. ICS-CERT Monitor. Retrieved August 01, 2020 from https://us-cert.cisa.gov/sites/default/files/Monitors/ICS-CERT_Monitor_Apr-Jun2013.pdf.
[168]
us cert.cisa.gov. 2015. NCCIC/ICS-CERT Industrial Control Systems Assessment Summary Report, 25 pages. Retrieved August 26, 2020 from https://us-cert.cisa.gov/sites/default/files/Annual_Reports/FY2015_Industrial_Control_Systems_Assessment_Summary_Report_S508C.pdf.
[169]
us cert.cisa.gov. 2016. ICS-CERT Annual Assessment Report FY2016, 24 pages. Retrieved August 23, 2020 from https://us-cert.cisa.gov/sites/default/files/Annual_Reports/FY2016_Industrial_Control_Systems_Assessment_Summary_Report_S508C.pdf.
[170]
us cert.cisa.gov. 2020. Industrial Control Systems. Retrieved August 26, 2020 from https://us-cert.cisa.gov/ics.
[171]
Adriano Valenzano. 2014. Industrial cybersecurity: Improving security through access control policy models. IEEE Indust. Electron. Mag. 8, 2 (2014), 6–17.
[172]
Varsha Venugopal, Jim Alves-Foss, and Sandeep Gogineni Ravindrababu. 2019. Use of an SDN switch in support of NIST ICS security recommendations and least privilege networking. In Proceedings of the 5th Annual Industrial Control System Security (ICSS) Workshop. ACM, 11–20.
[173]
verizon.com. 2020. 2020 Data Breach Investigations Report. Retrieved August 21, 2020 from https://enterprise.verizon.com/resources/reports/2020-data-breach-investigations-report.pdf.
[174]
Artemios G. Voyiatzis, Konstantinos Katsigiannis, and Stavros Koubias. 2015. A Modbus/TCP fuzzer for testing internetworked industrial systems. In Proceedings of the 2015 IEEE 20th Conference on Emerging Technologies & Factory Automation (ETFA’15). IEEE, 1–6.
[175]
Shaun Wang. 2017. Optimal level and allocation of cybersecurity spending: Model and formula. SSRN Electron. J. (2017), 12.
[176]
Yunbo Wang, Mehmet C. Vuran, and Steve Goddard. 2008. Cyber-physical systems in industrial process control. ACM SIGBED Rev. 5, 1 (Jan. 2008), 1–2.
[177]
Zhaohui Wang, Houbing Song, David W. Watkins, Keat Ghee Ong, Pengfei Xue, Qing Yang, and Xianming Shi. 2015. Cyber-physical systems for water sustainability: Challenges and opportunities. IEEE Commun. Mag. 53, 5 (May 2015), 216–222.
[178]
Dazhong Wu, Matthew John Greer, David W. Rosen, and Dirk Schaefer. 2013. Cloud manufacturing: Strategic vision and state-of-the-art. J. Manuf. Syst. 32, 4 (Oct. 2013), 564–579.
[179]
Mingtao Wu and Young B. Moon. 2017. Taxonomy of cross-domain attacks on CyberManufacturing system. Procedia Comput. Sci. 114 (2017), 367–374.
[180]
Hansong Xu, Wei Yu, David Griffith, and Nada Golmie. 2018. A survey on Industrial Internet of Things: A cyber-physical systems perspective. IEEE Access 6 (2018), 78238–78259.
[181]
Muhammad Mudassar Yamin, Basel Katt, and Vasileios Gkioulos. 2020. Cyber ranges and security testbeds: Scenarios, functions, tools and architecture. Comput. Secur. 88 (2020), 101636.
[182]
Mark Yampolskiy, Peter Horvath, Xenofon D. Koutsoukos, Yuan Xue, and Janos Sztipanovits. 2013. Taxonomy for description of cross-domain attacks on CPS. In Proceedings of the 2nd ACM International Conference on High Confidence Networked Systems (HiCoNS’13). ACM Press, 135.
[183]
Junjie Yin, Zheng Yang, Hao Cao, Tongtong Liu, Zimu Zhou, and Chenshu Wu. 2019. A survey on Bluetooth 5.0 and mesh: New milestones of IoT. ACM Trans. Sensor Netw. 15, 3 (2019), 1–29.
[184]
Mina Younan, Essam H. Houssein, Mohamed Elhoseny, and Abdelmgeid A. Ali. 2020. Challenges and recommended technologies for the industrial Internet of Things: A comprehensive review. Meas. 151 (Feb. 2020), 107198.
[185]
Wenjin Yu, Tharam Dillon, Fahed Mostafa, Wenny Rahayu, and Yuehua Liu. 2019. Implementation of industrial cyber physical system: Challenges and solutions. In Proceedings of the 2019 IEEE International Conference on Industrial Cyber Physical Systems (ICPS’19). IEEE, 173–178.
[186]
Xinghuo Yu and Yusheng Xue. 2016. Smart grids: A cyber–physical systems perspective. Proc. IEEE 104, 5 (May 2016), 1058–1070.
[187]
Xuejun Yue, Hu Cai, Hehua Yan, Caifeng Zou, and Keliang Zhou. 2015. Cloud-assisted industrial cyber-physical systems: An insight. Microprocess. Microsyst. 39, 8 (Nov. 2015), 1262–1270.
[188]
zigbeealliance.org. 2010. Zigbee Alliance. Retrieved August 19, 2020 from https://zigbeealliance.org/solution/zigbee/.
[189]
Maede Zolanvari, Marcio A Teixeira, and Raj Jain. 2018. Effect of imbalanced datasets on security of industrial IoT using machine learning. In Proceedings of the 2018 IEEE International Conference on Intelligence and Security Informatics (ISI’18). IEEE, 112–117.

Cited By

View all
  • (2025)Cyber-Physical System Security for Manufacturing Industry 4.0 Using LSTM-CNN Parallel OrchestrationIEEE Access10.1109/ACCESS.2025.352552013(3788-3801)Online publication date: 2025
  • (2025)MultiCIDS: Anomaly-based collective intrusion detection by deep learning on IoT/CPS multivariate time seriesInternet of Things10.1016/j.iot.2025.101519(101519)Online publication date: Jan-2025
  • (2025)SFACIF: A safety function attack and anomaly industrial condition identified frameworkComputer Networks10.1016/j.comnet.2024.110927257(110927)Online publication date: Feb-2025
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Computing Surveys
ACM Computing Surveys  Volume 54, Issue 11s
January 2022
785 pages
ISSN:0360-0300
EISSN:1557-7341
DOI:10.1145/3551650
Issue’s Table of Contents

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 09 September 2022
Online AM: 19 January 2022
Accepted: 01 January 2022
Revised: 01 September 2021
Received: 01 December 2020
Published in CSUR Volume 54, Issue 11s

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Cyber-physical systems
  2. industrial control systems
  3. cybersecurity

Qualifiers

  • Survey
  • Refereed

Funding Sources

  • EPSRC PETRAS
  • GCHQ National Resilience Fellowship
  • Republic of Turkey Ministry of National Education

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)1,835
  • Downloads (Last 6 weeks)142
Reflects downloads up to 29 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2025)Cyber-Physical System Security for Manufacturing Industry 4.0 Using LSTM-CNN Parallel OrchestrationIEEE Access10.1109/ACCESS.2025.352552013(3788-3801)Online publication date: 2025
  • (2025)MultiCIDS: Anomaly-based collective intrusion detection by deep learning on IoT/CPS multivariate time seriesInternet of Things10.1016/j.iot.2025.101519(101519)Online publication date: Jan-2025
  • (2025)SFACIF: A safety function attack and anomaly industrial condition identified frameworkComputer Networks10.1016/j.comnet.2024.110927257(110927)Online publication date: Feb-2025
  • (2025)Analysis of machine learning-based approaches for securing the Internet of Things in the smart industry: a multivocal state of knowledge reviewInternational Journal of Information Security10.1007/s10207-024-00935-824:1Online publication date: 1-Feb-2025
  • (2024)Cyber Security Techniques Architecture and DesignAdvancing Cyber Security Through Quantum Cryptography10.4018/979-8-3693-5961-7.ch009(231-258)Online publication date: 4-Oct-2024
  • (2024)Automated Sensor Node Malicious Activity Detection with Explainability AnalysisSensors10.3390/s2412371224:12(3712)Online publication date: 7-Jun-2024
  • (2024)Performance Evaluation of Computer Vision Algorithms in a Programmable Logic Controller: An Industrial Case StudySensors10.3390/s2403084324:3(843)Online publication date: 28-Jan-2024
  • (2024)Leveraging AI for Network Threat Detection—A Conceptual OverviewElectronics10.3390/electronics1323461113:23(4611)Online publication date: 22-Nov-2024
  • (2024)Exploiting user-centred design to secure industrial control systemsFrontiers in the Internet of Things10.3389/friot.2024.14360233Online publication date: 13-Sep-2024
  • (2024)Internet of Things (IoT) of Smart HomesJournal of Electrical and Computer Engineering10.1155/2024/77169562024Online publication date: 8-Apr-2024
  • Show More Cited By

View Options

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Full Text

View this article in Full Text.

Full Text

HTML Format

View this article in HTML Format.

HTML Format

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media