Cyber Physical System

Navin Dhinnesh ADC, Mepco Schlenk Engineering College

Internet of Things, Sensor, Cyber-physical systems, real time systems, embedded systems

In 2006, Cyber Physical Systems (CPS), the new word was invented in the United States [1]. The combination of devices like sensors with embedded systems is quickly receiving its place in cyber world. These devices jointly with the information filed are becoming the main focal point, called as Cyber Physical Systems. This word was found keeping in mind the escaling significance of relations among the mutually related computing systems with the physical world [2]. The author of this paper gives an overview of CPS architecture, its functions and its security threat.
    [1] Lee, E. A. (2006). Cyber-physical systems—are computing foundations adequate? NSF Workshop on Cyber-Physical Systems: Research Motivation, Techniques and Roadmap, Austin, Texas. [2] L Wang, M Törngren, M Onori, “Current status and advancement of cyber-physical systems in manufacturing”, Journal of Manufacturing Systems, 37, pp 517 -527, 2015 [3] Rajkumar R, et. al, “Cyber physical systems: The Next Computing Revolution”, Design Automation Conference, 2010 [4] Wilbur L. Ross, Kent Rochford, “Framework for Cyber -Physical Systems: Overview, National Institute of Standards and Technology, U.S. Department of Commerce, Volume 1, Version 1.0, June 2017 Available : https://doi.org/10.6028/NIST.SP.1500-201.pdf [5] Nishtha Kessawni, Sanjay Kumar, “Cyber Physical Systems and Smart Cities”, CSI Communications, Vol 41, Issue 9, pp 29 – 30, December 2017 [6] Suseela, Kavitha, “Cyber Physical System (CPS) and its Implications”, CSI Communications, Vol 41, Issue 9, pp 8 – 10, December 2017 [7] Antsaklis P, “Goals and Challenges in Cyber-Physical Systems Research Editorial of the Editor in Chief”, IEEE Transactions on Automatic Control, Vol. 59, No. 12, Dec 2014 [8] https://en.wikipedia.org/wiki/Cyber-physical_system [9] A Humayed, J Lin, F Li, B Luo, “Cyber-Physical Systems Security – A Survey”, Cornell University Library, Jan 2017, Available: https://arxiv.org/pdf/1701.04525.pdf [10] Charles P. Pfleeger and Shari Lawrence Pfleeger, “Security in Computing (4th Edition)”, Prentice Hall PTR, Upper Saddle River, NJ, USA, 2006 [11] James L Cebula and Lisa R Young. A taxonomy of operational cyber security risks. Technical report, DTIC Document, 2010 [12] Roberto Setola. Cyber threats to scada systems, 2011. [13] US-CERT. Cyber threat source descriptions, “https://ics- gov/content/cyber-threat-source-descriptions”, 2009 [14] Bartocci E, “Cyber-Physical Systems: Theoretical and Practical Challenges”, ERCIM news 2017. Available online: https://ercim-news.ercim.eu/en97/special/cyber-physical-systems-theoretical-and-practical-challenges
Paper ID: GRDJEV03I040055
Published in: Volume : 3, Issue : 4
Publication Date: 2018-04-01
Page(s): 12 - 14