{"title":"网络物理系统的安全威胁与对策","authors":"Li ZHANG, Qing WANG, Bin TIAN","doi":"10.1016/S1005-8885(13)60254-X","DOIUrl":null,"url":null,"abstract":"<div><p>Governments, companies and research institutions are pressuring research and development of the cyber-physical systems. However, the development of cyber-physical systems is constrained by security and privacy threats. This paper summarizes security threats to cyber-physical systems to provide a theoretical reference for study of cyber-physical systems as well as useful security measures. The architecture of cyber-physical systems is used to classify threats for the perception-execution layer, transport layer and application-control layer. The perception-execution layer threats include security threats for the nodes such as sensors and actuators. Transport layer threats include data leakage or damage and security issues during massive data integration. Application-control layer threats include the loss of user privacy, incorrect access control policies and inadequate security standards. Finally, this paper gives security measures and recommendations for all types of security threats.</p></div>","PeriodicalId":35359,"journal":{"name":"Journal of China Universities of Posts and Telecommunications","volume":"20 ","pages":"Pages 25-29"},"PeriodicalIF":0.0000,"publicationDate":"2013-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1005-8885(13)60254-X","citationCount":"31","resultStr":"{\"title\":\"Security threats and measures for the cyber-physical systems\",\"authors\":\"Li ZHANG, Qing WANG, Bin TIAN\",\"doi\":\"10.1016/S1005-8885(13)60254-X\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><p>Governments, companies and research institutions are pressuring research and development of the cyber-physical systems. However, the development of cyber-physical systems is constrained by security and privacy threats. This paper summarizes security threats to cyber-physical systems to provide a theoretical reference for study of cyber-physical systems as well as useful security measures. The architecture of cyber-physical systems is used to classify threats for the perception-execution layer, transport layer and application-control layer. The perception-execution layer threats include security threats for the nodes such as sensors and actuators. Transport layer threats include data leakage or damage and security issues during massive data integration. Application-control layer threats include the loss of user privacy, incorrect access control policies and inadequate security standards. Finally, this paper gives security measures and recommendations for all types of security threats.</p></div>\",\"PeriodicalId\":35359,\"journal\":{\"name\":\"Journal of China Universities of Posts and Telecommunications\",\"volume\":\"20 \",\"pages\":\"Pages 25-29\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2013-08-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"https://sci-hub-pdf.com/10.1016/S1005-8885(13)60254-X\",\"citationCount\":\"31\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Journal of China Universities of Posts and Telecommunications\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S100588851360254X\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q4\",\"JCRName\":\"Computer Science\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of China Universities of Posts and Telecommunications","FirstCategoryId":"1085","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S100588851360254X","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"Computer Science","Score":null,"Total":0}
Security threats and measures for the cyber-physical systems
Governments, companies and research institutions are pressuring research and development of the cyber-physical systems. However, the development of cyber-physical systems is constrained by security and privacy threats. This paper summarizes security threats to cyber-physical systems to provide a theoretical reference for study of cyber-physical systems as well as useful security measures. The architecture of cyber-physical systems is used to classify threats for the perception-execution layer, transport layer and application-control layer. The perception-execution layer threats include security threats for the nodes such as sensors and actuators. Transport layer threats include data leakage or damage and security issues during massive data integration. Application-control layer threats include the loss of user privacy, incorrect access control policies and inadequate security standards. Finally, this paper gives security measures and recommendations for all types of security threats.