TY - JOUR
T1 - Guest Editors' Introduction
T2 - Cyber-Physical Systems Security and Privacy
AU - Maniatakos, Michail
AU - Cardenas, Alvaro A.
AU - Karri, Ramesh
N1 - Publisher Copyright:
© 2013 IEEE.
PY - 2017/8
Y1 - 2017/8
N2 - During the past decade, several catch-phrases have been used to emphasize the increasing importance of cyber-physical systems (CPS) in our everyday life: Internet-of-Things, Internet-of-Everything, Smart-Cities, Smart-X, Intelligent-X, etc. All such systems, in their core, consist of networked computing (cyber) devices continuously interacting with the physical world. From fitness trackers and smart thermostats, to traffic light control and smart-grid devices, CPS have increased efficiency, enabled interesting applications and introduced major technological advancements. At the same time, due to their criticality, CPS have become a lucrative target for malicious actors. The wide deployment of CPS, as well as the increasing complexity of the underlying computing devices has increased the attack surface allowing a plethora of cyberattacks. The end-goal of the adversaries can be on the privacy side (e.g., leaking customer information), on the security side (e.g., causing a blackout), or both. Power and area constraints, as well as real-time requirements of CPS are limiting the defense capabilities of the computing devices.
AB - During the past decade, several catch-phrases have been used to emphasize the increasing importance of cyber-physical systems (CPS) in our everyday life: Internet-of-Things, Internet-of-Everything, Smart-Cities, Smart-X, Intelligent-X, etc. All such systems, in their core, consist of networked computing (cyber) devices continuously interacting with the physical world. From fitness trackers and smart thermostats, to traffic light control and smart-grid devices, CPS have increased efficiency, enabled interesting applications and introduced major technological advancements. At the same time, due to their criticality, CPS have become a lucrative target for malicious actors. The wide deployment of CPS, as well as the increasing complexity of the underlying computing devices has increased the attack surface allowing a plethora of cyberattacks. The end-goal of the adversaries can be on the privacy side (e.g., leaking customer information), on the security side (e.g., causing a blackout), or both. Power and area constraints, as well as real-time requirements of CPS are limiting the defense capabilities of the computing devices.
UR - http://www.scopus.com/inward/record.url?scp=85023602355&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85023602355&partnerID=8YFLogxK
U2 - 10.1109/MDAT.2017.2705028
DO - 10.1109/MDAT.2017.2705028
M3 - Review article
AN - SCOPUS:85023602355
SN - 2168-2356
VL - 34
SP - 5
EP - 6
JO - IEEE Design and Test
JF - IEEE Design and Test
IS - 4
M1 - 7964015
ER -