However, none of the existing works presented a comprehensive view of CPS security in terms of threats, vulnerabilities, and attacks based on the targeted domain (cyber, physical, or hybrid). some of the security issues were reviewed, including big data security, , IoT storage issues, and Operating System vulnerabilities several security and privacy solutions using cryptographic algorithms and protocols were discussed in Kocabas et al. CPS security challenges and issues were presented in Yoo and Shon, Alguliyev et al. Recently, several research works addressed the different security aspects of CPS: the different CPS security goals were listed and discussed in Chen, Miller and Valasek, Bou-Harb, Sklavos and Zaharakis maintaining CPS security was presented in Humayed et al. Moreover, CPS can be used in supply chain management to enable echo-friendly, transient, cost efficient, and safe manufacturing process. That, in addition to medical care domains to enhance the medical services. ), and embedded in different systems such as power transmission systems, communication systems, agricultural/ecological systems, military systems, , and autonomous systems (drones, robotics, autonomous cars, etc.). In fact, CPS systems are being used in multiple domains (see Fig. 1 This is mainly attributed to their flexibility and capability to change the run-time of system(s) process(es) through the use of real-time computing. Moreover, CPS systems can sense the surrounding environment, with the ability to adapt and control the physical world.
CPS includes three main central components: sensors, aggregators and actuators. In other words, CPS consists of the combination of various interconnected systems with the ability to monitor and manipulate real IoT-related objects and processes. Ī CPS is identified as a network of embedded systems that interact with physical input and output. Given that CPS and Industry v4.0 offer a significant economic potential, the German gross value will be boosted by a cumulative of 267 billion Euros by 2025 upon the introduction of CPS into Industry v4.0.
The development of CPS is being carried out by researchers and manufacturers alike. They are based on the integration of cyber and physical systems, which exchange various types of data and sensitive information in a real-time manner. CPS enables smart applications and services to operate accurately and in real-time. Finally, several suggestions and recommendations are proposed benefiting from the lessons learned throughout this comprehensive review.Ĭyber Physical Systems (CPS) are designated as essential components of the Industrial Internet of Things (IIoT), and they are supposed to play a key role in Industry v4.0. Additionally, the existing security measures are presented and analyzed while identifying their main limitations. Moreover, CPS security vulnerabilities, threats and attacks are reviewed, while the key issues and challenges are identified. This paper surveys the main aspects of CPS and the corresponding applications, technologies, and standards. Consequently, CPS security has attracted the attention of both researchers and industries. However, interconnecting the cyber and physical worlds gives rise to new dangerous security challenges. The fast and significant evolution of CPS affects various aspects in people’s way of life and enables a wider range of services and applications including e-Health, smart homes, e-Commerce, etc. Their integration with IoT led to a new CPS aspect, the Internet of Cyber-Physical Things (IoCPT). They are closely related to Internet of Things (IoT) systems, except that CPS focuses on the interaction between physical, networking and computation processes. Typically, Cyber-Physical Systems (CPS) involve various interconnected systems, which can monitor and manipulate real objects and processes.