嘉宾评论:网络物理系统的安全与隐私

IF 1.7 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS
Xiaojie Zhu, Jiankun Hu, Waqas Haider
{"title":"嘉宾评论:网络物理系统的安全与隐私","authors":"Xiaojie Zhu,&nbsp;Jiankun Hu,&nbsp;Waqas Haider","doi":"10.1049/cps2.70012","DOIUrl":null,"url":null,"abstract":"<p>Cyber-physical systems (CPS) serve as the backbone of critical infrastructure, seamlessly integrating computation, networking and physical processes. However, the growing interconnectivity of these systems also increases their exposure to sophisticated cyber threats. Ensuring the security and privacy of CPS is crucial to maintaining operational stability, preventing service disruptions and mitigating cascading failures.</p><p>This Special Issue presents cutting-edge research addressing diverse aspects of CPS security, ranging from attack methodologies to vulnerability assessments and resilience strategies. The selected papers provide insights into real-time attack implementations, advanced analytics using graph theory, multi-stage cyber threat scenarios and socio-technical security modelling.</p><p>In this Special Issue, we have received 7 papers, all of which underwent peer review. Of the six originally submitted papers, four have been accepted and two have been ‘rejected with referral’, that is, they did not meet the criteria for publication to the IET Cyber-Physical Systems: Theory &amp; Applications, and on. Thus, the overall submissions were of high quality, which marks the success of this Special Issue.</p><p>The four eventually accepted papers can be categorised into four key themes: (1) cyber-physical attack modelling and system vulnerability, (2) graph-based cyber-physical system security analysis, (3) multi-stage cyber threats and impact assessment and (4) socio-technical security modelling for cyber-physical systems.</p><p>Yadav et al. investigate the impact of sliding mode-based switching attacks on power system components. By leveraging real-time simulation techniques, the study highlights how cyber-attacks on circuit breakers, excitation systems and governors can lead to cascading failures. The results offer valuable insights into the vulnerabilities of power grids and the need for proactive mitigation measures.</p><p>Jacobs et al. introduce a novel graph clustering approach for analysing cyber-physical interactions in smart grid environments. The study demonstrates how clustering techniques can help characterise disturbances, identify critical system components and enhance situational awareness. These findings pave the way for improved cybersecurity strategies by enabling better detection and response mechanisms.</p><p>Al Homoud et al. present an in-depth case study on a multi-stage cyber threat targeting power systems. The research details how cyber intrusions can escalate, leading to severe physical consequences in the grid. By leveraging the MITRE ATT&amp;CK framework, the authors propose defence strategies that enhance the resilience of cyber-physical energy management systems.</p><p>Ani et al. explore socio-technical security modelling and simulation (STSec-M&amp;S) in cyber-physical systems (CPS) to enhance critical infrastructure (CI) cybersecurity, emphasising its potential for integrating technical and social aspects to improve system understanding and risk management while addressing barriers like complexity, high costs and data limitations through holistic models, realistic data and cross-sector collaboration.</p><p>The research featured in this Special Issue underscores the growing complexity of cyber threats in CPS environments. The integration of real-time attack simulations, graph-based security analysis, multi-stage threat modelling and socio-technical security modelling provides a comprehensive perspective on CPS security. Future research should focus on AI-driven threat detection, quantum-secure communication protocols and adaptive defence mechanisms to counter evolving cyber threats.</p><p>The authors declare no conflicts of interest.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"10 1","pages":""},"PeriodicalIF":1.7000,"publicationDate":"2025-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.70012","citationCount":"0","resultStr":"{\"title\":\"Guest Editorial: Security and Privacy of Cyber-Physical System\",\"authors\":\"Xiaojie Zhu,&nbsp;Jiankun Hu,&nbsp;Waqas Haider\",\"doi\":\"10.1049/cps2.70012\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<p>Cyber-physical systems (CPS) serve as the backbone of critical infrastructure, seamlessly integrating computation, networking and physical processes. However, the growing interconnectivity of these systems also increases their exposure to sophisticated cyber threats. Ensuring the security and privacy of CPS is crucial to maintaining operational stability, preventing service disruptions and mitigating cascading failures.</p><p>This Special Issue presents cutting-edge research addressing diverse aspects of CPS security, ranging from attack methodologies to vulnerability assessments and resilience strategies. The selected papers provide insights into real-time attack implementations, advanced analytics using graph theory, multi-stage cyber threat scenarios and socio-technical security modelling.</p><p>In this Special Issue, we have received 7 papers, all of which underwent peer review. Of the six originally submitted papers, four have been accepted and two have been ‘rejected with referral’, that is, they did not meet the criteria for publication to the IET Cyber-Physical Systems: Theory &amp; Applications, and on. Thus, the overall submissions were of high quality, which marks the success of this Special Issue.</p><p>The four eventually accepted papers can be categorised into four key themes: (1) cyber-physical attack modelling and system vulnerability, (2) graph-based cyber-physical system security analysis, (3) multi-stage cyber threats and impact assessment and (4) socio-technical security modelling for cyber-physical systems.</p><p>Yadav et al. investigate the impact of sliding mode-based switching attacks on power system components. By leveraging real-time simulation techniques, the study highlights how cyber-attacks on circuit breakers, excitation systems and governors can lead to cascading failures. The results offer valuable insights into the vulnerabilities of power grids and the need for proactive mitigation measures.</p><p>Jacobs et al. introduce a novel graph clustering approach for analysing cyber-physical interactions in smart grid environments. The study demonstrates how clustering techniques can help characterise disturbances, identify critical system components and enhance situational awareness. These findings pave the way for improved cybersecurity strategies by enabling better detection and response mechanisms.</p><p>Al Homoud et al. present an in-depth case study on a multi-stage cyber threat targeting power systems. The research details how cyber intrusions can escalate, leading to severe physical consequences in the grid. By leveraging the MITRE ATT&amp;CK framework, the authors propose defence strategies that enhance the resilience of cyber-physical energy management systems.</p><p>Ani et al. explore socio-technical security modelling and simulation (STSec-M&amp;S) in cyber-physical systems (CPS) to enhance critical infrastructure (CI) cybersecurity, emphasising its potential for integrating technical and social aspects to improve system understanding and risk management while addressing barriers like complexity, high costs and data limitations through holistic models, realistic data and cross-sector collaboration.</p><p>The research featured in this Special Issue underscores the growing complexity of cyber threats in CPS environments. The integration of real-time attack simulations, graph-based security analysis, multi-stage threat modelling and socio-technical security modelling provides a comprehensive perspective on CPS security. Future research should focus on AI-driven threat detection, quantum-secure communication protocols and adaptive defence mechanisms to counter evolving cyber threats.</p><p>The authors declare no conflicts of interest.</p>\",\"PeriodicalId\":36881,\"journal\":{\"name\":\"IET Cyber-Physical Systems: Theory and Applications\",\"volume\":\"10 1\",\"pages\":\"\"},\"PeriodicalIF\":1.7000,\"publicationDate\":\"2025-06-16\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.70012\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IET Cyber-Physical Systems: Theory and Applications\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://onlinelibrary.wiley.com/doi/10.1049/cps2.70012\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q3\",\"JCRName\":\"COMPUTER SCIENCE, INFORMATION SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IET Cyber-Physical Systems: Theory and Applications","FirstCategoryId":"1085","ListUrlMain":"https://onlinelibrary.wiley.com/doi/10.1049/cps2.70012","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0

摘要

信息物理系统(CPS)作为关键基础设施的骨干,无缝集成计算、网络和物理过程。然而,这些系统日益增长的互联性也增加了它们面临复杂网络威胁的风险。确保CPS的安全性和隐私性对于维护运营稳定性、防止服务中断和减轻级联故障至关重要。本期特刊介绍了解决CPS安全各个方面的前沿研究,从攻击方法到漏洞评估和弹性策略。所选论文提供了对实时攻击实施,使用图论的高级分析,多阶段网络威胁场景和社会技术安全建模的见解。本期特刊共收到7篇论文,均经过同行评议。在最初提交的六篇论文中,四篇被接受,两篇被“推荐拒绝”,也就是说,它们不符合发表在IET网络物理系统:理论和;应用程序等。因此,所有的投稿都是高质量的,这标志着这期特刊的成功。四篇最终被接受的论文可分为四个关键主题:(1)网络物理攻击建模和系统脆弱性;(2)基于图形的网络物理系统安全分析;(3)多阶段网络威胁和影响评估;(4)网络物理系统的社会技术安全建模。Yadav等人研究了基于滑模的开关攻击对电力系统组件的影响。通过利用实时仿真技术,该研究强调了对断路器、励磁系统和调速器的网络攻击如何导致级联故障。研究结果对电网的脆弱性和采取主动缓解措施的必要性提供了有价值的见解。Jacobs等人介绍了一种新的图聚类方法,用于分析智能电网环境中的网络物理交互。该研究展示了聚类技术如何帮助描述干扰、识别关键系统组件和增强态势感知。这些发现通过实现更好的检测和响应机制,为改进网络安全策略铺平了道路。Al Homoud等人对针对电力系统的多阶段网络威胁进行了深入的案例研究。该研究详细说明了网络入侵是如何升级的,并在电网中导致严重的物理后果。通过利用MITRE att&ck框架,作者提出了增强网络物理能源管理系统弹性的防御策略。Ani等人探索了网络物理系统(CPS)中的社会技术安全建模和仿真(STSec-M&;S),以增强关键基础设施(CI)网络安全,强调其整合技术和社会方面的潜力,以提高系统理解和风险管理,同时通过整体模型、现实数据和跨部门协作解决复杂性、高成本和数据限制等障碍。本期特刊的研究强调了CPS环境中日益复杂的网络威胁。实时攻击模拟、基于图形的安全分析、多阶段威胁建模和社会技术安全建模的集成为CPS安全提供了一个全面的视角。未来的研究应侧重于人工智能驱动的威胁检测、量子安全通信协议和自适应防御机制,以应对不断变化的网络威胁。作者声明无利益冲突。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Guest Editorial: Security and Privacy of Cyber-Physical System

Cyber-physical systems (CPS) serve as the backbone of critical infrastructure, seamlessly integrating computation, networking and physical processes. However, the growing interconnectivity of these systems also increases their exposure to sophisticated cyber threats. Ensuring the security and privacy of CPS is crucial to maintaining operational stability, preventing service disruptions and mitigating cascading failures.

This Special Issue presents cutting-edge research addressing diverse aspects of CPS security, ranging from attack methodologies to vulnerability assessments and resilience strategies. The selected papers provide insights into real-time attack implementations, advanced analytics using graph theory, multi-stage cyber threat scenarios and socio-technical security modelling.

In this Special Issue, we have received 7 papers, all of which underwent peer review. Of the six originally submitted papers, four have been accepted and two have been ‘rejected with referral’, that is, they did not meet the criteria for publication to the IET Cyber-Physical Systems: Theory & Applications, and on. Thus, the overall submissions were of high quality, which marks the success of this Special Issue.

The four eventually accepted papers can be categorised into four key themes: (1) cyber-physical attack modelling and system vulnerability, (2) graph-based cyber-physical system security analysis, (3) multi-stage cyber threats and impact assessment and (4) socio-technical security modelling for cyber-physical systems.

Yadav et al. investigate the impact of sliding mode-based switching attacks on power system components. By leveraging real-time simulation techniques, the study highlights how cyber-attacks on circuit breakers, excitation systems and governors can lead to cascading failures. The results offer valuable insights into the vulnerabilities of power grids and the need for proactive mitigation measures.

Jacobs et al. introduce a novel graph clustering approach for analysing cyber-physical interactions in smart grid environments. The study demonstrates how clustering techniques can help characterise disturbances, identify critical system components and enhance situational awareness. These findings pave the way for improved cybersecurity strategies by enabling better detection and response mechanisms.

Al Homoud et al. present an in-depth case study on a multi-stage cyber threat targeting power systems. The research details how cyber intrusions can escalate, leading to severe physical consequences in the grid. By leveraging the MITRE ATT&CK framework, the authors propose defence strategies that enhance the resilience of cyber-physical energy management systems.

Ani et al. explore socio-technical security modelling and simulation (STSec-M&S) in cyber-physical systems (CPS) to enhance critical infrastructure (CI) cybersecurity, emphasising its potential for integrating technical and social aspects to improve system understanding and risk management while addressing barriers like complexity, high costs and data limitations through holistic models, realistic data and cross-sector collaboration.

The research featured in this Special Issue underscores the growing complexity of cyber threats in CPS environments. The integration of real-time attack simulations, graph-based security analysis, multi-stage threat modelling and socio-technical security modelling provides a comprehensive perspective on CPS security. Future research should focus on AI-driven threat detection, quantum-secure communication protocols and adaptive defence mechanisms to counter evolving cyber threats.

The authors declare no conflicts of interest.

求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
IET Cyber-Physical Systems: Theory and Applications
IET Cyber-Physical Systems: Theory and Applications Computer Science-Computer Networks and Communications
CiteScore
5.40
自引率
6.70%
发文量
17
审稿时长
19 weeks
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信