{"title":"数据完整性:物联网和网络物理系统的安全威胁","authors":"Vishwanath G. Garagad, N. Iyer, Heera G Wali","doi":"10.1109/ComPE49325.2020.9200170","DOIUrl":null,"url":null,"abstract":"Internet of Things (IoT), is emerging as the most evolving technology and contributing to the critical domain areas from transportation, to manufacturing, to energy, to automation, to space, to defence, to health care. IoT system architecture is an aggregation of Cyber-Physical Systems (CPS) that include multiple edge nodes like sensors, actuators or devices as primary components of the system. The crucial element in the existence and evolution of IoT is collecting rich and diverse data stream from the application of interest. Information extracted from data inference mostly drives the decisional policies of the cyber-physical system, which govern the functionality of critical application areas. Edge devices play the role of data generator, collector, or integrator of the system. The fact that these edge devices are ubiquitous and placed in easily accessible unsecured locations make then prone to cyber-attacks. The data sourced through these systems being safety-critical and high commercial value, draw the attention of adversary to attempt for cyber attacks unceasingly. This survey paper contributes in terms of identifying the security threats and challenges related to privacy and security of data in the context of IoT systems and CPS. Data tampering and malicious infusion are the prime sources of threats. The paper also outlines the current state of art research to identify and mitigate such data integrity threats and attacks.","PeriodicalId":6804,"journal":{"name":"2020 International Conference on Computational Performance Evaluation (ComPE)","volume":"82 3","pages":"244-249"},"PeriodicalIF":0.0000,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"9","resultStr":"{\"title\":\"Data Integrity: A security threat for Internet of Things and Cyber-Physical Systems\",\"authors\":\"Vishwanath G. Garagad, N. Iyer, Heera G Wali\",\"doi\":\"10.1109/ComPE49325.2020.9200170\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Internet of Things (IoT), is emerging as the most evolving technology and contributing to the critical domain areas from transportation, to manufacturing, to energy, to automation, to space, to defence, to health care. IoT system architecture is an aggregation of Cyber-Physical Systems (CPS) that include multiple edge nodes like sensors, actuators or devices as primary components of the system. The crucial element in the existence and evolution of IoT is collecting rich and diverse data stream from the application of interest. Information extracted from data inference mostly drives the decisional policies of the cyber-physical system, which govern the functionality of critical application areas. Edge devices play the role of data generator, collector, or integrator of the system. The fact that these edge devices are ubiquitous and placed in easily accessible unsecured locations make then prone to cyber-attacks. The data sourced through these systems being safety-critical and high commercial value, draw the attention of adversary to attempt for cyber attacks unceasingly. This survey paper contributes in terms of identifying the security threats and challenges related to privacy and security of data in the context of IoT systems and CPS. Data tampering and malicious infusion are the prime sources of threats. The paper also outlines the current state of art research to identify and mitigate such data integrity threats and attacks.\",\"PeriodicalId\":6804,\"journal\":{\"name\":\"2020 International Conference on Computational Performance Evaluation (ComPE)\",\"volume\":\"82 3\",\"pages\":\"244-249\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-07-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"9\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 International Conference on Computational Performance Evaluation (ComPE)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ComPE49325.2020.9200170\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 International Conference on Computational Performance Evaluation (ComPE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ComPE49325.2020.9200170","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Data Integrity: A security threat for Internet of Things and Cyber-Physical Systems
Internet of Things (IoT), is emerging as the most evolving technology and contributing to the critical domain areas from transportation, to manufacturing, to energy, to automation, to space, to defence, to health care. IoT system architecture is an aggregation of Cyber-Physical Systems (CPS) that include multiple edge nodes like sensors, actuators or devices as primary components of the system. The crucial element in the existence and evolution of IoT is collecting rich and diverse data stream from the application of interest. Information extracted from data inference mostly drives the decisional policies of the cyber-physical system, which govern the functionality of critical application areas. Edge devices play the role of data generator, collector, or integrator of the system. The fact that these edge devices are ubiquitous and placed in easily accessible unsecured locations make then prone to cyber-attacks. The data sourced through these systems being safety-critical and high commercial value, draw the attention of adversary to attempt for cyber attacks unceasingly. This survey paper contributes in terms of identifying the security threats and challenges related to privacy and security of data in the context of IoT systems and CPS. Data tampering and malicious infusion are the prime sources of threats. The paper also outlines the current state of art research to identify and mitigate such data integrity threats and attacks.