Lightweight Cryptography for Cyber-Physical Systems: State of the Art

Lightweight Cryptography for Cyber-Physical Systems: State of the Art

DOI: 10.4018/979-8-3693-1638-2.ch026
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Cyber-physical systems (CPS) are the next generation of intelligent systems that combine the inherent and comprehensive embedding of communication and control technologies to integrate computational resources with hardware facilities. The CPS modules are more vulnerable to an attacker, raising the possibility of physical attacks that might compromise security. For the implementation of lightweight cryptography in CPS, difficulties generally include finding a balance between industrial requirements and publicly available research data. Lightweight cryptographic primitives have a smaller footprint than traditional cryptographic primitives. Lightweight cryptographic techniques are required in the CPS paradigm to minimize latency and resources. Lightweight ciphers' performance advantages include reduced block and key lengths, along with simplified key scheduling. This chapter examines the usage of lightweight cryptography in cyber-physical systems.
Chapter Preview
Top

1. Introduction

Computing, networking, and physical process integration comprise Cyber-Physical Systems (CPS). In these systems, physical processes are often monitored and controlled by sophisticated embedded computers and networking, which includes feedback loops in which physical actions affect computations and vice versa. The commercial and social capabilities of such platforms are significantly higher than previously recognized; significant resources are being poured internationally to promote this modern technology. The technology is based on the previous but still relatively young topic of embedded systems, which are processors and software installed in devices other than computers, including vehicles, toys, healthcare goods, and laboratory equipment. CPS combines physical process dynamics with computer software and networking dynamics to provide frameworks, modeling, design, and analytic techniques for the linked whole system (Ashibani, 2017).

The merging of engineering and physical application domains with computer science, engineering devices, and cyberspace worlds is the core idea behind CPS development. Physics, simulation, and realistic intangible attributes like uncertainties in nature and volatility in business are illustrations of fundamental natural concepts.

At the same time, computer science and engineering fundamentals concentrate on embedded applications, communications, computing, and programming methods.

CPS has five tiers of technological application, and the structure of such a system is as devices or described in the following

  • a)

    Smart Connection Level:

gathering data from machines or components in an expedient, consistent, and precise manner, and delivering it to the information transformation layer.

  • b)

    Data-to-Information Conversion Level:

gathering and transforming data transferred from the smart connection level into relevant data for prediction and business applications.

  • c)

    Cyber Level:

A centralized data center for the system infrastructure and information from each of the interconnected devices constructs a machinery network. After accumulating a large amount of data, specialized analysis is necessary to retrieve more data in an attempt to fully comprehend the status of each device. These evaluations could also provide devices with the potential to self-analyze with other similar devices by comparing and analyzing devices at different points in time, which facilitates a thorough understanding of the status of each device in the cluster.

  • d)

    Cognition Level:

The device is analyzed after gathering data from other devices via the network stack and contrasting it with other occurrences. Certain particular prediction algorithms are used to forecast or determine the time of component failure based on previously gathered information.

  • e)

    Configuration Level:

Technicians and industrial managers may base decisions on input from cyberspace and physical space, as well as system monitoring and administration. Simultaneously, the device by itself can decrease the damage caused by system failures, permitting the rectification of mistakes as well as the implementation of precautionary measures.

Considering possible threats that can influence the cyber and physical ecosystems, CPS security is critical at all phases, including design, deployment, and operations. Furthermore, because CPS employed many critical infrastructure items, protection concerns have become highly important. Another issue to consider when integrating security and safety measures during the CPS design phase is their scattered nature. One conceivable point of view is to describe the complicated CPS as a peer-to-peer network, with critical nodes with computing capacity acting as ports or entry nodes for localized CPS segments.

Key Terms in this Chapter

Asymmetric Key Cryptography: (Also known as public-key cryptography) uses two different keys for encryption and decryption. The public key is used to encrypt data, and the private key is used to decrypt it. This type of cryptography is often used for authentication and digital signatures.

Security Attack: Is an attempt to exploit a security vulnerability in a system or network. Security attacks can be carried out by malicious actors, such as hackers, or by accidental means.

Cyber-Physical Systems (CPS): Are systems that integrate physical and computational components. CPS are often used in critical infrastructure, such as power grids and transportation systems. CPS are vulnerable to a variety of security threats, such as cyberattacks and physical attacks.

Cryptography: Is the practice and study of techniques for secure communication in the presence of third parties. It includes techniques for confidentiality, integrity, authentication, and non-repudiation.

Symmetric Key Cryptography: (Also known as private-key cryptography) uses the same key for encryption and decryption. This type of cryptography is typically more efficient than asymmetric key cryptography, but it is also less secure.

Lightweight Cryptography: Is a type of cryptography that is designed to be efficient on resource-constrained devices, such as embedded systems and mobile devices. It typically uses shorter keys and simpler algorithms than traditional cryptography.

Hash Function: Is a mathematical function that takes an input of any size and produces an output of a fixed size. Hash functions are often used to verify the integrity of data.

Security Threat: Is any potential danger to the security of a system or network. Security threats can come from a variety of sources, such as malicious software, human error, and natural disasters.

Complete Chapter List

Search this Book:
Reset