Original language | English |
---|---|
Title of host publication | Encyclopedia of Cryptography, Security and Privacy |
Place of Publication | Cham, Switzerland |
Publisher | Springer |
Number of pages | 7 |
DOIs | |
Publication status | Published - 14 Aug 2021 |
Abstract
Cyber Physical Systems: "Cyber-Physical Systems (CPS) comprise interacting digital, analog, physical, and human components engineered for function through integrated physics and logic. These systems will provide the foundation of our critical infrastructure, form the basis of emerging and future smart services, and improve our quality of life in many areas." (NIST, 2014)
Authentication: "Verifying the identity of a user, process, or device, often as a prerequisite to allowing access to resources in an information system." (NIST, 2004). Authentication in general means to establish validity of objects (e.g., a person, a machine, a process, or data) so that an untrusted object can be stopped. Level of trust is always an issue when dealing with cross-domain interactions.
Authenticating entities in CPS is an important aspect to ensure secure control and brings challenges that merit a detailed discussion. Cyber-Physical Systems by design are multi-domain systems. Ensuring authentication in such complex systems is crucial. In this work, the challenges and potential solutions regarding the authentication for CPS devices are highlighted.
Authentication: "Verifying the identity of a user, process, or device, often as a prerequisite to allowing access to resources in an information system." (NIST, 2004). Authentication in general means to establish validity of objects (e.g., a person, a machine, a process, or data) so that an untrusted object can be stopped. Level of trust is always an issue when dealing with cross-domain interactions.
Authenticating entities in CPS is an important aspect to ensure secure control and brings challenges that merit a detailed discussion. Cyber-Physical Systems by design are multi-domain systems. Ensuring authentication in such complex systems is crucial. In this work, the challenges and potential solutions regarding the authentication for CPS devices are highlighted.
Keywords
- cybersecurity
- verification
- fingerprinting
- identification