Special Issue "Future and Emerging topics in Security for Cyber-Physical Systems"

A special issue of Future Internet (ISSN 1999-5903). This special issue belongs to the section "Cybersecurity".

Deadline for manuscript submissions: closed (30 April 2020).

Special Issue Editors

Prof. Vasilis Katos
Website
Guest Editor
Bournemouth University, Bournemouth, United Kingdom
Interests: incident response; security for smart infrastructures
Dr. Sotiris Ioannidis
Website
Guest Editor
Foundation of Research and Technology Hellas, Greece
Interests: systems, networks and security
Prof. Dr. Antonio Skarmeta
Website
Guest Editor
Prof. Dr. Michal Choras
Website
Guest Editor
University of Science and Technology (UTP), 85-796 Bydgoszcz, Poland
Interests: cybersecurity; assurance in EDGE/FOG computing; analytics for critical infrastructure protection and CPS
Special Issues and Collections in MDPI journals

Special Issue Information

Dear Colleagues,

The European Commission’s initiative for establishing a European Cybersecurity Industrial, Technology and Research Competence Centre and a Network of National Cybersecurity Coordination Centres seeks to develop competences in order to deal with the complex cyber threat landscape. This has led to the investment of almost 64 million Euros, which was allocated to funding four pilot projects that will assist in building capacities in the form of a network of competency centres [1]. A common denominator across these pilots is the research of cybersecurity technologies for different sectors and verticals, such as finance, maritime, healthcare, energy and so forth. At the same time, the proliferation of enabling technologies such as IoT and 5G has given rise to a complex ecosystem of Cyber Physical Systems, where threat actors can construct attack vectors covering both the cyber and physical domains. This, in turn, results in the increase of an organisation’s or smart infrastructure’s attack surface, enabling the transfer of risk between the cyber and the physical domain. Typically, cyber risks focusing on the information and data require security controls, whereas for the physical domain, we refer to studying safety aspects.

This Special Issue invites original research papers that showcase the complexity and diversity of cyberphysical systems security and introduce new approaches for securing such environments.  

Relevant topics include but are not limited to:

  • Digital twins for cybersecurity assessments
  • Threat intelligence for cyberphysical systems
  • Incident response in CPS environments
  • Cyber range technologies
  • Crowdsourcing and crowdsensing for cyber security
  • Threat modelling in CPS
  • Security and safety protocols for CPS
  • Security in mobile CPS

References: [1] https://ec.europa.eu/digital-single-market/en/news/four-eu-pilot-projects-prepare-european-cybersecurity-competence-network-infographic

Prof. Vasilis Katos
Dr. Sotiris Ioannidis
Prof. Antonio Skarmeta
Prof. Michal Choras
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All papers will be peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Future Internet is an international peer-reviewed open access monthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 1000 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • cyberphysical systems security
  • secure systems
  • resilience and robustness in CPS

Published Papers (3 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

Open AccessArticle
DPIA in Context: Applying DPIA to Assess Privacy Risks of Cyber Physical Systems
Future Internet 2020, 12(5), 93; https://doi.org/10.3390/fi12050093 - 24 May 2020
Abstract
Cyber Physical Systems (CPS) seamlessly integrate physical objects with technology, thereby blurring the boundaries between the physical and virtual environments. While this brings many opportunities for progress, it also adds a new layer of complexity to the risk assessment process when attempting to [...] Read more.
Cyber Physical Systems (CPS) seamlessly integrate physical objects with technology, thereby blurring the boundaries between the physical and virtual environments. While this brings many opportunities for progress, it also adds a new layer of complexity to the risk assessment process when attempting to ascertain what privacy risks this might impose on an organisation. In addition, privacy regulations, such as the General Data Protection Regulation (GDPR), mandate assessment of privacy risks, including making Data Protection Impact Assessments (DPIAs) compulsory. We present the DPIA Data Wheel, a holistic privacy risk assessment framework based on Contextual Integrity (CI), that practitioners can use to inform decision making around the privacy risks of CPS. This framework facilitates comprehensive contextual inquiry into privacy risk, that accounts for both the elicitation of privacy risks, and the identification of appropriate mitigation strategies. Further, by using this DPIA framework we also provide organisations with a means of assessing privacy from both the perspective of the organisation and the individual, thereby facilitating GDPR compliance. We empirically evaluate this framework in three different real-world settings. In doing so, we demonstrate how CI can be incorporated into the privacy risk decision-making process in a usable, practical manner that will aid decision makers in making informed privacy decisions. Full article
(This article belongs to the Special Issue Future and Emerging topics in Security for Cyber-Physical Systems)
Show Figures

Figure 1

Open AccessArticle
Cybersecurity and Safety Co-Engineering of Cyberphysical Systems—A Comprehensive Survey
Future Internet 2020, 12(4), 65; https://doi.org/10.3390/fi12040065 - 11 Apr 2020
Cited by 2
Abstract
Safeguarding both safety and cybersecurity is paramount to the smooth and trustworthy operation of contemporary cyber physical systems, many of which support critical functions and services. As safety and security have been known to be interdependent, they need to be jointly considered in [...] Read more.
Safeguarding both safety and cybersecurity is paramount to the smooth and trustworthy operation of contemporary cyber physical systems, many of which support critical functions and services. As safety and security have been known to be interdependent, they need to be jointly considered in such systems. As a result, various approaches have been proposed to address safety and cybersecurity co-engineering in cyber physical systems. This paper provides a comprehensive survey of safety and cybersecurity co-engineering methods, and discusses relevant open issues and research challenges. Despite the extent of the existing literature, several aspects of the subject still remain to be fully addressed. Full article
(This article belongs to the Special Issue Future and Emerging topics in Security for Cyber-Physical Systems)
Show Figures

Figure 1

Open AccessArticle
Towards the Design of a Collaborative Cybersecurity Networked Organisation: Identification and Prioritisation of Governance Needs and Objectives
Future Internet 2020, 12(4), 62; https://doi.org/10.3390/fi12040062 - 28 Mar 2020
Cited by 2
Abstract
The effective response to the proliferation and growing diversity and sophistication of cyber threats requires a broad spectrum of competencies, human, technological and financial resources that are in the powers of very few countries. The European Union is addressing this challenge through an [...] Read more.
The effective response to the proliferation and growing diversity and sophistication of cyber threats requires a broad spectrum of competencies, human, technological and financial resources that are in the powers of very few countries. The European Union is addressing this challenge through an initiative to establish one or more cybersecurity competence networks. A number of existing technologies can support collaboration in networked organisations; however, network governance remains a challenge. The study presented in this article aimed to identify and prioritise network governance issues. Towards that purpose, qualitative and quantitative methods were applied in the analysis of norms and regulations, statutory documents of existing networks, academic sources and interviews with representatives of funding organisations and potential major customers. The comprehensiveness and complementarity of these primary sources allowed to identify 33 categories of governance issues and group them in four tiers, indicative of the respective priority level. The results of the study are currently used to inform and orient the development of alternative models for governance of a cybersecurity network and a set of criteria for their evaluation. They will support informed decision-making on the most appropriate governance model of a future networked organisation, evolving from a project consortium. Full article
(This article belongs to the Special Issue Future and Emerging topics in Security for Cyber-Physical Systems)
Show Figures

Figure 1

Back to TopTop