sensors-logo

Journal Browser

Journal Browser

Security in Cyber-Physical Systems

A special issue of Sensors (ISSN 1424-8220). This special issue belongs to the section "Internet of Things".

Deadline for manuscript submissions: closed (15 February 2023) | Viewed by 2146

Special Issue Editors


E-Mail Website
Guest Editor
Research Center for Information Technology Innovation, Academia Sinica, Taipei 10015, Taiwan
Interests: security; privacy; dependability; cloud computing
Department of Information Management and Finance, National Yang Ming Chiao Tung University, Hsinchu 300093, Taiwan
Interests: adversarial machine learning; computer and network security; data privacy and anonymization

Special Issue Information

Dear Colleagues,

As innovations continue in the design of cyber-physical systems (CPSs), hardware and software vendors are attempting to create new economic value by connecting devices, applications, and services through the Internet of Things. With the increase in the application of CPSs in infrastructures, any system failure can seriously harm its users. The engineering of CPSs requires high-security integrity levels and strong assurances that they are suitable for public use against security breaches and cybersecurity threats. Ensuring the safety of CPSs is at the core of research on CPSs, and it is a top priority for next-generation designs. This Special Issue focuses on the reliability, confidentiality, integrity, and availability of user-centric CPSs.

The objective of this Special Issue is to address challenges related to cyber-security and functional safety within the context of CPSs—including but not limited to:

  • Cyber-threats, cyber-risks, attacks, and defenses;
  • Privacy and security;
  • Artificial intelligence, machine learning, and deep learning approaches;
  • Case studies, experience reports, benchmarking, and best practices;
  • Healthcare, transportation, energy, robotics, unmanned aerial vehicles, autonomous vehicles, finance, business, etc.

Prof. Dr. Yennun Huang
Dr. Chia-Mu Yu
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Sensors is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Published Papers (1 paper)

Order results
Result details
Select all
Export citation of selected articles as:

Research

16 pages, 3659 KiB  
Article
Vulnerability Analysis and Security Assessment of Secure Keyboard Software to Prevent PS/2 Interface Keyboard Sniffing
by Kyungroul Lee and Kangbin Yim
Sensors 2023, 23(7), 3501; https://doi.org/10.3390/s23073501 - 27 Mar 2023
Cited by 3 | Viewed by 1486
Abstract
Online security threats have arisen through Internet banking hacking cases, and highly sensitive user information such as the ID, password, account number, and account password that is used for online payments has become vulnerable. Many security companies have therefore researched protection methods regarding [...] Read more.
Online security threats have arisen through Internet banking hacking cases, and highly sensitive user information such as the ID, password, account number, and account password that is used for online payments has become vulnerable. Many security companies have therefore researched protection methods regarding keyboard-entered data for the introduction of defense techniques. Recently, keyboard security issues have arisen due to the production of new malicious codes by attackers who have combined the existing attack techniques with new attack techniques; however, a keyboard security assessment is insufficient here. The research motivation is to serve more secure user authentication methods by evaluating the security of information input from the keyboard device for the user authentication, including Internet banking service. If the authentication information input from the keyboard device is exposed during user authentication, attackers can attempt to illegal login or, worst, steal the victim’s money. Accordingly, in this paper, the existing and the new keyboard-attack techniques that are known are surveyed, and the results are used as the basis for the implementation of sample malicious codes to verify both a security analysis and an assessment of secure keyboard software. As a result of the experiment, if the resend command utilization attack technique is used, 7 out of 10 companies’ products expose keyboard information, and only 1 company’s products detect it. The fundamental reason for these vulnerabilities is that the hardware chip related to the PS/2 interface keyboard does not provide security facilities. Therefore, since keyboard data exposure does not be prevented only by software, it is required to develop a hardware chip that provides security facilities. Full article
(This article belongs to the Special Issue Security in Cyber-Physical Systems)
Show Figures

Figure 1

Back to TopTop