{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T02:45:02Z","timestamp":1773974702193,"version":"3.50.1"},"reference-count":18,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2020,12,30]],"date-time":"2020-12-30T00:00:00Z","timestamp":1609286400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Cyber-Phys. Syst."],"published-print":{"date-parts":[[2021,1,31]]},"abstract":"<jats:p>Industrial cyber-physical systems (&lt;monospace&gt;ICPS&lt;\/monospace&gt;) are heterogeneous inter-operating parts that can be physical, technical, networking, and even social like agent operators. Incrementally, they perform a central role in critical and industrial infrastructures, governmental, and personal daily life. Especially with the Industry 4.0 revolution, they became more dependent on the connectivity by supporting novel communication and distance control functionalities, which expand their attack surfaces that result in a high risk for cyber-attacks. Furthermore, regarding physical and social constraints, they may push up new classes of security breaches that might result in serious economic damages. Thus, designing a secure &lt;monospace&gt;ICPS&lt;\/monospace&gt;\u00a0 is a complex task, since this needs to guarantee security and harmonize the functionalities between the various parts that interact with different technologies. This article highlights the significance of cyber-security infrastructure and shows how to evaluate, prevent, and mitigate &lt;monospace&gt;ICPS&lt;\/monospace&gt;-based cyber-attacks. We carried out this objective by establishing an adequate semantics for &lt;monospace&gt;ICPS&lt;\/monospace&gt;\u2019s entities and their composition, which includes social actors that act differently than mobile robots and automated processes. This article also provides the feasible attacks generated by a reinforcement learning mechanism based on multiple criteria that selects both appropriate actions for each &lt;monospace&gt;ICPS&lt;\/monospace&gt;\u00a0component and the possible countermeasures for mitigation. To efficiently analyze &lt;monospace&gt;ICPS&lt;\/monospace&gt;\u2019s security, we proposed a model-checking-based framework that relies on a set of predefined attacks from where the security requirements are used to assess how well the model is secure. Finally, to show the effectiveness of the proposed solution, we model, analyze, and evaluate the &lt;monospace&gt;ICPS&lt;\/monospace&gt;\u00a0 security on two real use cases.<\/jats:p>","DOI":"10.1145\/3422369","type":"journal-article","created":{"date-parts":[[2020,12,30]],"date-time":"2020-12-30T13:09:05Z","timestamp":1609333745000},"page":"1-28","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":25,"title":["Assessing the Severity of Smart Attacks in Industrial Cyber-Physical Systems"],"prefix":"10.1145","volume":"5","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8663-4498","authenticated-orcid":false,"given":"Abdelaziz","family":"Khaled","sequence":"first","affiliation":[{"name":"Evina, Paris, France"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7997-8225","authenticated-orcid":false,"given":"Samir","family":"Ouchani","sequence":"additional","affiliation":[{"name":"LINEACT, CESI Engineering School, Aix-en-Provence, France"}]},{"given":"Zahir","family":"Tari","sequence":"additional","affiliation":[{"name":"School of Science, RMIT University, Australia"}]},{"given":"Khalil","family":"Drira","sequence":"additional","affiliation":[{"name":"CNRS, LAAS, France"}]}],"member":"320","published-online":{"date-parts":[[2020,12,30]]},"reference":[{"key":"e_1_2_1_1_1","volume-title":"Proceedings of the IEEE 40th Annual Computer Software and Applications Conference (COMPSAC\u201916)","volume":"1","author":"Adepu S.","unstructured":"S. Adepu and A. Mathur . 2016. Generalized attacker and attack models for cyber-physical systems . In Proceedings of the IEEE 40th Annual Computer Software and Applications Conference (COMPSAC\u201916) , Vol. 1 . 283--292. S. Adepu and A. Mathur. 2016. Generalized attacker and attack models for cyber-physical systems. In Proceedings of the IEEE 40th Annual Computer Software and Applications Conference (COMPSAC\u201916), Vol. 1. 283--292."},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3196494.3201587"},{"key":"e_1_2_1_3_1","volume-title":"Principles of Cyber-Physical Systems","author":"Alur Rajeev","unstructured":"Rajeev Alur . 2015. Principles of Cyber-Physical Systems . The MIT Press . Rajeev Alur. 2015. Principles of Cyber-Physical Systems. The MIT Press."},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/J.COSE.2017.04.005"},{"key":"e_1_2_1_5_1","volume-title":"Proceedings of the Annual IEEE International Systems Conference (SysCon\u201918)","author":"Bakirtzis G.","unstructured":"G. Bakirtzis , B. T. Carter , C. R. Elks , and C. H. Fleming . 2018. A model-based approach to security analysis for cyber-physical systems . In Proceedings of the Annual IEEE International Systems Conference (SysCon\u201918) . 1--8. G. Bakirtzis, B. T. Carter, C. R. Elks, and C. H. Fleming. 2018. A model-based approach to security analysis for cyber-physical systems. In Proceedings of the Annual IEEE International Systems Conference (SysCon\u201918). 1--8."},{"key":"e_1_2_1_6_1","volume-title":"Proceedings of the IEEE 23rd Pacific Rim International Symposium on Dependable Computing (PRDC\u201918)","author":"Cheh Carmen","unstructured":"Carmen Cheh , Ahmed M. Fawaz , Mohammad A. Noureddine , Bin Bin Chen , William G. Temple , and William H. Sanders . 2018. Determining tolerable attack surfaces that preserves safety of cyber-physical systems . In Proceedings of the IEEE 23rd Pacific Rim International Symposium on Dependable Computing (PRDC\u201918) . 125--134. Carmen Cheh, Ahmed M. Fawaz, Mohammad A. Noureddine, Bin Bin Chen, William G. Temple, and William H. Sanders. 2018. Determining tolerable attack surfaces that preserves safety of cyber-physical systems. In Proceedings of the IEEE 23rd Pacific Rim International Symposium on Dependable Computing (PRDC\u201918). 125--134."},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2016.2626267"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1983.1056650"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2015.02.019"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2016.11.002"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2015.2406860"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-00856-7_27"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-015-0269-8"},{"key":"e_1_2_1_14_1","volume-title":"Foundations and Practice of Security, Abdessamad Imine, Jos\u00e9 M","author":"Puys Maxime","unstructured":"Maxime Puys , Marie-Laure Potet , and Abdelaziz Khaled . 2018. Generation of applicative attacks scenarios against industrial systems . In Foundations and Practice of Security, Abdessamad Imine, Jos\u00e9 M . Fernandez, Jean-Yves Marion, Luigi Logrippo, and Joaquin Garcia-Alfaro (Eds.). Springer International Publishing , Cham , 127--143. Maxime Puys, Marie-Laure Potet, and Abdelaziz Khaled. 2018. Generation of applicative attacks scenarios against industrial systems. In Foundations and Practice of Security, Abdessamad Imine, Jos\u00e9 M. Fernandez, Jean-Yves Marion, Luigi Logrippo, and Joaquin Garcia-Alfaro (Eds.). Springer International Publishing, Cham, 127--143."},{"key":"e_1_2_1_15_1","volume-title":"CPDY: Extending the Dolev-Yao attacker with physical-layer interactions","author":"Rocchetto Marco","year":"2016","unstructured":"Marco Rocchetto and Nils Ole Tippenhauer . 2016 . CPDY: Extending the Dolev-Yao attacker with physical-layer interactions . In Formal Methods and Software Engineering, Kazuhiro Ogata, Mark Lawford, and Shaoying Liu (Eds.). Springer International Publishing , Cham , 175--192. Marco Rocchetto and Nils Ole Tippenhauer. 2016. CPDY: Extending the Dolev-Yao attacker with physical-layer interactions. In Formal Methods and Software Engineering, Kazuhiro Ogata, Mark Lawford, and Shaoying Liu (Eds.). Springer International Publishing, Cham, 175--192."},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-45741-3_22"},{"key":"e_1_2_1_17_1","volume-title":"Mathur","author":"Sabaliauskaite Giedre","year":"2015","unstructured":"Giedre Sabaliauskaite and Aditya P . Mathur . 2015 . Aligning cyber-physical system safety and security. In Complex Systems Design 8 Management Asia, Michel-Alexandre Cardin, Daniel Krob, Pao Chuen Lui, Yang How Tan, and Kristin Wood (Eds.). Springer International Publishing , Cham, 41--53. Giedre Sabaliauskaite and Aditya P. Mathur. 2015. Aligning cyber-physical system safety and security. In Complex Systems Design 8 Management Asia, Michel-Alexandre Cardin, Daniel Krob, Pao Chuen Lui, Yang How Tan, and Kristin Wood (Eds.). Springer International Publishing, Cham, 41--53."},{"key":"e_1_2_1_18_1","volume-title":"Krishnarajanagar GopalaIyengar Srinivasa, and Lalit Mohan Patnaik.","author":"Siddesh Gaddadevara Matt","year":"2015","unstructured":"Gaddadevara Matt Siddesh , Ganesh Chandra Deka , Krishnarajanagar GopalaIyengar Srinivasa, and Lalit Mohan Patnaik. 2015 . Cyber-Physical Systems: A Computational Perspective. Chapman 8 Hall\/CRC. Gaddadevara Matt Siddesh, Ganesh Chandra Deka, Krishnarajanagar GopalaIyengar Srinivasa, and Lalit Mohan Patnaik. 2015. Cyber-Physical Systems: A Computational Perspective. Chapman 8 Hall\/CRC."}],"container-title":["ACM Transactions on Cyber-Physical Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3422369","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3422369","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:03:21Z","timestamp":1750197801000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3422369"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12,30]]},"references-count":18,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2021,1,31]]}},"alternative-id":["10.1145\/3422369"],"URL":"https:\/\/doi.org\/10.1145\/3422369","relation":{},"ISSN":["2378-962X","2378-9638"],"issn-type":[{"value":"2378-962X","type":"print"},{"value":"2378-9638","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,12,30]]},"assertion":[{"value":"2019-06-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2020-09-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2020-12-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}