Computer systems are present in every aspect of modern life. In many of these systems, corruption of data is unavoidable as a result of both intentional and unintentional means. In many systems, this erroneous data can result in severe consequences including financial loss, injury, or death. Critical infrastructure cyber-physical systems utilize intelligent control to improve performance; however, they are heavily data dependent. These systems have the potential to propagate corrupted data, leading to failure. This chapter presents a survey of work related to the propagation of corrupted data within critical infrastructure cyber-physical systems, including the sources of corrupted data and the structure of critical infrastructure cyber-physical systems. In addition, it presents a comparative analysis of various data corruption detection and mitigation techniques. Additionally, we discuss a number of studies on the negative effects of system execution on corrupted data. These key topics are essential to understanding how undetected corrupted data propagates through a critical infrastructure cyber-physical system.
- Critical Infrastructure,
- Cyber-Physical Systems,
- Data Corruption
Available at: http://works.bepress.com/sahra-sedigh/12/