Cyber-Physical Systems for Enhancing Security in Critical Infrastructure: Addressing Nigeria’s Security Challenges
Keywords:
Nigeria, Cyber-Physical Systems, MTTR, Purdue Model, ICS Resilience, AI Security, Anomaly Detection, Critical InfrastructureAbstract
Cyber-Physical Systems (CPS) are increasingly central to the operation of critical, particularly in emerging economies where digital transformation is accelerating amid limited cybersecurity maturity. This study proposes and validates a context-specific, multi layered CPS security and resilience framework tailored to Nigeria’s infrastructural realities. The framework integrates architectural segmentation (based on the Purdue Model), AI-driven anomaly detection using Long Short-Term Memory (LSTM) networks, and resilience engineering practices such as automated failover and safe-state recovery. Using a simulation testbed emulating smart grid and campus energy systems, the framework was benchmarked against traditional and AI-only detection baselines. Results show that the hybrid architecture improves detection accuracy to 97.8%, reduces false positives to under 1%, and decreases Mean Time to Recovery (MTTR) from 7.8 to 1.9 hours. Downtime was reduced by 88.9%, and cost-benefit analysis revealed a 133% return on investment (ROI) within the first year. These gains were validated through historical event logs and economic modeling using avoided-loss estimation. This framework offers a deployable roadmap for enhancing national cyber resilience in resource constrained settings by combining advanced control algorithms, layered defense principles, and contextual policy alignment. It is particularly relevant to sectors like education, energy, and industrial automation, where CPS integration is outpacing security governance. The findings emphasize that a tailored, resilience-by-design approach rooted in real-time analytics and system containment can substantially improve operational continuity and economic sustainability for critical infrastructure operators.
Downloads
References
Achunike, V. U., & Egbuna, F. C. (2020). Synopsis of cyber- attacks incidents and impacts on oil and gas critical infrastructures: A Nigerian perspective. International Journal of Advances in Engineering and Management, 2(3), 335–343.
Ali, A. M., Salih, S. Q., Alsaqer, M., & Mohammed, M. A. (2022). Enhancing cyber-physical system security through AI-driven intrusion detection and blockchain integration. International Journal of Computational and Experimental Science and Engineering, 8(2), 25–34.
Alaa, M., Zain, A., & Al-Yasiri, A. (2022). AI-based intrusion detection systems in SCADA: A review of current techniques and challenges. Journal of Intelligent & Fuzzy Systems, 42(1), 345–361. https://doi.org/10.3233/JIFS-
219076.
Carnegie Endowment for International Peace. (2022). Cybersecurity in Nigeria’s Financial Industry: Enhancing Consumer Trust and Security. https://carnegieendowment.org
Chadha, V., Aneja, N., & Arora, A. (2023). A survey on AI-based intrusion detection systems for industrial control systems. Journal of Cybersecurity and Privacy, 3(1), 1–23. https://doi.org/10.3390/jcp3010001.
Claroty. (2023). ICS Security: The Purdue Model. https://claroty.com/blog/ics-security-the-purdue-model.
Claroty. (2024). The Global State of CPS Security: Business Impact of Disruptions. https://claroty.com/resources CISA. (2016). Cyber-Attack Against Ukrainian Critical Infrastructure. Cybersecurity and Infrastructure Security Agency. https://www.cisa.gov
Dragos. (2022). ICS/OT Cybersecurity Year in Review. https://www.dragos.com
Ebelogu, C. U., Prasad, R., Bisallah, H. I., Hammawa, B. M., & Musa, I. (2025). Investigation of cybersecurity vulnerabilities and mitigation strategies in Nigeria's oil and gas industry. African Journal of Engineering Research and Development, 8(1), 140–150.
ISA. (2025). Update to ISA/IEC 62443 Standards: Organizational Cybersecurity Guidance for Critical Infrastructure. International Society of Automation. https://www.isa.org
Kpae, G. (2020). Cyber threat to critical infrastructure and defending national security in Nigeria. International Journal of Economics, Business and Management Studies, 7(2), 214–223.
Lee, R. M., Assante, M. J., & Conway, T. (2019). Industrial Control System Cybersecurity Risk Assessment Frameworks. SANS Institute
NIST. (2018). Framework for Improving Critical Infrastructure Cybersecurity, Version 1.1. National Institute of Standards and Technology. https://nvlpubs.nist.gov
Utaka, I., Adejumo, T., & Obiorah, E. (2025). Case study: Ransomware attack on the Nigerian National Petroleum Corporation (NNPC). Nigerian Journal of Cybersecurity Research, 4(1), 55– 63.
Zetter, K. (2016). Inside the cunning, unprecedented hack of Ukraine’s power grid. Wired sMagazine. https://www.wired.com
Park, J., Kim, S., & Baek, J. (2021). Resilient smart grid design and implementation in South Korea. IEEE Transactions on Smart Grid, 12(4), 2957–2968.
SANS Institute. (2016). The Industrial Control System Cyber Kill Chain. https://www.sans.org
Stouffer, K., Pillitteri, V., Lightman, S., Abrams, M., & Hahn, A. (2015). Guide to Industrial Control Systems (ICS) Security: NIST SP 800-82 Revision 2. National Institute of Standards and Technology. https://doi.org/10.6028/NIST.SP.800-82r2
Trend Micro. (2019). New Critical Infrastructure Facility Hit by Group Behind TRITON. https://www.trendmicro.com True Home Protection. (2024). Leveraging AI and machine learning for advanced intrusion detection in commercial security systems. https://www.truehomeprotection.com
Utaka, I., Adejumo, T., & Obiorah, E. (2025). Case study: Ransomware attack on the Nigerian National Petroleum Corporation (NNPC). Nigerian Journal of Cybersecurity Research, 4(1), 55– 63.
Zetter, K. (2016). Inside the cunning, unprecedented hack of Ukraine’s power grid. Wired sMagazine. https://www.wired.com
Additional Files
Published
Issue
Section
License
Copyright (c) 2025 Academic World-Journal of Scientific and Engineering Innovation

This work is licensed under a Creative Commons Attribution 4.0 International License.
All articles in this journal are published under the Creative Commons Attribution 4.0 International License (CC BY 4.0). This permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.