期刊文献+
共找到122篇文章
< 1 2 7 >
每页显示 20 50 100
A Review on Security and Privacy Issues Pertaining to Cyber-Physical Systems in the Industry 5.0 Era
1
作者 Abdullah Alabdulatif Navod Neranjan Thilakarathne Zaharaddeen Karami Lawal 《Computers, Materials & Continua》 SCIE EI 2024年第9期3917-3943,共27页
The advent of Industry 5.0 marks a transformative era where Cyber-Physical Systems(CPSs)seamlessly integrate physical processes with advanced digital technologies.However,as industries become increasingly interconnect... The advent of Industry 5.0 marks a transformative era where Cyber-Physical Systems(CPSs)seamlessly integrate physical processes with advanced digital technologies.However,as industries become increasingly interconnected and reliant on smart digital technologies,the intersection of physical and cyber domains introduces novel security considerations,endangering the entire industrial ecosystem.The transition towards a more cooperative setting,including humans and machines in Industry 5.0,together with the growing intricacy and interconnection of CPSs,presents distinct and diverse security and privacy challenges.In this regard,this study provides a comprehensive review of security and privacy concerns pertaining to CPSs in the context of Industry 5.0.The review commences by providing an outline of the role of CPSs in Industry 5.0 and then proceeds to conduct a thorough review of the different security risks associated with CPSs in the context of Industry 5.0.Afterward,the study also presents the privacy implications inherent in these systems,particularly in light of the massive data collection and processing required.In addition,the paper delineates potential avenues for future research and provides countermeasures to surmount these challenges.Overall,the study underscores the imperative of adopting comprehensive security and privacy strategies within the context of Industry 5.0. 展开更多
关键词 cyber-physical systems CPS Industry 5.0 security data privacy human-machine collaboration data protection
在线阅读 下载PDF
On Zero Dynamics and Controllable Cyber-Attacks in Cyber-Physical Systems and Dynamic Coding Schemes as Their Countermeasures
2
作者 Mahdi Taheri Khashayar Khorasani Nader Meskin 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2024年第11期2191-2203,共13页
In this paper, we study stealthy cyber-attacks on actuators of cyber-physical systems(CPS), namely zero dynamics and controllable attacks. In particular, under certain assumptions, we investigate and propose condition... In this paper, we study stealthy cyber-attacks on actuators of cyber-physical systems(CPS), namely zero dynamics and controllable attacks. In particular, under certain assumptions, we investigate and propose conditions under which one can execute zero dynamics and controllable attacks in the CPS. The above conditions are derived based on the Markov parameters of the CPS and elements of the system observability matrix. Consequently, in addition to outlining the number of required actuators to be attacked, these conditions provide one with the minimum system knowledge needed to perform zero dynamics and controllable cyber-attacks. As a countermeasure against the above stealthy cyber-attacks, we develop a dynamic coding scheme that increases the minimum number of the CPS required actuators to carry out zero dynamics and controllable cyber-attacks to its maximum possible value. It is shown that if at least one secure input channel exists, the proposed dynamic coding scheme can prevent adversaries from executing the zero dynamics and controllable attacks even if they have complete knowledge of the coding system. Finally, two illustrative numerical case studies are provided to demonstrate the effectiveness and capabilities of our derived conditions and proposed methodologies. 展开更多
关键词 Controllable attacks cyber-physical systems(CPS) dynamic coding zero dynamics attacks stealthy cyber-attacks
在线阅读 下载PDF
Weighted Voting Ensemble Model Integrated with IoT for Detecting Security Threats in Satellite Systems and Aerial Vehicles
3
作者 Raed Alharthi 《Journal of Computer and Communications》 2025年第2期250-281,共32页
Small-drone technology has opened a range of new applications for aerial transportation. These drones leverage the Internet of Things (IoT) to offer cross-location services for navigation. However, they are susceptibl... Small-drone technology has opened a range of new applications for aerial transportation. These drones leverage the Internet of Things (IoT) to offer cross-location services for navigation. However, they are susceptible to security and privacy threats due to hardware and architectural issues. Although small drones hold promise for expansion in both civil and defense sectors, they have safety, security, and privacy threats. Addressing these challenges is crucial to maintaining the security and uninterrupted operations of these drones. In this regard, this study investigates security, and preservation concerning both the drones and Internet of Drones (IoD), emphasizing the significance of creating drone networks that are secure and can robustly withstand interceptions and intrusions. The proposed framework incorporates a weighted voting ensemble model comprising three convolutional neural network (CNN) models to enhance intrusion detection within the network. The employed CNNs are customized 1D models optimized to obtain better performance. The output from these CNNs is voted using a weighted criterion using a 0.4, 0.3, and 0.3 ratio for three CNNs, respectively. Experiments involve using multiple benchmark datasets, achieving an impressive accuracy of up to 99.89% on drone data. The proposed model shows promising results concerning precision, recall, and F1 as indicated by their obtained values of 99.92%, 99.98%, and 99.97%, respectively. Furthermore, cross-validation and performance comparison with existing works is also carried out. Findings indicate that the proposed approach offers a prospective solution for detecting security threats for aerial systems and satellite systems with high accuracy. 展开更多
关键词 Intrusion Detection cyber-physical systems Drone Security Weighted Ensemble Voting Unmanned Vehicles Security Strategies
在线阅读 下载PDF
Analysis and Modeling of Mobile Phone Activity Data Using Interactive Cyber-Physical Social System
4
作者 Farhan Amin Gyu Sang Choi 《Computers, Materials & Continua》 SCIE EI 2024年第9期3507-3521,共15页
Mobile networks possess significant information and thus are considered a gold mine for the researcher’s community.The call detail records(CDR)of a mobile network are used to identify the network’s efficacy and the ... Mobile networks possess significant information and thus are considered a gold mine for the researcher’s community.The call detail records(CDR)of a mobile network are used to identify the network’s efficacy and the mobile user’s behavior.It is evident from the recent literature that cyber-physical systems(CPS)were used in the analytics and modeling of telecom data.In addition,CPS is used to provide valuable services in smart cities.In general,a typical telecom company hasmillions of subscribers and thus generatesmassive amounts of data.From this aspect,data storage,analysis,and processing are the key concerns.To solve these issues,herein we propose a multilevel cyber-physical social system(CPSS)for the analysis and modeling of large internet data.Our proposed multilevel system has three levels and each level has a specific functionality.Initially,raw Call Detail Data(CDR)was collected at the first level.Herein,the data preprocessing,cleaning,and error removal operations were performed.In the second level,data processing,cleaning,reduction,integration,processing,and storage were performed.Herein,suggested internet activity record measures were applied.Our proposed system initially constructs a graph and then performs network analysis.Thus proposed CPSS system accurately identifies different areas of internet peak usage in a city(Milan city).Our research is helpful for the network operators to plan effective network configuration,management,and optimization of resources. 展开更多
关键词 cyber-physical social systems big data cyber-physical systems pervasive computing smart city big data management techniques
在线阅读 下载PDF
Cyber-Physical Production Systems for Data-Driven,Decentralized,and Secure Manufacturing-A Perspective 被引量:6
5
作者 Manu Suvarna Ken Shaun Yap +3 位作者 Wentao Yang Jun Li Yen Ting Ng Xiaonan Wang 《Engineering》 SCIE EI 2021年第9期1212-1223,共12页
With the concepts of Industry 4.0 and smart manufacturing gaining popularity,there is a growing notion that conventional manufacturing will witness a transition toward a new paradigm,targeting innovation,automation,be... With the concepts of Industry 4.0 and smart manufacturing gaining popularity,there is a growing notion that conventional manufacturing will witness a transition toward a new paradigm,targeting innovation,automation,better response to customer needs,and intelligent systems.Within this context,this review focuses on the concept of cyber–physical production system(CPPS)and presents a holistic perspective on the role of the CPPS in three key and essential drivers of this transformation:data-driven manufacturing,decentralized manufacturing,and integrated blockchains for data security.The paper aims to connect these three aspects of smart manufacturing and proposes that through the application of data-driven modeling,CPPS will aid in transforming manufacturing to become more intuitive and automated.In turn,automated manufacturing will pave the way for the decentralization of manufacturing.Layering blockchain technologies on top of CPPS will ensure the reliability and security of data sharing and integration across decentralized systems.Each of these claims is supported by relevant case studies recently published in the literature and from the industry;a brief on existing challenges and the way forward is also provided. 展开更多
关键词 Smart manufacturing cyber-physical production systems Industrial Internet of Things Data analytics Decentralized system Blockchain
在线阅读 下载PDF
Simulation of Cyber-Physical Systems of Systems: Some Research Areas-Computational Understanding, Awareness, and Wisdom 被引量:2
6
作者 Tuncer Oren 《系统仿真学报》 CAS CSCD 北大核心 2018年第2期363-385,共23页
After a brief emphasis about the interconnected world, including Cyber-Physical Systems of Systems, the increasing importance of the decision-making by autonomous, quasi-autonomous, and autonomic systems is emphasised... After a brief emphasis about the interconnected world, including Cyber-Physical Systems of Systems, the increasing importance of the decision-making by autonomous, quasi-autonomous, and autonomic systems is emphasised. Promising roles of computational understanding, computational awareness, and computational wisdom for better autonomous decision-making are outlined. The contributions of simulation-based approaches are listed. 展开更多
关键词 cyber-physical systems of systems decision-making by autonomous andautonomic systems COMPUTATIONAL UNDERSTANDING COMPUTATIONAL AWARENESS COMPUTATIONAL WISDOM simulation-based knowledge processing
在线阅读 下载PDF
Analysis of cascading failures of power cyber-physical systems considering false data injection attacks 被引量:5
7
作者 Jian Li Chaowei Sun Qingyu Su 《Global Energy Interconnection》 CAS CSCD 2021年第2期204-213,共10页
This study considers the performance impacts of false data injection attacks on the cascading failures of a power cyber-physical system,and identifies vulnerable nodes.First,considering the monitoring and control func... This study considers the performance impacts of false data injection attacks on the cascading failures of a power cyber-physical system,and identifies vulnerable nodes.First,considering the monitoring and control functions of a cyber network and power flow characteristics of a power network,a power cyber-physical system model is established.Then,the influences of a false data attack on the decision-making and control processes of the cyber network communication processes are studied,and a cascading failure analysis process is proposed for the cyber-attack environment.In addition,a vulnerability evaluation index is defined from two perspectives,i.e.,the topology integrity and power network operation characteristics.Moreover,the effectiveness of a power flow betweenness assessment for vulnerable nodes in the cyberphysical environment is verified based on comparing the node power flow betweenness and vulnerability assessment index.Finally,an IEEE14-bus power network is selected for constructing a power cyber-physical system.Simulations show that both the uplink communication channel and downlink communication channel suffer from false data attacks,which affect the ability of the cyber network to suppress the propagation of cascading failures,and expand the scale of the cascading failures.The vulnerability evaluation index is calculated for each node,so as to verify the effectiveness of identifying vulnerable nodes based on the power flow betweenness. 展开更多
关键词 Power cyber-physical systems False date injection attack Cascading failure VULNERABILITY Power flow betweenness.
在线阅读 下载PDF
Passivity-Based Robust Control Against Quantified False Data Injection Attacks in Cyber-Physical Systems 被引量:3
8
作者 Yue Zhao Ze Chen +2 位作者 Chunjie Zhou Yu-Chu Tian Yuanqing Qin 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2021年第8期1440-1450,共11页
Secure control against cyber attacks becomes increasingly significant in cyber-physical systems(CPSs).False data injection attacks are a class of cyber attacks that aim to compromise CPS functions by injecting false d... Secure control against cyber attacks becomes increasingly significant in cyber-physical systems(CPSs).False data injection attacks are a class of cyber attacks that aim to compromise CPS functions by injecting false data such as sensor measurements and control signals.For quantified false data injection attacks,this paper establishes an effective defense framework from the energy conversion perspective.Then,we design an energy controller to dynamically adjust the system energy changes caused by unknown attacks.The designed energy controller stabilizes the attacked CPSs and ensures the dynamic performance of the system by adjusting the amount of damping injection.Moreover,with the disturbance attenuation technique,the burden of control system design is simplified because there is no need to design an attack observer.In addition,this secure control method is simple to implement because it avoids complicated mathematical operations.The effectiveness of our control method is demonstrated through an industrial CPS that controls a permanent magnet synchronous motor. 展开更多
关键词 cyber-physical systems energy controller energy conversion false data injection attacks L2 disturbance attenuation technology
在线阅读 下载PDF
Learning-Based Switched Reliable Control of Cyber-Physical Systems With Intermittent Communication Faults 被引量:1
9
作者 Xin Huang Jiuxiang Dong 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2020年第3期711-724,共14页
This study deals with reliable control problems in data-driven cyber-physical systems(CPSs) with intermittent communication faults, where the faults may be caused by bad or broken communication devices and/or cyber at... This study deals with reliable control problems in data-driven cyber-physical systems(CPSs) with intermittent communication faults, where the faults may be caused by bad or broken communication devices and/or cyber attackers. To solve them, a watermark-based anomaly detector is proposed, where the faults are divided to be either detectable or undetectable.Secondly, the fault's intermittent characteristic is described by the average dwell-time(ADT)-like concept, and then the reliable control issues, under the undetectable faults to the detector, are converted into stabilization issues of switched systems. Furthermore,based on the identifier-critic-structure learning algorithm, a datadriven switched controller with a prescribed-performance-based switching law is proposed, and by the ADT approach, a tolerated fault set is given. Additionally, it is shown that the presented switching laws can improve the system performance degradation in asynchronous intervals, where the degradation is caused by the fault-maker-triggered switching rule, which is unknown for CPS operators. Finally, an illustrative example validates the proposed method. 展开更多
关键词 Adaptive dynamic programming(ADP) communication fault cyber-physical systems(cpss) DATA-DRIVEN CONTROL RELIABLE CONTROL
在线阅读 下载PDF
Decentralized Resilient H_∞Load Frequency Control for Cyber-Physical Power Systems Under DoS Attacks 被引量:3
10
作者 Xin Zhao Suli Zou Zhongjing Ma 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2021年第11期1737-1751,共15页
This paper designs a decentralized resilient H_(∞)load frequency control(LFC)scheme for multi-area cyber-physical power systems(CPPSs).Under the network-based control framework,the sampled measurements are transmitte... This paper designs a decentralized resilient H_(∞)load frequency control(LFC)scheme for multi-area cyber-physical power systems(CPPSs).Under the network-based control framework,the sampled measurements are transmitted through the communication networks,which may be attacked by energylimited denial-of-service(DoS)attacks with a characterization of the maximum count of continuous data losses(resilience index).Each area is controlled in a decentralized mode,and the impacts on one area from other areas via their interconnections are regarded as the additional load disturbance of this area.Then,the closed-loop LFC system of each area under DoS attacks is modeled as an aperiodic sampled-data control system with external disturbances.Under this modeling,a decentralized resilient H_(∞)scheme is presented to design the state-feedback controllers with guaranteed H∞performance and resilience index based on a novel transmission interval-dependent loop functional method.When given the controllers,the proposed scheme can obtain a less conservative H_(∞)performance and resilience index that the LFC system can tolerate.The effectiveness of the proposed LFC scheme is evaluated on a one-area CPPS and two three-area CPPSs under DoS attacks. 展开更多
关键词 cyber-physical power systems(CPPSs) denial-of-service(DoS)attacks load frequency control(LFC) sampled-data control
在线阅读 下载PDF
A Security Enhancement Model Based on Switching Edge Strategy in Interdependent Heterogeneous Cyber-Physical Systems 被引量:1
11
作者 Dandan Zhao Can Liu +4 位作者 Guangquan Xu Zhiguo Ding Hao Peng Juan Yu Jianmin Han 《China Communications》 SCIE CSCD 2022年第2期158-173,共16页
With the advent of cross-domain interconnection,large-scale sensor network systems such as smart grids,smart homes,and intelligent transportation have emerged.These complex network systems often have a CPS(Cyber-Physi... With the advent of cross-domain interconnection,large-scale sensor network systems such as smart grids,smart homes,and intelligent transportation have emerged.These complex network systems often have a CPS(Cyber-Physical System)architecture and are usually composed of multiple interdependent systems.Minimal faults between interdependent networks may cause serious cascading failures between the entire system.Therefore,in this paper,we will explore the robustness detection schemes for interdependent networks.Firstly,by calculating the largest giant connected component in the entire system,the security of interdependent network systems under different attack models is analyzed.Secondly,a comparative analysis of the cascade failure mechanism between interdependent networks under the edge enhancement strategy is carried out.Finally,the simulation results verify the impact of system reliability under different handover edge strategies and show how to choose a better handover strategy to enhance its robustness.The further research work in this paper can also help design how to reduce the interdependence between systems,thereby further optimizing the interdependent network system’s structure to provide practical support for reducing the cascading failures.In the later work,we hope to explore our proposed strategies in the network model of real-world or close to real networks. 展开更多
关键词 security enhancement switching edge strategy interdependent systems cyber-physical systems
在线阅读 下载PDF
Security and Privacy Challenges in Cyber-Physical Systems 被引量:1
12
作者 Fahd AlDosari 《Journal of Information Security》 2017年第4期285-295,共11页
Cyber-Physical Systems, or Smart-Embedded Systems, are co-engineered for the integration of physical, computational and networking resources. These resources are used to develop an efficient base for enhancing the qua... Cyber-Physical Systems, or Smart-Embedded Systems, are co-engineered for the integration of physical, computational and networking resources. These resources are used to develop an efficient base for enhancing the quality of services in all areas of life and achieving a classier lifestyle in terms of a required service’s functionality and timing. Cyber-Physical Systems (CPSs) complement the need to have smart products (e.g., homes, hospitals, airports, cities). In other words, regulate the three kinds of resources available: physical, computational, and networking. This regulation supports communication and interaction between the human word and digital word to find the required intelligence in all scopes of life, including Telecommunication, Power Generation and Distribution, and Manufacturing. Data Security is among the most important issues to be considered in recent technologies. Because Cyber-Physical Systems consist of interacting complex components and middle-ware, they face real challenges in being secure against cyber-attacks while functioning efficiently and without affecting or degrading their performance. This study gives a detailed description of CPSs, their challenges (including cyber-security attacks), characteristics, and related technologies. We also focus on the tradeoff between security and performance in CPS, and we present the most common Side Channel Attacks on the implementations of cryptographic algorithms (symmetric: AES and asymmetric: RSA) with the countermeasures against these attacks. 展开更多
关键词 SECURITY cyber-physical systems SIDE CHANNEL ATTACKS
在线阅读 下载PDF
Cyber-Physical Systems as General Distributed Parameter Systems:Three Types of Fractional Order Models and Emerging Research Opportunities 被引量:2
13
作者 Fudong Ge YangQuan Chen Chunhai Kou 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI 2015年第4期353-357,共5页
Cyber-physical systems (CPSs) are man-made complex systems coupled with natural processes that, as a whole, should be described by distributed parameter systems (DPSs) in general forms. This paper presents three such ... Cyber-physical systems (CPSs) are man-made complex systems coupled with natural processes that, as a whole, should be described by distributed parameter systems (DPSs) in general forms. This paper presents three such general models for generalized DPSs that can be used to characterize complex CPSs. These three different types of fractional operators based DPS models are: fractional Laplacian operator, fractional power of operator or fractional derivative. This research investigation is motivated by many fractional order models describing natural, physical, and anomalous phenomena, such as sub-diffusion process or super-diffusion process. The relationships among these three different operators are explored and explained. Several potential future research opportunities are then articulated followed by some conclusions and remarks. © 2014 Chinese Association of Automation. 展开更多
关键词 Laplace equation Laplace transforms Mathematical operators
在线阅读 下载PDF
A Triple Human-Digital Twin Architecture for Cyber-Physical Systems
14
作者 Duansen Shangguan Liping Chen +2 位作者 Chang Su Jianwan Ding Chan Liu 《Computer Modeling in Engineering & Sciences》 SCIE EI 2022年第6期1557-1578,共22页
With the development of information and communication technology and the advent of the Internet of Things(IoT)era,cyber-physical system(CPS)is becoming the trend of products or systems.The deep integration and real-ti... With the development of information and communication technology and the advent of the Internet of Things(IoT)era,cyber-physical system(CPS)is becoming the trend of products or systems.The deep integration and real-time interaction between the physical world and the virtual world expand system functions.Although there are some CPS implementation guidelines,the virtual world is still relatively abstract compared to the concrete physical world that can be touched through the IoT.Besides that,human is a non-negligible CPS endogenous interactive intelligent component.In this paper,we propose a triple human-digital twin architecture,where the physical objects and the digital twins that are the projections of the physical entities establish the cornerstone of human functioning together.And the hierarchically distributed digital twins grow dynamically with the physical entities along the lifecycle.Furthermore,the interaction and collaboration among the physical objects,the digital twins,and the humans in their respective worlds(the expected world,the interpreted world,and the physical world)integrate the full value chain of the products in anticipation of seamless synergy.Finally,we present a power management digital companion platform for the lunar probe to demonstrate the efficacy of the architecture. 展开更多
关键词 cyber-physical systems digital twin human factors systems architecture COLLABORATION
在线阅读 下载PDF
Topology-Based and Event-Oriented Approach to Simulation of Cyber-Physical Systems
15
作者 ZHENG Jun-xi ZHANG Ping +2 位作者 JIN Pei-gen LI Fang DU Guang-long 《Journal of Donghua University(English Edition)》 EI CAS 2016年第6期991-996,共6页
A simulation model for cyber-physical systems(CPSs)was presented.The model was developed by the method of combination of topology-based and event-oriented that could be used to simulate systems with routing flexibilit... A simulation model for cyber-physical systems(CPSs)was presented.The model was developed by the method of combination of topology-based and event-oriented that could be used to simulate systems with routing flexibility,service-selection flexibility and service- mode flexibility overall by integrating the strategies related.The validity of the model has been verified by two extensive experiments. 展开更多
关键词 topological-based event-oriented cyber-physical systems discrete event systems simulation model
在线阅读 下载PDF
vip Editorial for Special Issue on Cyber-Physical Systems
16
作者 Youxian Sun Xinping Guan +1 位作者 Jiming Chen Yilin Mo 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI 2015年第3期233-234,共2页
Ⅰ.Introduction CYBER-PHYSICAL system is a system of collaborating computational elements to control physical entities.The coordination and the tight link between computational,virtual and physical resources in cyber-... Ⅰ.Introduction CYBER-PHYSICAL system is a system of collaborating computational elements to control physical entities.The coordination and the tight link between computational,virtual and physical resources in cyber-physical system will have a pervasive effect on our everyday life.The development of cyber-physical system will create new opportunities for the introduction of services that will enhance the quality of life 展开更多
关键词 for WSAN vip Editorial for Special Issue on cyber-physical systems of into on WSN IS
在线阅读 下载PDF
Distributed dynamic event-based finite-time dissipative synchronization control for semi-Markov switched fuzzy cyber-physical systems against random packet losses
17
作者 伍锡如 张煜翀 +1 位作者 张畑畑 张斌磊 《Chinese Physics B》 SCIE EI CAS CSCD 2023年第10期328-342,共15页
This paper is concerned with the finite-time dissipative synchronization control problem of semi-Markov switched cyber-physical systems in the presence of packet losses, which is constructed by the Takagi–Sugeno fuzz... This paper is concerned with the finite-time dissipative synchronization control problem of semi-Markov switched cyber-physical systems in the presence of packet losses, which is constructed by the Takagi–Sugeno fuzzy model. To save the network communication burden, a distributed dynamic event-triggered mechanism is developed to restrain the information update. Besides, random packet dropouts following the Bernoulli distribution are assumed to occur in sensor to controller channels, where the triggered control input is analyzed via an equivalent method containing a new stochastic variable. By establishing the mode-dependent Lyapunov–Krasovskii functional with augmented terms, the finite-time boundness of the error system limited to strict dissipativity is studied. As a result of the help of an extended reciprocally convex matrix inequality technique, less conservative criteria in terms of linear matrix inequalities are deduced to calculate the desired control gains. Finally, two examples in regard to practical systems are provided to display the effectiveness of the proposed theory. 展开更多
关键词 cyber-physical systems finite-time synchronization distributed dynamic event-triggered mechanism random packet losses
在线阅读 下载PDF
Stochastic Models to Mitigate Sparse Sensor Attacks in Continuous-Time Non-Linear Cyber-Physical Systems
18
作者 Borja Bordel Sánchez Ramón Alcarria Tomás Robles 《Computers, Materials & Continua》 SCIE EI 2023年第9期3189-3218,共30页
Cyber-Physical Systems are very vulnerable to sparse sensor attacks.But current protection mechanisms employ linear and deterministic models which cannot detect attacks precisely.Therefore,in this paper,we propose a n... Cyber-Physical Systems are very vulnerable to sparse sensor attacks.But current protection mechanisms employ linear and deterministic models which cannot detect attacks precisely.Therefore,in this paper,we propose a new non-linear generalized model to describe Cyber-Physical Systems.This model includes unknown multivariable discrete and continuous-time functions and different multiplicative noises to represent the evolution of physical processes and randomeffects in the physical and computationalworlds.Besides,the digitalization stage in hardware devices is represented too.Attackers and most critical sparse sensor attacks are described through a stochastic process.The reconstruction and protectionmechanisms are based on aweighted stochasticmodel.Error probability in data samples is estimated through different indicators commonly employed in non-linear dynamics(such as the Fourier transform,first-return maps,or the probability density function).A decision algorithm calculates the final reconstructed value considering the previous error probability.An experimental validation based on simulation tools and real deployments is also carried out.Both,the new technology performance and scalability are studied.Results prove that the proposed solution protects Cyber-Physical Systems against up to 92%of attacks and perturbations,with a computational delay below 2.5 s.The proposed model shows a linear complexity,as recursive or iterative structures are not employed,just algebraic and probabilistic functions.In conclusion,the new model and reconstructionmechanism can protect successfully Cyber-Physical Systems against sparse sensor attacks,even in dense or pervasive deployments and scenarios. 展开更多
关键词 cyber-physical systems sparse sensor attack non-linear models stochastic models security
在线阅读 下载PDF
Aquila Optimization with Machine Learning-Based Anomaly Detection Technique in Cyber-Physical Systems
19
作者 A.Ramachandran K.Gayathri +1 位作者 Ahmed Alkhayyat Rami Q.Malik 《Computer Systems Science & Engineering》 SCIE EI 2023年第8期2177-2194,共18页
Cyber-physical system(CPS)is a concept that integrates every computer-driven system interacting closely with its physical environment.Internet-of-things(IoT)is a union of devices and technologies that provide universa... Cyber-physical system(CPS)is a concept that integrates every computer-driven system interacting closely with its physical environment.Internet-of-things(IoT)is a union of devices and technologies that provide universal interconnection mechanisms between the physical and digital worlds.Since the complexity level of the CPS increases,an adversary attack becomes possible in several ways.Assuring security is a vital aspect of the CPS environment.Due to the massive surge in the data size,the design of anomaly detection techniques becomes a challenging issue,and domain-specific knowledge can be applied to resolve it.This article develops an Aquila Optimizer with Parameter Tuned Machine Learning Based Anomaly Detection(AOPTML-AD)technique in the CPS environment.The presented AOPTML-AD model intends to recognize and detect abnormal behaviour in the CPS environment.The presented AOPTML-AD framework initially pre-processes the network data by converting them into a compatible format.Besides,the improved Aquila optimization algorithm-based feature selection(IAOA-FS)algorithm is designed to choose an optimal feature subset.Along with that,the chimp optimization algorithm(ChOA)with an adaptive neuro-fuzzy inference system(ANFIS)model can be employed to recognise anomalies in the CPS environment.The ChOA is applied for optimal adjusting of the membership function(MF)indulged in the ANFIS method.The performance validation of the AOPTML-AD algorithm is carried out using the benchmark dataset.The extensive comparative study reported the better performance of the AOPTML-AD technique compared to recent models,with an accuracy of 99.37%. 展开更多
关键词 Machine learning industry 4.0 cyber-physical systems anomaly detection aquila optimizer
在线阅读 下载PDF
From Mechatronic Components to Industrial Automation Things: An IoT Model for Cyber-Physical Manufacturing Systems
20
作者 Theodoros Foradis Kleanthis Thramboulidis 《Journal of Software Engineering and Applications》 2017年第8期734-753,共20页
IoT is considered as one of the key enabling technologies for the fourth industrial revolution that is known as Industry 4.0. In this paper, we consider the mechatronic component as the lowest level in the system comp... IoT is considered as one of the key enabling technologies for the fourth industrial revolution that is known as Industry 4.0. In this paper, we consider the mechatronic component as the lowest level in the system composition hierarchy that tightly integrates mechanics with the electronics and software required to convert the mechanics to intelligent (smart) object offering well defined services to its environment. For this mechatronic component to be integrated in the IoT-based industrial automation environment, a software layer is required on top of it to convert its conventional interface to an IoT compliant one. This layer, which we call IoT wrapper, transforms the conventional mechatronic component to an Industrial Automation Thing (IAT). The IAT is the key element of an IoT model specifically developed in the context of this work for the manufacturing domain. The model is compared to existing IoT models and its main differences are discussed. A model-to-model transformer is presented to automatically transform the legacy mechatronic component to an IAT ready to be integrated in the IoT-based industrial automation environment. The UML4IoT profile is used in the form of a Domain Specific Modelling Language to automate this transformation. A prototype implementation of an Industrial Automation Thing using C and the Contiki operating system demonstrates the effectiveness of the proposed approach. 展开更多
关键词 MECHATRONICS cyber-physical systems Internet of THINGS (IoT) Contiki UML4IoT PROFILE
在线阅读 下载PDF
上一页 1 2 7 下一页 到第
使用帮助 返回顶部