Providing Security in CPSs with Evolutionary Algorithms
Keywords:Cyber-Physical Systems, Multi-Objective Optimization, Evolutionary Algorithm
AbstractBecause of the significant role of Cyber-Physical Systems (CPSs) in our lives, the security of these systems is of paramount importance. Due to the complexity of inside CPSs components, current methods need special skills to understand their workflow. The approach available in this regard, more than comfortability, have the ability to adapt to the network conditions. In this research, we present the secure routing problem of CPSs as a multi-objective optimization model and then solve it through three Evolutionary Algorithms (EAs). The main reason four using EA is that it allows satisfying the time constraints in the routing. Multi-objective optimization produces optimum values for objectives simultaneously.
Hamed Orojloo, Mohammad Abdollahi Azgomi, â€œA method for evaluating the consequence propagation of security attacks in cyberâ€“physical systemsâ€, ELSEVIER, Future Generation Computer Systems 67 (2017) 57â€“71
Derui Ding, Qing-Long Han, Yang Xiang, Xiaohua Ge, Xian-Ming Zhang, â€œ A survey on security control and attack detection for industrial cyber-physical systemsâ€, Neurocomputing 275 (2018) 1674â€“1683
Javier Lopez, Juan E. Rubio, â€œ Access control for cyber-physical systems interconnected to the cloudâ€, ELSEVIER, Computer Networks 134 (2018) 46â€“54
Alexandru Stefanov, Chen-Ching Liu, â€œCyber-Physical System Security and Impact Analysisâ€, Proceedings of the 19th World Congress The International Federation of Automatic Control Cape Town, South Africa. August 24-29, 2014
Jie Liu, Diangang Wang, Cheng Zhang, Zhenyu Tang, Zhuozhen Jiang, Junyong Liub, Yue Xiang, â€œReliability Assessment of Cyber Physical Distribution Systemâ€, ELSEVIER, Energy Procedia 142 (2017) 2021â€“2026
Arash Nourian, Stuart Madnick, â€œA Systems Theoretic Approach to the Security Threats in Cyber Physical Systems Applied to Stuxnetâ€, IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 15, NO. 1, JANUARY/FEBRUARY 2018
Jacob Wurm, Yier Jin, Yang Liu, Shiyan Hu, Kenneth Heffner, Fahim Rahman, Mark Tehranipoor, â€œIntroduction to Cyber-Physical System Security: A Cross-Layer Perspectiveâ€, IEEE TRANSACTIONS ON MULTI-SCALE COMPUTING SYSTEMS, VOL. 3, NO. 3, JULY-SEPTEMBER 2017
Shihanur Rahman, Apel Mahmud, Aman Maung Than Oo, Hemanshu Roy Pota, â€œMulti-Agent Approach for Enhancing Security of Protection Schemes in Cyber-Physical Energy Systemsâ€, IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. 13, NO. 2, APRIL 2017
Gerry Howser, Bruce McMillin, â€œUsing Information-Flow Methods to Analyze the Security of Cyber-Physical Systemsâ€, I E E E COMPUTE R SOC I E T Y APR IL 2017
Kim-Kwang Raymond Choo, Mehran Mozaffari Kermani, Reza Azarderakhsh, Manimaran Govindarasu, â€œEmerging Embedded and Cyber Physical System Security Challenges and Innovationsâ€ , IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 14, NO. 3, MAY/JUNE 2017
Jairo Giraldo, Esha Sarkar, Alvaro A. Cardenas, Michail Maniatakos and Murat Kantarcioglu, â€œSecurity and Privacy in Cyberâ€“Physical Systems: A Survey of Surveysâ€, IEEE, Cyberâ€“Physical Systems Security and Privacy, July/August 2017
Iman Shames , Farhad Farokhi, Tyler H. Summers, â€œSecurity analysis of cyber-physical systems using â„‹2 normâ€, IET Control Theory Appl., 2017, Vol. 11 Iss. 11, pp. 1749-1755
Jun Yang, Chunjie Zhou , Shuanghua Yang, Haizhou Xu , Bowen Hu, â€œAnomaly Detection Based on Zone Partition for Security Protection of Industrial Cyber-Physical Systemsâ€, IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, VOL. 65, NO. 5, MAY 2018
How to Cite
- Papers must be submitted on the understanding that they have not been published elsewhere (except in the form of an abstract or as part of a published lecture, review, or thesis) and are not currently under consideration by another journal published by any other publisher.
- It is also the authors responsibility to ensure that the articles emanating from a particular source are submitted with the necessary approval.
- The authors warrant that the paper is original and that he/she is the author of the paper, except for material that is clearly identified as to its original source, with permission notices from the copyright owners where required.
- The authors ensure that all the references carefully and they are accurate in the text as well as in the list of references (and vice versa).
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Attribution-NonCommercial 4.0 International that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).
- The journal/publisher is not responsible for subsequent uses of the work. It is the author's responsibility to bring an infringement action if so desired by the author.