Solving Security of Cyber-Physical Systems with Multi-Objective Optimization Algorithms
Keywords:Cyber-Physical System, Security, Multi-Objective Optimization
AbstractCyber-physical systems (CPS), as a significant set of the Internet of Things (IoT), play a key role in our life. CPS has a wide range of applications. Regardless of the benefits of CPS, they need a secure approach to communication. In this paper, an approach to CPS security is proposed. Usability of the proposed approach is the major characteristic of it because it employs a multi-objective model (MOM) of security. In this study, three algorithms were used to solve MOM (Multi-Objective Imperialist Competitive Algorithm, Multi-Objective Automata, Multi-Objective Bee Colony), because the evolutionary structure of the proposed algorithms causes the best adaptation on the network.
. Derui Ding, Qing-Long Han, Yang Xiang, Xiaohua Ge, Xian-Ming Zhang, â€œA survey on security control and attack detection for industrial cyber-physical systemsâ€, ELSEVIER, Neurocomputing 275 (2018) 1674â€“1683
. Zheng Xu, Yunhuai Liu, Hui Zhang, â€œSpecial section on intelligent sensing and applications for cyber-physical systemsâ€, ELSEVIER, Future Generation Computer Systems 81 (2018) 382â€“383
. Nikolay Akatyev, Joshua I. James, â€œEvidence identification in IoT networks based on threat assessmentâ€, ELSEVIER, Future Generation Computer Systems
. Bahar Farahani, Farshad Firouzi, Victor Chang, Mustafa Badaroglu, Nicholas Constant, Kunal Mankodiya, â€œTowards fog-driven IoT eHealth: Promises and challenges of IoT in medicine and healthcareâ€, ELSEVIER, Future Generation Computer Systems 78 (2018) 659â€“676
. Minhaj Ahmad Khan, Khaled Salah, â€œIoT security: Review, blockchain solutions, and open challengesâ€, ELSEVIER, Future Generation Computer Systems 82 (2018) 395â€“411
. Diego A.Cerdeir, MarcinDziubiÂ´nski, Sanjeev Goyal, â€œIndividual security, contagion, and network designâ€, ELSEVIER, Journal of Economic Theory 170 (2017) 182â€“226
. Hao Wu, Zhonghua Wang, â€œMulti-source fusion-based security detection method for heterogeneous networksâ€, ELSEVIER, computers & s e c u r i t y 74 ( 2 0 1 8 ) 55â€“70
. Yuan Gao, Hong Ao, Zenghui Feng, Weigui Zhou, Su Hu, Wanbin Tang, â€œ Mobile Network Security and Privacy in WSNâ€, ELSEVIER, Procedia Computer Science 129 (2018) 324â€“330
. Alessio Misuri, Nima Khakzad , Genserik Reniers , Valerio Cozzani, â€œA Bayesian network methodology for optimal security management of critical infrastructuresâ€, ELSEVIER, Reliability Engineering and System Safety 000 (2018) 1â€“14
. Pedro C. Pinto, JoÃ£o Barros, Moe Z.Win, â€œSecure Communication in Stochastic Wireless Networksâ€”Part I: Connectivityâ€, IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 7, NO. 1, FEBRUARY 2012
. Huanhuan Yuan, Yuanqing Xia, â€œSecure filtering for stochastic non-linear systems under multiple missing measurements and deception attacksâ€, IET Control Theory Appl., 2018, Vol. 12 Iss. 4, pp. 515-523
Carlos A. Coello Coello, David A. Van Veldhuizen, Gary B. Lamont, â€œEvolutionary Algorithms for Solving Multi-Objective Problemsâ€, Speringer. 2nd Ed. , 2007.
Cristopher Dimopoulos, â€œA Review of Evolutionary Multi-objective Optimization, Application in the Area of Production Researchâ€, IEEE. Print ISBN 0-7803-8515-2, DOI 10.1109/CEC.2004.1331072. , 2004.
Carlos A. Coello Coello, â€œAn Updated Survey of Evolutionary Multi-Objective Techniques: State of the art and Future Trendsâ€, IEEE. Vol.1, Printed ISBN 0-7803-5536-9, DOI 10.1109/CEC.1999.781901. , 1999.
Zdzislaw Kowalczuk, Tomasz Bialaszewski, â€œImproving Evolutionary Multi-Objective Optimization Using Gendersâ€, Springer. Vol. 4029/2006, DOI 10.1007/1178231-42. , 2006.
Arash Khabbazi, Esmaeil Atashpaz, Caro Lucas, â€œImperialist Competitive Algorithm for Minimum Bit Error Rate Beamformingâ€, Inte.J. Bio-Inspired Computation, Vol. 1, Nos.1/2. , 2009.
Esmaeil Atashpaz, Caro Lucas, â€œImperialist Competitive Algorithm: An Algorithm for Optimization Inspired by Imperialistic Competitionâ€, IEEE. Congress on Evolutionary Computation. , 2008 .
Caro Lucas, Zahra Nasiri-Gheidari, Farid Tootoonchian, â€œApplication of an Imperialist Competitive Algorithm to the Design of a Linear Induction Motorâ€, ELSEVIER. Energy Conversion and Management. 1407â€“1411, 2010.
How to Cite
- Papers must be submitted on the understanding that they have not been published elsewhere (except in the form of an abstract or as part of a published lecture, review, or thesis) and are not currently under consideration by another journal published by any other publisher.
- It is also the authors responsibility to ensure that the articles emanating from a particular source are submitted with the necessary approval.
- The authors warrant that the paper is original and that he/she is the author of the paper, except for material that is clearly identified as to its original source, with permission notices from the copyright owners where required.
- The authors ensure that all the references carefully and they are accurate in the text as well as in the list of references (and vice versa).
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Attribution-NonCommercial 4.0 International that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).
- The journal/publisher is not responsible for subsequent uses of the work. It is the author's responsibility to bring an infringement action if so desired by the author.