Providing Security in CPSs with Evolutionary Algorithms

Seyed Mahmood Hashemi

Abstract


Because of the significant role of Cyber-Physical Systems (CPSs) in our lives, the security of these systems is of paramount importance. Due to the complexity of inside CPSs components, current methods need special skills to understand their workflow. The approach available in this regard, more than comfortability, have the ability to adapt to the network conditions. In this research, we present the secure routing problem of CPSs as a multi-objective optimization model and then solve it through three Evolutionary Algorithms (EAs). The main reason four using EA is that it allows satisfying the time constraints in the routing. Multi-objective optimization produces optimum values for objectives simultaneously.

Keywords


Cyber-Physical Systems, Multi-Objective Optimization, Evolutionary Algorithm

Full Text:

PDF

References


Hamed Orojloo, Mohammad Abdollahi Azgomi, “A method for evaluating the consequence propagation of security attacks in cyber–physical systems”, ELSEVIER, Future Generation Computer Systems 67 (2017) 57–71

Derui Ding, Qing-Long Han, Yang Xiang, Xiaohua Ge, Xian-Ming Zhang, “ A survey on security control and attack detection for industrial cyber-physical systems”, Neurocomputing 275 (2018) 1674–1683

Javier Lopez, Juan E. Rubio, “ Access control for cyber-physical systems interconnected to the cloud”, ELSEVIER, Computer Networks 134 (2018) 46–54

Alexandru Stefanov, Chen-Ching Liu, “Cyber-Physical System Security and Impact Analysis”, Proceedings of the 19th World Congress The International Federation of Automatic Control Cape Town, South Africa. August 24-29, 2014

Jie Liu, Diangang Wang, Cheng Zhang, Zhenyu Tang, Zhuozhen Jiang, Junyong Liub, Yue Xiang, “Reliability Assessment of Cyber Physical Distribution System”, ELSEVIER, Energy Procedia 142 (2017) 2021–2026

Arash Nourian, Stuart Madnick, “A Systems Theoretic Approach to the Security Threats in Cyber Physical Systems Applied to Stuxnet”, IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 15, NO. 1, JANUARY/FEBRUARY 2018

Jacob Wurm, Yier Jin, Yang Liu, Shiyan Hu, Kenneth Heffner, Fahim Rahman, Mark Tehranipoor, “Introduction to Cyber-Physical System Security: A Cross-Layer Perspective”, IEEE TRANSACTIONS ON MULTI-SCALE COMPUTING SYSTEMS, VOL. 3, NO. 3, JULY-SEPTEMBER 2017

Shihanur Rahman, Apel Mahmud, Aman Maung Than Oo, Hemanshu Roy Pota, “Multi-Agent Approach for Enhancing Security of Protection Schemes in Cyber-Physical Energy Systems”, IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. 13, NO. 2, APRIL 2017

Gerry Howser, Bruce McMillin, “Using Information-Flow Methods to Analyze the Security of Cyber-Physical Systems”, I E E E COMPUTE R SOC I E T Y APR IL 2017

Kim-Kwang Raymond Choo, Mehran Mozaffari Kermani, Reza Azarderakhsh, Manimaran Govindarasu, “Emerging Embedded and Cyber Physical System Security Challenges and Innovations” , IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 14, NO. 3, MAY/JUNE 2017

Jairo Giraldo, Esha Sarkar, Alvaro A. Cardenas, Michail Maniatakos and Murat Kantarcioglu, “Security and Privacy in Cyber–Physical Systems: A Survey of Surveys”, IEEE, Cyber–Physical Systems Security and Privacy, July/August 2017

Iman Shames , Farhad Farokhi, Tyler H. Summers, “Security analysis of cyber-physical systems using ℋ2 norm”, IET Control Theory Appl., 2017, Vol. 11 Iss. 11, pp. 1749-1755

Jun Yang, Chunjie Zhou , Shuanghua Yang, Haizhou Xu , Bowen Hu, “Anomaly Detection Based on Zone Partition for Security Protection of Industrial Cyber-Physical Systems”, IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, VOL. 65, NO. 5, MAY 2018




DOI: https://doi.org/10.24203/ajas.v7i3.5797

Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution-NoDerivatives 4.0 International License.