Providing Security in CPSs with Evolutionary Algorithms
DOI:
https://doi.org/10.24203/ajas.v7i3.5797Keywords:
Cyber-Physical Systems, Multi-Objective Optimization, Evolutionary AlgorithmAbstract
Because of the significant role of Cyber-Physical Systems (CPSs) in our lives, the security of these systems is of paramount importance. Due to the complexity of inside CPSs components, current methods need special skills to understand their workflow. The approach available in this regard, more than comfortability, have the ability to adapt to the network conditions. In this research, we present the secure routing problem of CPSs as a multi-objective optimization model and then solve it through three Evolutionary Algorithms (EAs). The main reason four using EA is that it allows satisfying the time constraints in the routing. Multi-objective optimization produces optimum values for objectives simultaneously.References
Hamed Orojloo, Mohammad Abdollahi Azgomi, “A method for evaluating the consequence propagation of security attacks in cyber–physical systemsâ€, ELSEVIER, Future Generation Computer Systems 67 (2017) 57–71
Derui Ding, Qing-Long Han, Yang Xiang, Xiaohua Ge, Xian-Ming Zhang, “ A survey on security control and attack detection for industrial cyber-physical systemsâ€, Neurocomputing 275 (2018) 1674–1683
Javier Lopez, Juan E. Rubio, “ Access control for cyber-physical systems interconnected to the cloudâ€, ELSEVIER, Computer Networks 134 (2018) 46–54
Alexandru Stefanov, Chen-Ching Liu, “Cyber-Physical System Security and Impact Analysisâ€, Proceedings of the 19th World Congress The International Federation of Automatic Control Cape Town, South Africa. August 24-29, 2014
Jie Liu, Diangang Wang, Cheng Zhang, Zhenyu Tang, Zhuozhen Jiang, Junyong Liub, Yue Xiang, “Reliability Assessment of Cyber Physical Distribution Systemâ€, ELSEVIER, Energy Procedia 142 (2017) 2021–2026
Arash Nourian, Stuart Madnick, “A Systems Theoretic Approach to the Security Threats in Cyber Physical Systems Applied to Stuxnetâ€, IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 15, NO. 1, JANUARY/FEBRUARY 2018
Jacob Wurm, Yier Jin, Yang Liu, Shiyan Hu, Kenneth Heffner, Fahim Rahman, Mark Tehranipoor, “Introduction to Cyber-Physical System Security: A Cross-Layer Perspectiveâ€, IEEE TRANSACTIONS ON MULTI-SCALE COMPUTING SYSTEMS, VOL. 3, NO. 3, JULY-SEPTEMBER 2017
Shihanur Rahman, Apel Mahmud, Aman Maung Than Oo, Hemanshu Roy Pota, “Multi-Agent Approach for Enhancing Security of Protection Schemes in Cyber-Physical Energy Systemsâ€, IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. 13, NO. 2, APRIL 2017
Gerry Howser, Bruce McMillin, “Using Information-Flow Methods to Analyze the Security of Cyber-Physical Systemsâ€, I E E E COMPUTE R SOC I E T Y APR IL 2017
Kim-Kwang Raymond Choo, Mehran Mozaffari Kermani, Reza Azarderakhsh, Manimaran Govindarasu, “Emerging Embedded and Cyber Physical System Security Challenges and Innovations†, IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 14, NO. 3, MAY/JUNE 2017
Jairo Giraldo, Esha Sarkar, Alvaro A. Cardenas, Michail Maniatakos and Murat Kantarcioglu, “Security and Privacy in Cyber–Physical Systems: A Survey of Surveysâ€, IEEE, Cyber–Physical Systems Security and Privacy, July/August 2017
Iman Shames , Farhad Farokhi, Tyler H. Summers, “Security analysis of cyber-physical systems using â„‹2 normâ€, IET Control Theory Appl., 2017, Vol. 11 Iss. 11, pp. 1749-1755
Jun Yang, Chunjie Zhou , Shuanghua Yang, Haizhou Xu , Bowen Hu, “Anomaly Detection Based on Zone Partition for Security Protection of Industrial Cyber-Physical Systemsâ€, IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, VOL. 65, NO. 5, MAY 2018
Downloads
Published
Issue
Section
License
Copyright © The Author(s). This article is published under the Creative Commons Attribution License (CC BY 4.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.