Providing Security in CPSs with Evolutionary Algorithms

Authors

  • Seyed Mahmood Hashemi Beijing University of Technology Chaoyang, Beijing

DOI:

https://doi.org/10.24203/ajas.v7i3.5797

Keywords:

Cyber-Physical Systems, Multi-Objective Optimization, Evolutionary Algorithm

Abstract

Because of the significant role of Cyber-Physical Systems (CPSs) in our lives, the security of these systems is of paramount importance. Due to the complexity of inside CPSs components, current methods need special skills to understand their workflow. The approach available in this regard, more than comfortability, have the ability to adapt to the network conditions. In this research, we present the secure routing problem of CPSs as a multi-objective optimization model and then solve it through three Evolutionary Algorithms (EAs). The main reason four using EA is that it allows satisfying the time constraints in the routing. Multi-objective optimization produces optimum values for objectives simultaneously.

References

Hamed Orojloo, Mohammad Abdollahi Azgomi, “A method for evaluating the consequence propagation of security attacks in cyber–physical systemsâ€, ELSEVIER, Future Generation Computer Systems 67 (2017) 57–71

Derui Ding, Qing-Long Han, Yang Xiang, Xiaohua Ge, Xian-Ming Zhang, “ A survey on security control and attack detection for industrial cyber-physical systemsâ€, Neurocomputing 275 (2018) 1674–1683

Javier Lopez, Juan E. Rubio, “ Access control for cyber-physical systems interconnected to the cloudâ€, ELSEVIER, Computer Networks 134 (2018) 46–54

Alexandru Stefanov, Chen-Ching Liu, “Cyber-Physical System Security and Impact Analysisâ€, Proceedings of the 19th World Congress The International Federation of Automatic Control Cape Town, South Africa. August 24-29, 2014

Jie Liu, Diangang Wang, Cheng Zhang, Zhenyu Tang, Zhuozhen Jiang, Junyong Liub, Yue Xiang, “Reliability Assessment of Cyber Physical Distribution Systemâ€, ELSEVIER, Energy Procedia 142 (2017) 2021–2026

Arash Nourian, Stuart Madnick, “A Systems Theoretic Approach to the Security Threats in Cyber Physical Systems Applied to Stuxnetâ€, IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 15, NO. 1, JANUARY/FEBRUARY 2018

Jacob Wurm, Yier Jin, Yang Liu, Shiyan Hu, Kenneth Heffner, Fahim Rahman, Mark Tehranipoor, “Introduction to Cyber-Physical System Security: A Cross-Layer Perspectiveâ€, IEEE TRANSACTIONS ON MULTI-SCALE COMPUTING SYSTEMS, VOL. 3, NO. 3, JULY-SEPTEMBER 2017

Shihanur Rahman, Apel Mahmud, Aman Maung Than Oo, Hemanshu Roy Pota, “Multi-Agent Approach for Enhancing Security of Protection Schemes in Cyber-Physical Energy Systemsâ€, IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. 13, NO. 2, APRIL 2017

Gerry Howser, Bruce McMillin, “Using Information-Flow Methods to Analyze the Security of Cyber-Physical Systemsâ€, I E E E COMPUTE R SOC I E T Y APR IL 2017

Kim-Kwang Raymond Choo, Mehran Mozaffari Kermani, Reza Azarderakhsh, Manimaran Govindarasu, “Emerging Embedded and Cyber Physical System Security Challenges and Innovations†, IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 14, NO. 3, MAY/JUNE 2017

Jairo Giraldo, Esha Sarkar, Alvaro A. Cardenas, Michail Maniatakos and Murat Kantarcioglu, “Security and Privacy in Cyber–Physical Systems: A Survey of Surveysâ€, IEEE, Cyber–Physical Systems Security and Privacy, July/August 2017

Iman Shames , Farhad Farokhi, Tyler H. Summers, “Security analysis of cyber-physical systems using â„‹2 normâ€, IET Control Theory Appl., 2017, Vol. 11 Iss. 11, pp. 1749-1755

Jun Yang, Chunjie Zhou , Shuanghua Yang, Haizhou Xu , Bowen Hu, “Anomaly Detection Based on Zone Partition for Security Protection of Industrial Cyber-Physical Systemsâ€, IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, VOL. 65, NO. 5, MAY 2018

Downloads

Published

2019-06-17

Issue

Section

Articles

How to Cite

Providing Security in CPSs with Evolutionary Algorithms. (2019). Asian Journal of Applied Sciences, 7(3). https://doi.org/10.24203/ajas.v7i3.5797

Similar Articles

1-10 of 273

You may also start an advanced similarity search for this article.