Solving Security of Cyber-Physical Systems with Multi-Objective Optimization Algorithms

Seyed Mahmood Hashemi

Abstract


Cyber-physical systems (CPS), as a significant set of the Internet of Things (IoT), play a key role in our life. CPS has a wide range of applications. Regardless of the benefits of CPS, they need a secure approach to communication. In this paper, an approach to CPS security is proposed. Usability of the proposed approach is the major characteristic of it because it employs a multi-objective model (MOM) of security. In this study, three algorithms were used to solve MOM (Multi-Objective Imperialist Competitive Algorithm, Multi-Objective Automata, Multi-Objective Bee Colony), because the evolutionary structure of the proposed algorithms causes the best adaptation on the network.

Keywords


Cyber-Physical System, Security, Multi-Objective Optimization

Full Text:

PDF

References


. Derui Ding, Qing-Long Han, Yang Xiang, Xiaohua Ge, Xian-Ming Zhang, “A survey on security control and attack detection for industrial cyber-physical systems”, ELSEVIER, Neurocomputing 275 (2018) 1674–1683

. Zheng Xu, Yunhuai Liu, Hui Zhang, “Special section on intelligent sensing and applications for cyber-physical systems”, ELSEVIER, Future Generation Computer Systems 81 (2018) 382–383

. Nikolay Akatyev, Joshua I. James, “Evidence identification in IoT networks based on threat assessment”, ELSEVIER, Future Generation Computer Systems

. Bahar Farahani, Farshad Firouzi, Victor Chang, Mustafa Badaroglu, Nicholas Constant, Kunal Mankodiya, “Towards fog-driven IoT eHealth: Promises and challenges of IoT in medicine and healthcare”, ELSEVIER, Future Generation Computer Systems 78 (2018) 659–676

. Minhaj Ahmad Khan, Khaled Salah, “IoT security: Review, blockchain solutions, and open challenges”, ELSEVIER, Future Generation Computer Systems 82 (2018) 395–411

. Diego A.Cerdeir, MarcinDziubi´nski, Sanjeev Goyal, “Individual security, contagion, and network design”, ELSEVIER, Journal of Economic Theory 170 (2017) 182–226

. Hao Wu, Zhonghua Wang, “Multi-source fusion-based security detection method for heterogeneous networks”, ELSEVIER, computers & s e c u r i t y 74 ( 2 0 1 8 ) 55–70

. Yuan Gao, Hong Ao, Zenghui Feng, Weigui Zhou, Su Hu, Wanbin Tang, “ Mobile Network Security and Privacy in WSN”, ELSEVIER, Procedia Computer Science 129 (2018) 324–330

. Alessio Misuri, Nima Khakzad , Genserik Reniers , Valerio Cozzani, “A Bayesian network methodology for optimal security management of critical infrastructures”, ELSEVIER, Reliability Engineering and System Safety 000 (2018) 1–14

. Pedro C. Pinto, João Barros, Moe Z.Win, “Secure Communication in Stochastic Wireless Networks—Part I: Connectivity”, IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 7, NO. 1, FEBRUARY 2012

. Huanhuan Yuan, Yuanqing Xia, “Secure filtering for stochastic non-linear systems under multiple missing measurements and deception attacks”, IET Control Theory Appl., 2018, Vol. 12 Iss. 4, pp. 515-523

Carlos A. Coello Coello, David A. Van Veldhuizen, Gary B. Lamont, “Evolutionary Algorithms for Solving Multi-Objective Problems”, Speringer. 2nd Ed. , 2007.

Cristopher Dimopoulos, “A Review of Evolutionary Multi-objective Optimization, Application in the Area of Production Research”, IEEE. Print ISBN 0-7803-8515-2, DOI 10.1109/CEC.2004.1331072. , 2004.

Carlos A. Coello Coello, “An Updated Survey of Evolutionary Multi-Objective Techniques: State of the art and Future Trends”, IEEE. Vol.1, Printed ISBN 0-7803-5536-9, DOI 10.1109/CEC.1999.781901. , 1999.

Zdzislaw Kowalczuk, Tomasz Bialaszewski, “Improving Evolutionary Multi-Objective Optimization Using Genders”, Springer. Vol. 4029/2006, DOI 10.1007/1178231-42. , 2006.

Arash Khabbazi, Esmaeil Atashpaz, Caro Lucas, “Imperialist Competitive Algorithm for Minimum Bit Error Rate Beamforming”, Inte.J. Bio-Inspired Computation, Vol. 1, Nos.1/2. , 2009.

Esmaeil Atashpaz, Caro Lucas, “Imperialist Competitive Algorithm: An Algorithm for Optimization Inspired by Imperialistic Competition”, IEEE. Congress on Evolutionary Computation. , 2008 .

Caro Lucas, Zahra Nasiri-Gheidari, Farid Tootoonchian, “Application of an Imperialist Competitive Algorithm to the Design of a Linear Induction Motor”, ELSEVIER. Energy Conversion and Management. 1407–1411, 2010.




DOI: https://doi.org/10.24203/ajas.v7i2.5798

Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution-NoDerivatives 4.0 International License.