Solving Security of Cyber-Physical Systems with Multi-Objective Optimization Algorithms

Authors

  • Seyed Mahmood Hashemi Beijing University of Technology Chaoyang, Beijing

DOI:

https://doi.org/10.24203/ajas.v7i2.5798

Keywords:

Cyber-Physical System, Security, Multi-Objective Optimization

Abstract

Cyber-physical systems (CPS), as a significant set of the Internet of Things (IoT), play a key role in our life. CPS has a wide range of applications. Regardless of the benefits of CPS, they need a secure approach to communication. In this paper, an approach to CPS security is proposed. Usability of the proposed approach is the major characteristic of it because it employs a multi-objective model (MOM) of security. In this study, three algorithms were used to solve MOM (Multi-Objective Imperialist Competitive Algorithm, Multi-Objective Automata, Multi-Objective Bee Colony), because the evolutionary structure of the proposed algorithms causes the best adaptation on the network.

References

. Derui Ding, Qing-Long Han, Yang Xiang, Xiaohua Ge, Xian-Ming Zhang, “A survey on security control and attack detection for industrial cyber-physical systemsâ€, ELSEVIER, Neurocomputing 275 (2018) 1674–1683

. Zheng Xu, Yunhuai Liu, Hui Zhang, “Special section on intelligent sensing and applications for cyber-physical systemsâ€, ELSEVIER, Future Generation Computer Systems 81 (2018) 382–383

. Nikolay Akatyev, Joshua I. James, “Evidence identification in IoT networks based on threat assessmentâ€, ELSEVIER, Future Generation Computer Systems

. Bahar Farahani, Farshad Firouzi, Victor Chang, Mustafa Badaroglu, Nicholas Constant, Kunal Mankodiya, “Towards fog-driven IoT eHealth: Promises and challenges of IoT in medicine and healthcareâ€, ELSEVIER, Future Generation Computer Systems 78 (2018) 659–676

. Minhaj Ahmad Khan, Khaled Salah, “IoT security: Review, blockchain solutions, and open challengesâ€, ELSEVIER, Future Generation Computer Systems 82 (2018) 395–411

. Diego A.Cerdeir, MarcinDziubi´nski, Sanjeev Goyal, “Individual security, contagion, and network designâ€, ELSEVIER, Journal of Economic Theory 170 (2017) 182–226

. Hao Wu, Zhonghua Wang, “Multi-source fusion-based security detection method for heterogeneous networksâ€, ELSEVIER, computers & s e c u r i t y 74 ( 2 0 1 8 ) 55–70

. Yuan Gao, Hong Ao, Zenghui Feng, Weigui Zhou, Su Hu, Wanbin Tang, “ Mobile Network Security and Privacy in WSNâ€, ELSEVIER, Procedia Computer Science 129 (2018) 324–330

. Alessio Misuri, Nima Khakzad , Genserik Reniers , Valerio Cozzani, “A Bayesian network methodology for optimal security management of critical infrastructuresâ€, ELSEVIER, Reliability Engineering and System Safety 000 (2018) 1–14

. Pedro C. Pinto, João Barros, Moe Z.Win, “Secure Communication in Stochastic Wireless Networks—Part I: Connectivityâ€, IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 7, NO. 1, FEBRUARY 2012

. Huanhuan Yuan, Yuanqing Xia, “Secure filtering for stochastic non-linear systems under multiple missing measurements and deception attacksâ€, IET Control Theory Appl., 2018, Vol. 12 Iss. 4, pp. 515-523

Carlos A. Coello Coello, David A. Van Veldhuizen, Gary B. Lamont, “Evolutionary Algorithms for Solving Multi-Objective Problemsâ€, Speringer. 2nd Ed. , 2007.

Cristopher Dimopoulos, “A Review of Evolutionary Multi-objective Optimization, Application in the Area of Production Researchâ€, IEEE. Print ISBN 0-7803-8515-2, DOI 10.1109/CEC.2004.1331072. , 2004.

Carlos A. Coello Coello, “An Updated Survey of Evolutionary Multi-Objective Techniques: State of the art and Future Trendsâ€, IEEE. Vol.1, Printed ISBN 0-7803-5536-9, DOI 10.1109/CEC.1999.781901. , 1999.

Zdzislaw Kowalczuk, Tomasz Bialaszewski, “Improving Evolutionary Multi-Objective Optimization Using Gendersâ€, Springer. Vol. 4029/2006, DOI 10.1007/1178231-42. , 2006.

Arash Khabbazi, Esmaeil Atashpaz, Caro Lucas, “Imperialist Competitive Algorithm for Minimum Bit Error Rate Beamformingâ€, Inte.J. Bio-Inspired Computation, Vol. 1, Nos.1/2. , 2009.

Esmaeil Atashpaz, Caro Lucas, “Imperialist Competitive Algorithm: An Algorithm for Optimization Inspired by Imperialistic Competitionâ€, IEEE. Congress on Evolutionary Computation. , 2008 .

Caro Lucas, Zahra Nasiri-Gheidari, Farid Tootoonchian, “Application of an Imperialist Competitive Algorithm to the Design of a Linear Induction Motorâ€, ELSEVIER. Energy Conversion and Management. 1407–1411, 2010.

Downloads

Published

2019-04-30

How to Cite

Hashemi, S. M. (2019). Solving Security of Cyber-Physical Systems with Multi-Objective Optimization Algorithms. Asian Journal of Applied Sciences, 7(2). https://doi.org/10.24203/ajas.v7i2.5798

Issue

Section

Articles