Solving Security of Cyber-Physical Systems with Multi-Objective Optimization Algorithms
DOI:
https://doi.org/10.24203/ajas.v7i2.5798Keywords:
Cyber-Physical System, Security, Multi-Objective OptimizationAbstract
Cyber-physical systems (CPS), as a significant set of the Internet of Things (IoT), play a key role in our life. CPS has a wide range of applications. Regardless of the benefits of CPS, they need a secure approach to communication. In this paper, an approach to CPS security is proposed. Usability of the proposed approach is the major characteristic of it because it employs a multi-objective model (MOM) of security. In this study, three algorithms were used to solve MOM (Multi-Objective Imperialist Competitive Algorithm, Multi-Objective Automata, Multi-Objective Bee Colony), because the evolutionary structure of the proposed algorithms causes the best adaptation on the network.References
. Derui Ding, Qing-Long Han, Yang Xiang, Xiaohua Ge, Xian-Ming Zhang, “A survey on security control and attack detection for industrial cyber-physical systemsâ€, ELSEVIER, Neurocomputing 275 (2018) 1674–1683
. Zheng Xu, Yunhuai Liu, Hui Zhang, “Special section on intelligent sensing and applications for cyber-physical systemsâ€, ELSEVIER, Future Generation Computer Systems 81 (2018) 382–383
. Nikolay Akatyev, Joshua I. James, “Evidence identification in IoT networks based on threat assessmentâ€, ELSEVIER, Future Generation Computer Systems
. Bahar Farahani, Farshad Firouzi, Victor Chang, Mustafa Badaroglu, Nicholas Constant, Kunal Mankodiya, “Towards fog-driven IoT eHealth: Promises and challenges of IoT in medicine and healthcareâ€, ELSEVIER, Future Generation Computer Systems 78 (2018) 659–676
. Minhaj Ahmad Khan, Khaled Salah, “IoT security: Review, blockchain solutions, and open challengesâ€, ELSEVIER, Future Generation Computer Systems 82 (2018) 395–411
. Diego A.Cerdeir, MarcinDziubi´nski, Sanjeev Goyal, “Individual security, contagion, and network designâ€, ELSEVIER, Journal of Economic Theory 170 (2017) 182–226
. Hao Wu, Zhonghua Wang, “Multi-source fusion-based security detection method for heterogeneous networksâ€, ELSEVIER, computers & s e c u r i t y 74 ( 2 0 1 8 ) 55–70
. Yuan Gao, Hong Ao, Zenghui Feng, Weigui Zhou, Su Hu, Wanbin Tang, “ Mobile Network Security and Privacy in WSNâ€, ELSEVIER, Procedia Computer Science 129 (2018) 324–330
. Alessio Misuri, Nima Khakzad , Genserik Reniers , Valerio Cozzani, “A Bayesian network methodology for optimal security management of critical infrastructuresâ€, ELSEVIER, Reliability Engineering and System Safety 000 (2018) 1–14
. Pedro C. Pinto, João Barros, Moe Z.Win, “Secure Communication in Stochastic Wireless Networks—Part I: Connectivityâ€, IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 7, NO. 1, FEBRUARY 2012
. Huanhuan Yuan, Yuanqing Xia, “Secure filtering for stochastic non-linear systems under multiple missing measurements and deception attacksâ€, IET Control Theory Appl., 2018, Vol. 12 Iss. 4, pp. 515-523
Carlos A. Coello Coello, David A. Van Veldhuizen, Gary B. Lamont, “Evolutionary Algorithms for Solving Multi-Objective Problemsâ€, Speringer. 2nd Ed. , 2007.
Cristopher Dimopoulos, “A Review of Evolutionary Multi-objective Optimization, Application in the Area of Production Researchâ€, IEEE. Print ISBN 0-7803-8515-2, DOI 10.1109/CEC.2004.1331072. , 2004.
Carlos A. Coello Coello, “An Updated Survey of Evolutionary Multi-Objective Techniques: State of the art and Future Trendsâ€, IEEE. Vol.1, Printed ISBN 0-7803-5536-9, DOI 10.1109/CEC.1999.781901. , 1999.
Zdzislaw Kowalczuk, Tomasz Bialaszewski, “Improving Evolutionary Multi-Objective Optimization Using Gendersâ€, Springer. Vol. 4029/2006, DOI 10.1007/1178231-42. , 2006.
Arash Khabbazi, Esmaeil Atashpaz, Caro Lucas, “Imperialist Competitive Algorithm for Minimum Bit Error Rate Beamformingâ€, Inte.J. Bio-Inspired Computation, Vol. 1, Nos.1/2. , 2009.
Esmaeil Atashpaz, Caro Lucas, “Imperialist Competitive Algorithm: An Algorithm for Optimization Inspired by Imperialistic Competitionâ€, IEEE. Congress on Evolutionary Computation. , 2008 .
Caro Lucas, Zahra Nasiri-Gheidari, Farid Tootoonchian, “Application of an Imperialist Competitive Algorithm to the Design of a Linear Induction Motorâ€, ELSEVIER. Energy Conversion and Management. 1407–1411, 2010.
Downloads
Published
How to Cite
Issue
Section
License
- Papers must be submitted on the understanding that they have not been published elsewhere (except in the form of an abstract or as part of a published lecture, review, or thesis) and are not currently under consideration by another journal published by any other publisher.
- It is also the authors responsibility to ensure that the articles emanating from a particular source are submitted with the necessary approval.
- The authors warrant that the paper is original and that he/she is the author of the paper, except for material that is clearly identified as to its original source, with permission notices from the copyright owners where required.
- The authors ensure that all the references carefully and they are accurate in the text as well as in the list of references (and vice versa).
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Attribution-NonCommercial 4.0 International that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).
- The journal/publisher is not responsible for subsequent uses of the work. It is the author's responsibility to bring an infringement action if so desired by the author.