Cyber-Physical Systems Security and Resilience

A special issue of Information (ISSN 2078-2489). This special issue belongs to the section "Information Systems".

Deadline for manuscript submissions: closed (30 April 2021) | Viewed by 2628

Special Issue Editors


E-Mail Website
Guest Editor
Department of Electrical and Computer Engineering, University of Utah, Salt Lake City, UT, USA
Interests: cyber-physical systems control; smart grids; security and privacy; resilient critical infrastructures

E-Mail Website
Guest Editor
Department of Electrical and Computer Engineering, University of Utah, Salt Lake City, UT, USA
Interests: IoT applications in the smart grid; datacentric communications; cybersecurity and resilience

Special Issue Information

Dear Colleagues,

A cyber-physical system (CPS) consists of a physical process that is monitored and controlled through communication networks and embedded devices, in order to enhance the scalability, adaptability, and efficiency of the system operation. CPSs span a wide variety of applications, including critical infrastructures, such as water, oil, gas, electricity, and transportation, medical monitoring devices, smart buildings, and advanced manufacturing. Our reliance on computer and communication technologies makes CPSs attractive targets to cyber adversaries who intend to disrupt their normal operation for various reasons, causing not only economical losses, but also placing public safety at risk. Therefore, it is of paramount importance to design defense methodologies considering: i) security, by the implementation of mechanisms that increase the possibility of thwarting the attacker’s actions, and ii) resilience, by enhancing CPS capabilities to withstand, adapt, and recover from successful attacks to ensure that systems maintain appropriate fucntioanl expectations.

This Special Issue will focus on innovative and multidisciplinary developments of the security and resilience of cyber-physical systems by presenting novel theoretical advancements and/or relevant industrial applications. Topics of interest include, but are not limited to, the following areas:

  • Intrusion detection, localization, and isolation in CPSs
  • Information theory for CPSs security
  • Models of the attacker/defender interaction
  • Control theory and optimization for the security and resilience of CPSs
  • Data-driven and learning-based methodologies for CPSs security and resilience
  • Communication network security
  • Software-defined networks (SDN) and network function virtualization (NFV) for CPS
  • Self-healing CPSs
  • IoT applications for CPSs security and resilience
  • Datacentric Communications for enhancing Security and Resilience of CPSs

Dr. Jairo Giraldo
Dr. Mohamad El Hariri
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Information is an international peer-reviewed open access monthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 1600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • Cyber-physical systems
  • Control theory and optimization
  • Resilient operation
  • Network security

Published Papers (1 paper)

Order results
Result details
Select all
Export citation of selected articles as:

Research

15 pages, 1037 KiB  
Article
Modeling Data Flows with Network Calculus in Cyber-Physical Systems: Enabling Feature Analysis for Anomaly Detection Applications
by Nicholas Jacobs, Shamina Hossain-McKenzie and Adam Summers
Information 2021, 12(6), 255; https://doi.org/10.3390/info12060255 - 19 Jun 2021
Cited by 4 | Viewed by 2137
Abstract
The electric grid is becoming increasingly cyber-physical with the addition of smart technologies, new communication interfaces, and automated grid-support functions. Because of this, it is no longer sufficient to only study the physical system dynamics, but the cyber system must also be monitored [...] Read more.
The electric grid is becoming increasingly cyber-physical with the addition of smart technologies, new communication interfaces, and automated grid-support functions. Because of this, it is no longer sufficient to only study the physical system dynamics, but the cyber system must also be monitored as well to examine cyber-physical interactions and effects on the overall system. To address this gap for both operational and security needs, cyber-physical situational awareness is needed to monitor the system to detect any faults or malicious activity. Techniques and models to understand the physical system (the power system operation) exist, but methods to study the cyber system are needed, which can assist in understanding how the network traffic and changes to network conditions affect applications such as data analysis, intrusion detection systems (IDS), and anomaly detection. In this paper, we examine and develop models of data flows in communication networks of cyber-physical systems (CPSs) and explore how network calculus can be utilized to develop those models for CPSs, with a focus on anomaly and intrusion detection. This provides a foundation for methods to examine how changes to behavior in the CPS can be modeled and for investigating cyber effects in CPSs in anomaly detection applications. Full article
(This article belongs to the Special Issue Cyber-Physical Systems Security and Resilience)
Show Figures

Figure 1

Back to TopTop