Topic Editors

Graduate School of Science and Engineering, Hosei University, Tokyo, Japan
Birla Institute of Technology, Jharkhand, India

Cyber-Physical Security for IoT Systems

Abstract submission deadline
closed (30 April 2024)
Manuscript submission deadline
closed (30 June 2024)
Viewed by
25948

Topic Information

Dear Colleagues,

The Internet of Things (IoT) and cyber-physical systems (CPS) offer enormous advantages in interacting and sensing the physical world. They play an important role in smart grid, medical monitoring, robotics systems, and industrial control systems. However, the emerging systems are vulnerable to external attacks due to the open availability of sensor networks. Therefore, this Special Issue is dedicated to publishing original research for solving and enhancing cybersecurity issues.

Topics of interests include, but are not limited to:

  • Attack detection for CPS;
  • Data security and privacy for CPS and IoT;
  • Digital twins for CPS;
  • Embedded systems security;
  • Security of IoT networks and smart grids;
  • Security of CPS in medical system;
  • Cyber security and safety in Industry 4.0 and Industry 5.0.

Dr. Keping Yu
Dr. Chinmay Chakraborty
Topic Editors

Keywords

  • cyber-physical systems
  • embedded systems
  • IoT networks
  • smart grids
  • autonomous automotive systems
  • Industry 4.0 and Industry 5.0

Participating Journals

Journal Name Impact Factor CiteScore Launched Year First Decision (median) APC
Applied Sciences
applsci
2.5 5.3 2011 17.8 Days CHF 2400
Electronics
electronics
2.6 5.3 2012 16.8 Days CHF 2400
Future Internet
futureinternet
2.8 7.1 2009 13.1 Days CHF 1600
Journal of Cybersecurity and Privacy
jcp
- 5.3 2021 32.4 Days CHF 1000
Sensors
sensors
3.4 7.3 2001 16.8 Days CHF 2600
Technologies
technologies
4.2 6.7 2013 24.6 Days CHF 1600

Preprints.org is a multidiscipline platform providing preprint service that is dedicated to sharing your research from the start and empowering your research journey.

MDPI Topics is cooperating with Preprints.org and has built a direct connection between MDPI journals and Preprints.org. Authors are encouraged to enjoy the benefits by posting a preprint at Preprints.org prior to publication:

  1. Immediately share your ideas ahead of publication and establish your research priority;
  2. Protect your idea from being stolen with this time-stamped preprint article;
  3. Enhance the exposure and impact of your research;
  4. Receive feedback from your peers in advance;
  5. Have it indexed in Web of Science (Preprint Citation Index), Google Scholar, Crossref, SHARE, PrePubMed, Scilit and Europe PMC.

Published Papers (14 papers)

Order results
Result details
Journals
Select all
Export citation of selected articles as:
23 pages, 793 KiB  
Article
A Physical-Layer Security Cooperative Framework for Mitigating Interference and Eavesdropping Attacks in Internet of Things Environments
by Abdallah Farraj and Eman Hammad
Sensors 2024, 24(16), 5171; https://doi.org/10.3390/s24165171 - 10 Aug 2024
Viewed by 658
Abstract
Intentional electromagnetic interference attacks (e.g., jamming) against wireless connected devices such as the Internet of Things (IoT) remain a serious challenge, especially as such attacks evolve in complexity. Similarly, eavesdropping on wireless communication channels persists as an inherent vulnerability that is often exploited [...] Read more.
Intentional electromagnetic interference attacks (e.g., jamming) against wireless connected devices such as the Internet of Things (IoT) remain a serious challenge, especially as such attacks evolve in complexity. Similarly, eavesdropping on wireless communication channels persists as an inherent vulnerability that is often exploited by adversaries. This article investigates a novel approach to enhancing information security for IoT systems via collaborative strategies that can effectively mitigate attacks targeting availability via interference and confidentiality via eavesdropping. We examine the proposed approach for two use cases. First, we consider an IoT device that experiences an interference attack, causing wireless channel outages and hindering access to transmitted IoT data. A physical-layer-based security (PLS) transmission strategy is proposed in this article to maintain target levels of information availability for devices targeted by adversarial interference. In the proposed strategy, select IoT devices leverage a cooperative transmission approach to mitigate the IoT signal outages under active interference attacks. Second, we consider the case of information confidentiality for IoT devices as they communicate over wireless channels with possible eavesdroppers. In this case, we propose a collaborative transmission strategy where IoT devices create a signal outage for the eavesdropper, preventing it from decoding the signal of the targeted devices. The analytical and numerical results of this article illustrate the effectiveness of the proposed transmission strategy in achieving desired IoT security levels with respect to availability and confidentiality for both use cases. Full article
(This article belongs to the Topic Cyber-Physical Security for IoT Systems)
Show Figures

Figure 1

20 pages, 2308 KiB  
Article
Enhanced Energy Transfer Efficiency for IoT-Enabled Cyber-Physical Systems in 6G Edge Networks with WPT-MIMO-NOMA
by Agbon Ehime Ezekiel, Kennedy Chinedu Okafor, Sena Timothy Tersoo, Christopher Akinyemi Alabi, Jamiu Abdulsalam, Agbotiname Lucky Imoize, Olamide Jogunola and Kelvin Anoh
Technologies 2024, 12(8), 119; https://doi.org/10.3390/technologies12080119 - 24 Jul 2024
Viewed by 1468
Abstract
The integration of wireless power transfer (WPT) with massive multiple-input multiple-output (MIMO) non-orthogonal multiple access (NOMA) networks can provide operational capabilities to energy-constrained Internet of Things (IoT) devices in cyber-physical systems such as smart autonomous vehicles. However, during downlink WPT, co-channel interference (CCI) [...] Read more.
The integration of wireless power transfer (WPT) with massive multiple-input multiple-output (MIMO) non-orthogonal multiple access (NOMA) networks can provide operational capabilities to energy-constrained Internet of Things (IoT) devices in cyber-physical systems such as smart autonomous vehicles. However, during downlink WPT, co-channel interference (CCI) can limit the energy efficiency (EE) gains in such systems. This paper proposes a user equipment (UE)–base station (BS) connection model to assign each UE to a single BS for WPT to mitigate CCI. An energy-efficient resource allocation scheme is developed that integrates the UE–BS connection approach with joint optimization of power control, time allocation, antenna selection, and subcarrier assignment. The proposed scheme improves EE by 24.72% and 33.76% under perfect and imperfect CSI conditions, respectively, compared to a benchmark scheme without UE–BS connections. The scheme requires fewer BS antennas to maximize EE and the distributed algorithm exhibits fast convergence. Furthermore, UE–BS connections’ impact on EE provided significant gains. Dedicated links improve EE by 24.72% (perfect CSI) and 33.76% (imperfect CSI) over standard connections. Imperfect CSI reduces EE, with the proposed scheme outperforming by 6.97% to 12.75% across error rates. More antennas enhance EE, with improvements of up to 123.12% (conventional MIMO) and 38.14% (massive MIMO) over standard setups. Larger convergence parameters improve convergence, achieving EE gains of 7.09% to 11.31% over the baseline with different convergence rates. The findings validate the effectiveness of the proposed techniques in improving WPT efficiency and EE in wireless-powered MIMO–NOMA networks. Full article
(This article belongs to the Topic Cyber-Physical Security for IoT Systems)
Show Figures

Figure 1

24 pages, 9004 KiB  
Article
PowerBridge: Covert Air-Gap Exfiltration/Infiltration via Smart Plug
by Yongyu Liang, Hong Shan, Zelin Luo, Lanlan Qi and Yi Xie
Appl. Sci. 2024, 14(14), 6321; https://doi.org/10.3390/app14146321 - 19 Jul 2024
Viewed by 846
Abstract
Power lines are commonly utilized for energy transmission, and they serve as a conduit for data exfiltration or infiltration in some specific scenarios. This paper explores the feasibility of establishing bidirectional communication between a modified plug and the equipment power line within an [...] Read more.
Power lines are commonly utilized for energy transmission, and they serve as a conduit for data exfiltration or infiltration in some specific scenarios. This paper explores the feasibility of establishing bidirectional communication between a modified plug and the equipment power line within an air-gapped network organization and with external entities. Bidirectional air-gap communication includes two scenarios, the data leak from air-gapped networks and the transmission of external data to air-gapped networks, namely, exfiltration and infiltration. In the exfiltration scenario, software in the air-gapped networks modulates and encodes data by manipulating the power consumption of the equipment during transmission, which is then sent outside through the power line. The device utilizes a smart plug power meter to record current fluctuations and subsequently decode any leaked data. In the infiltration scenario, a smart plug is used to control the power supply status of a device’s power cord, enabling data encoding and decoding by turning the power supply on and off. The software in the air-gapped equipment captures and decodes the power supply status to infiltrate. We discuss relevant literature and provide scientific background on smart plugs and power line communication. We simulate the communication scenario, propose a communication scheme, and present data modulation techniques as well as a communication transmission protocol for air-gap channels. Our evaluation of the PowerBridge air-gap channels demonstrates that data can leak from the air-gapped computer into the power line at an approximate rate of 30 bps, which can be captured by the smart plug. Additionally, it is possible for data to penetrate from the smart plug into air-gapped networks at a speed exceeding 1 bps. Full article
(This article belongs to the Topic Cyber-Physical Security for IoT Systems)
Show Figures

Figure 1

16 pages, 3414 KiB  
Article
A Cyber–Physical System Based on Digital Twin and 3D SCADA for Real-Time Monitoring of Olive Oil Mills
by Cristina Martinez-Ruedas, Jose-Maria Flores-Arias, Isabel M. Moreno-Garcia, Matias Linan-Reyes and Francisco Jose Bellido-Outeiriño
Technologies 2024, 12(5), 60; https://doi.org/10.3390/technologies12050060 - 30 Apr 2024
Cited by 1 | Viewed by 1897
Abstract
Cyber–physical systems involve the creation, continuous updating, and monitoring of virtual replicas that closely mirror their physical counterparts. These virtual representations are fed by real-time data from sensors, Internet of Things (IoT) devices, and other sources, enabling a dynamic and accurate reflection of [...] Read more.
Cyber–physical systems involve the creation, continuous updating, and monitoring of virtual replicas that closely mirror their physical counterparts. These virtual representations are fed by real-time data from sensors, Internet of Things (IoT) devices, and other sources, enabling a dynamic and accurate reflection of the state of the physical system. This emphasizes the importance of data synchronization, visualization, and interaction within virtual environments as a means to improve decision-making, training, maintenance, and overall operational efficiency. This paper presents a novel approach to a cyber–physical system that integrates virtual reality (VR)-based digital twins and 3D SCADA in the context of Industry 4.0 for the monitoring and optimization of an olive mill. The methodology leverages virtual reality to create a digital twin that enables immersive data-driven simulations for olive mill monitoring. The proposed CPS takes data from the physical environment through the existing sensors and measurement elements in the olive mill, concentrates them, and exposes them to the virtual environment through the Open Platform Communication United Architecture (OPC-UA) protocol, thus establishing bidirectional and real-time communication. Furthermore, in the proposed virtual environment, the digital twin is interfaced with the 3D SCADA system, allowing it to create virtual models of the process. This innovative approach has the potential to revolutionize the olive oil industry by improving operational efficiency, product quality, and sustainability while optimizing maintenance practices. Full article
(This article belongs to the Topic Cyber-Physical Security for IoT Systems)
Show Figures

Figure 1

14 pages, 1298 KiB  
Article
A Secured Intrusion Detection System for Mobile Edge Computing
by Khalid Alsubhi
Appl. Sci. 2024, 14(4), 1432; https://doi.org/10.3390/app14041432 - 9 Feb 2024
Viewed by 1360
Abstract
With the proliferation of mobile devices and the increasing demand for low-latency and high-throughput applications, mobile edge computing (MEC) has emerged as a promising paradigm to offload computational tasks to the network edge. However, the dynamic and resource-constrained nature of MEC environments introduces [...] Read more.
With the proliferation of mobile devices and the increasing demand for low-latency and high-throughput applications, mobile edge computing (MEC) has emerged as a promising paradigm to offload computational tasks to the network edge. However, the dynamic and resource-constrained nature of MEC environments introduces new challenges, particularly in the realm of security. In this context, intrusion detection becomes crucial to safeguard the integrity and confidentiality of sensitive data processed at the edge. This paper presents a novel Secured Edge Computing Intrusion Detection System (SEC-IDS) tailored for MEC environments. The proposed SEC-IDS framework integrates both signature-based and anomaly-based detection mechanisms to enhance the accuracy and adaptability of intrusion detection. Leveraging edge computing resources, the framework distributes detection tasks closer to the data source, thereby reducing latency and improving real-time responsiveness. To validate the effectiveness of the proposed SEC-IDS framework, extensive experiments were conducted in a simulated MEC environment. The results demonstrate superior detection rates compared to traditional centralized approaches, highlighting the efficiency and scalability of the proposed solution. Furthermore, the framework exhibits resilience to resource constraints commonly encountered in edge computing environments. Full article
(This article belongs to the Topic Cyber-Physical Security for IoT Systems)
Show Figures

Figure 1

19 pages, 744 KiB  
Article
High-Performance Hardware Implementation of the Saber Key Encapsulation Protocol
by Dejian Li, Junjie Zhong, Song Cheng, Yuantuo Zhang, Shunxian Gao and Yijun Cui
Electronics 2024, 13(4), 675; https://doi.org/10.3390/electronics13040675 - 6 Feb 2024
Viewed by 904
Abstract
Information is pivotal in contemporary society, highlighting the necessity for a secure cryptographic system. The emergence of quantum algorithms and the swift advancement of specialized quantum computers will render traditional cryptography susceptible to quantum attacks in the foreseeable future. The lattice-based Saber key [...] Read more.
Information is pivotal in contemporary society, highlighting the necessity for a secure cryptographic system. The emergence of quantum algorithms and the swift advancement of specialized quantum computers will render traditional cryptography susceptible to quantum attacks in the foreseeable future. The lattice-based Saber key encapsulation protocol holds significant value in cryptographic research and practical applications. In this paper, we propose three types of polynomial multipliers for various application scenarios including lightweight Schoolbook multiplier, high-throughput multiplier based on the TMVP-Schoolbook algorithm and improved pipelined NTT multiplier. Other principal modules of Saber are designed encompassing the hash function module, sampling module and functional submodule. Based on our proposed multiplier, we implement the overall hardware circuits of the Saber key encapsulation protocol. Experimental results demonstrate that our overall hardware circuits have different advantages. Our lightweight implementation has minimal resource consumption. Our high-throughput implementation only needs 23.28 μs to complete the whole process, which is the fastest among the existing works. The throughput rate is 10,988 Kbps and the frequency is 416 MHz. Our hardware implementation based on the improved pipelined NTT multiplier achieved a good balance between area and performance. The overall frequency can reach 357 MHz. Full article
(This article belongs to the Topic Cyber-Physical Security for IoT Systems)
Show Figures

Figure 1

14 pages, 4355 KiB  
Article
A Hybrid Genetic Algorithm-Based Random Forest Model for Intrusion Detection Approach in Internet of Medical Things
by Monire Norouzi, Zeynep Gürkaş-Aydın, Özgür Can Turna, Mehmet Yavuz Yağci, Muhammed Ali Aydin and Alireza Souri
Appl. Sci. 2023, 13(20), 11145; https://doi.org/10.3390/app132011145 - 10 Oct 2023
Cited by 3 | Viewed by 1887
Abstract
The Internet of Medical Things (IoMT) is a bio-network of associated medical devices, which is slowly improving the healthcare industry by focusing its abilities on enhancing personal healthcare benefits with medical data. Moreover, the IoMT tries to deliver sufficient and more suitable medical [...] Read more.
The Internet of Medical Things (IoMT) is a bio-network of associated medical devices, which is slowly improving the healthcare industry by focusing its abilities on enhancing personal healthcare benefits with medical data. Moreover, the IoMT tries to deliver sufficient and more suitable medical services at a low cost. With the rapid growth of technology, medical instruments that are widely used anywhere are likely to increase security issues and create safe data transmission issues through resource limitations and available connectivity. Moreover, the patients probably face the risk of different forms of physical harm because of IoMT device attacks. In this paper, we present a secure environment for IoMT devices against cyber-attacks for patient medical data using a new IoMT framework with a hybrid genetic algorithm-based random forest (GA-RF) model. The proposed algorithm achieved better results in terms of accuracy (99.999%), precision, and recall (100%, respectively) to detect cyber-attacks based on two NSL-KDD and UNSW_2018_IoT_Botnet data sets than the other machine learning algorithms. Full article
(This article belongs to the Topic Cyber-Physical Security for IoT Systems)
Show Figures

Figure 1

22 pages, 3710 KiB  
Article
Detecting Risky Authentication Using the OpenID Connect Token Exchange Time
by Alex Heunhe Han and Dong Hoon Lee
Sensors 2023, 23(19), 8256; https://doi.org/10.3390/s23198256 - 5 Oct 2023
Cited by 1 | Viewed by 2125
Abstract
With the rise in sophisticated cyber threats, traditional authentication methods are no longer sufficient. Risk-based authentication (RBA) plays a critical role in the context of the zero trust framework—a paradigm shift that assumes no trust within or outside the network. This research introduces [...] Read more.
With the rise in sophisticated cyber threats, traditional authentication methods are no longer sufficient. Risk-based authentication (RBA) plays a critical role in the context of the zero trust framework—a paradigm shift that assumes no trust within or outside the network. This research introduces a novel proposal as its core: utilization of the time required by OpenID Connect (OIDC) token exchanges as a new RBA feature. This innovative approach enables the detection of tunneled connections without any intervention from the user’s browser or device. By analyzing the duration of OIDC token exchanges, the system can identify any irregularities that may signify unauthorized access attempts. This approach not only improves upon existing RBA frameworks but is also in alignment with the broader movement toward intelligent and responsive security systems. Full article
(This article belongs to the Topic Cyber-Physical Security for IoT Systems)
Show Figures

Figure 1

16 pages, 620 KiB  
Article
A Comparison of Monte Carlo-Based and PINN Parameter Estimation Methods for Malware Identification in IoT Networks
by Marcos Severt, Roberto Casado-Vara and Angel Martín del Rey
Technologies 2023, 11(5), 133; https://doi.org/10.3390/technologies11050133 - 30 Sep 2023
Viewed by 1825
Abstract
Malware propagation is a growing concern due to its potential impact on the security and integrity of connected devices in Internet of Things (IoT) network environments. This study investigates parameter estimation for Susceptible-Infectious-Recovered (SIR) and Susceptible–Infectious–Recovered–Susceptible (SIRS) models modeling malware propagation in an [...] Read more.
Malware propagation is a growing concern due to its potential impact on the security and integrity of connected devices in Internet of Things (IoT) network environments. This study investigates parameter estimation for Susceptible-Infectious-Recovered (SIR) and Susceptible–Infectious–Recovered–Susceptible (SIRS) models modeling malware propagation in an IoT network. Synthetic data of malware propagation in the IoT network is generated and a comprehensive comparison is made between two approaches: algorithms based on Monte Carlo methods and Physics-Informed Neural Networks (PINNs). The results show that, based on the infection curve measured in the IoT network, both methods are able to provide accurate estimates of the parameters of the malware propagation model. Furthermore, the results show that the choice of the appropriate method depends on the dynamics of the spreading malware and computational constraints. This work highlights the importance of considering both classical and AI-based approaches and provides a basis for future research on parameter estimation in epidemiological models applied to malware propagation in IoT networks. Full article
(This article belongs to the Topic Cyber-Physical Security for IoT Systems)
Show Figures

Figure 1

30 pages, 10144 KiB  
Article
Detecting Cyber Attacks In-Vehicle Diagnostics Using an Intelligent Multistage Framework
by Tasneem A. Awaad, Mohamed Watheq El-Kharashi, Mohamed Taher and Ayman Tawfik
Sensors 2023, 23(18), 7941; https://doi.org/10.3390/s23187941 - 16 Sep 2023
Viewed by 2464
Abstract
The advanced technology of vehicles makes them vulnerable to external exploitation. The current trend of research is to impose security measures to protect vehicles from different aspects. One of the main problems that counter Intrusion Detection Systems (IDSs) is the necessity to have [...] Read more.
The advanced technology of vehicles makes them vulnerable to external exploitation. The current trend of research is to impose security measures to protect vehicles from different aspects. One of the main problems that counter Intrusion Detection Systems (IDSs) is the necessity to have a low false acceptance rate (FA) with high detection accuracy without major changes in the vehicle network infrastructure. Furthermore, the location of IDSs can be controversial due to the limitations and concerns of Electronic Control Units (ECUs). Thus, we propose a novel framework of multistage to detect abnormality in vehicle diagnostic data based on specifications of diagnostics and stacking ensemble for various machine learning models. The proposed framework is verified against the KIA SOUL and Seat Leon 2018 datasets. Our IDS is evaluated against point anomaly attacks and period anomaly attacks that have not been used in its training. The results show the superiority of the framework and its robustness with high accuracy of 99.21%, a low false acceptance rate of 0.003%, and a good detection rate (DR) of 99.63% for Seat Leon 2018, and an accuracy of 99.22%, a low false acceptance rate of 0.005%, and good detection rate of 98.59% for KIA SOUL. Full article
(This article belongs to the Topic Cyber-Physical Security for IoT Systems)
Show Figures

Figure 1

24 pages, 4907 KiB  
Article
Moving Target Defense for Detecting Coordinated Cyber-Physical Attacks on Power Grids via a Modified Sensor Measurement Expression
by Jian Yu and Qiang Li
Electronics 2023, 12(7), 1679; https://doi.org/10.3390/electronics12071679 - 2 Apr 2023
Cited by 1 | Viewed by 1733
Abstract
This paper proposes a modified sensor measurement expression for a moving target defense (MTD) strategy to detect coordinated cyber-physical attacks (CCPAs). Essentially, the MTD defense characteristics for detecting false data injection attacks (FDIAs) differ from those used to detect CCPAs. In the first [...] Read more.
This paper proposes a modified sensor measurement expression for a moving target defense (MTD) strategy to detect coordinated cyber-physical attacks (CCPAs). Essentially, the MTD defense characteristics for detecting false data injection attacks (FDIAs) differ from those used to detect CCPAs. In the first case, the MTD performance in detecting FDIAs at the attack-execution stage is mainly considered, which is generally denoted by the detection probability; however, whether the construction of undetectable CCPAs is disrupted via the MTD strategy used during the attack-preparation stage is the focus of the latter case. There has been little work on the detection of undetectable CCPAs in the context of MTD post-activation. In our work, a novel approach to detecting undetectable CCPAs via a modified sensor measurement expression is proposed. First, the production mechanism for undetectable CCPAs without the application of an MTD strategy is transferred to that which occurs after MTD activation; then, based on an in-depth analysis of the CCPAs’ production mechanism after MTD activation, a novel modified sensor measurement expression is presented to detect undetectable CCPAs. Extensive simulations were conducted on three standard power systems to verify the effectiveness and simplicity of our approach to detecting CCPAs. Full article
(This article belongs to the Topic Cyber-Physical Security for IoT Systems)
Show Figures

Figure 1

17 pages, 5575 KiB  
Article
A Distributed Algorithm for UAV Cluster Task Assignment Based on Sensor Network and Mobile Information
by Jian Yang and Xuejun Huang
Appl. Sci. 2023, 13(6), 3705; https://doi.org/10.3390/app13063705 - 14 Mar 2023
Cited by 8 | Viewed by 2018
Abstract
Cluster formation and task processing are standard features for leveraging the performance of unmanned aerial vehicles (UAVs). As the UAV network is aided by sensors, functions such as clustering, reformation, and autonomous working are adaptively used for dense task processing. In consideration of [...] Read more.
Cluster formation and task processing are standard features for leveraging the performance of unmanned aerial vehicles (UAVs). As the UAV network is aided by sensors, functions such as clustering, reformation, and autonomous working are adaptively used for dense task processing. In consideration of the distributed nature of the UAV network coupled with wireless sensors, this article introduces a Rational Clustering Method (RCM) using dense task neighbor information exchange. The Rational Clustering Method (RCM) is an algorithm for dense task neighbor information exchange that can be used to cluster objects according to their shared properties. Each object’s task neighbors, and the similarities between them, are calculated using this method. Starting with the task density of its neighbors, the RCM algorithm gives each object in the dataset a weight. This information exchange process identifies a UAV units’ completing tasks and free slots. Using this information, high-slot UAVs within the communication range can be grouped as clusters. Unlike wireless sensor clusters, task allocation is performed on the basis of available slots and UAV longevity within the cluster; this prevents task incompletion/failures and delays in a densely populated UAV scenario. Cluster sustainability or dispersion is recommended when using distributed state learning. State learning transits between the pending task and UAV longevity; an intermediate state is defined for task reassignment amid immediate cluster deformation. This triple feature-based distributed method balances tasks between failures, overloading, and idle UAVs. The RCM was verified using task processing rate, completion ratio, reassignment, failures, and delay. Task processing rate was increased by 8.16% and completion ratio was increased by 10.3% with the proposed RCM-IE. Reassignment, failure, and delay were all reduced by 12.5%, 9.87%, and 11.99%, respectively, using this method. Full article
(This article belongs to the Topic Cyber-Physical Security for IoT Systems)
Show Figures

Figure 1

14 pages, 501 KiB  
Article
Robustness Assessment of Cyber–Physical System with Different Interdependent Mechanisms
by Peixiang Wang, Qianyi Wang, Haicheng Tu and Yongxiang Xia
Electronics 2023, 12(5), 1093; https://doi.org/10.3390/electronics12051093 - 22 Feb 2023
Cited by 4 | Viewed by 1536
Abstract
Cyber–physical systems (CPSs) are a new generation of intelligent system that integrate communication, control and computation functions and are widely used in traditional infrastructure networks, such as power network, transportation network and others. In order to ensure the stable operation and improve the [...] Read more.
Cyber–physical systems (CPSs) are a new generation of intelligent system that integrate communication, control and computation functions and are widely used in traditional infrastructure networks, such as power network, transportation network and others. In order to ensure the stable operation and improve the robustness of CPSs, the studies of robustness assessment have attracted much attention from academia. However, previous models assume that the failure propagation conforms to a strongly interdependent relationship, and only consider the interaction between nodes, while ignoring the interaction between nodes and links. In this paper, we develop a novel simulation model with the consideration of both the coupling modes and the failure propagation objects. Based on the simulation model, we study how the interdependent mechanisms, failure propagation probability and protection strategies affect the robustness of CPSs. The simulations of our proposed model are demonstrated in a test CPS formed by coupling two classical complex networks. Compared with previous models, our proposed model shows different performances and comprehensively characterizes the interdependent relationship of CPSs. In detail, disassortative coupling shows the worst performance and the CPS becomes more sensitive to failure propagation when Node–Link is selected as the failure propagation object. In addition, compared to the communication network, the power network is more sensitive to failure propagation. Protecting electrical nodes is a more effective way to strengthen the robustness of CPSs when conservation resources are limited. Our work provides useful advice to operators on how to effectively design and protect a CPS. Full article
(This article belongs to the Topic Cyber-Physical Security for IoT Systems)
Show Figures

Figure 1

20 pages, 5022 KiB  
Article
Multiplicative Attacks with Essential Stealthiness in Sensor and Actuator Loops against Cyber-Physical Systems
by Jingzhao Chen, Bin Liu, Tengfei Li and Yong Hu
Sensors 2023, 23(4), 1957; https://doi.org/10.3390/s23041957 - 9 Feb 2023
Cited by 2 | Viewed by 1531
Abstract
Stealthy attacks in sensor and actuator loops are the research priorities in the security of cyber-physical systems. Existing attacks define the stealthiness conditions against the Chi-square or Kullback-Leibler divergence detectors and parameterize the attack model based on additive signals. Such conditions ignore the [...] Read more.
Stealthy attacks in sensor and actuator loops are the research priorities in the security of cyber-physical systems. Existing attacks define the stealthiness conditions against the Chi-square or Kullback-Leibler divergence detectors and parameterize the attack model based on additive signals. Such conditions ignore the potential anomalies of the vulnerable outputs in the control layer, and the attack sequences need to be generated online, increasing the hardware and software costs. This paper investigates a type of multiplicative attack with essential stealthiness where the employed model is a novel form. The advantage is that the parameters can be designed in a constant form without having to be generated online. An essential stealthiness condition is proposed for the first time and complements the existing ones. Two sufficient conditions for the existence of constant attack matrices are given in the form of theorems, where two methods for decoupling the unknown variables are particularly considered. A quadruple-tank process, an experimental platform for attack and defense, is developed to verify the theoretical results. The experiments indicate that the proposed attack strategy can fulfill both the attack performance and stealthiness conditions. Full article
(This article belongs to the Topic Cyber-Physical Security for IoT Systems)
Show Figures

Figure 1

Back to TopTop