scholarly journals Key Establishment Algorithm for Secure Cyber Physical System to Prevent Cyber Attacks

Extensive research effort is going on to contribute to the Cyber Physical system (CPS). It will create a physical system capable of computation, communication and sharing information between physical devices. Physical devices become smart devices because of CPS. CPS are engineered systems that are built with sensors, microcontrollers which performs computation, communication, control, process and analysis of physical objects. CPS playing important role in smart cities, home automations and other applications. Due to resource constraints like low processing power and low storage space there is a lack of standard security mechanism which can provide adequate security in CPS. In the research paper, we proposed Key establishment mechanism which prevents CPS from cyber-attacks. The goal of this research paper are six -folds: i) to give a detailed overview of cyber physical system. ii) To study architecture of CPS. iii) To study different attacks on CPS with attack points. iv)Application areas of CPS v) security threats in CPS vi) Key establishment algorithm to prevent cyber-attacks in CPS.

2021 ◽  
Author(s):  
Sandip Thite ◽  
J. Naveenkumar

In recent years extensive research is going on for the development of applications which convert physical devices into smart devices. Industry 4.0 adopt the technologies under Cyber Physical Systems (CPS) for the development of such types of smart devices. Increase in the use of such type of smart devices without any security mechanism causes an open invitation for cyber attackers to perform cyber-attacks on such devices. Even current security algorithms are not efficiently work due to some constraints of smart devices. The goal of this research paper is to provide effective solution against different cyber-attacks on CPS applications. This paper proposed session key-based security mechanism which is used for the prevention of cyber-attacks and authentication of cyber devices.


2015 ◽  
Vol 70 ◽  
pp. 238-244 ◽  
Author(s):  
Hemangi Laxman Gawand ◽  
A.K. Bhattacharjee ◽  
Kallol Roy

2020 ◽  
Vol 9 (4) ◽  
pp. 41-48
Author(s):  
Ajaya K. Tripathy ◽  
Pradyumna K. Tripathy ◽  
Ambarish G. Mohapatra ◽  
Niranjan K. Ray ◽  
Saraju P. Mohanty

Complexity ◽  
2021 ◽  
Vol 2021 ◽  
pp. 1-15
Author(s):  
Xin-Rui Liu ◽  
Yuan Meng ◽  
Peng Chang

The study of cyber-attacks, and in particular the spread of attack on the power cyber-physical system, has recently attracted considerable attention. Identifying and evaluating the important nodes under the cyber-attack propagation scenario are of great significance for improving the reliability and survivability of the power system. In this paper, we improve the closeness centrality algorithm and propose a compound centrality algorithm based on adaptive coefficient to evaluate the importance of single-layer network nodes. Moreover, we quantitatively calculated the decouple degree of cascading failures caused by exposed nodes formed by attack propagation. At last, experiments based on the IEEE 57 test system show that the proposed compound centrality algorithm can match the cyber-attack propagation scenario well, and we give the importance values of the nodes in a specific attack scenario.


Sign in / Sign up

Export Citation Format

Share Document