Critical Nodes Detection in IoT-Based Cyber-Physical Systems

2022 ◽  
pp. 226-239
Author(s):  
Onur Ugurlu ◽  
Nusin Akram ◽  
Vahid Khalilpour Akram

The new generation of fast, small, and energy-efficient devices that can connect to the internet are already used for different purposes in healthcare, smart homes, smart cities, industrial automation, and entertainment. One of the main requirements in all kinds of cyber-physical systems is a reliable communication platform. In a wired or wireless network, losing some special nodes may disconnect the communication paths between other nodes. Generally, these nodes, which are called critical nodes, have many undesired effects on the network. The authors focus on three different problems. The first problem is finding the nodes whose removal minimizes the pairwise connectivity in the residual network. The second problem is finding the nodes whose removal maximizes the number of connected components. Finally, the third problem is finding the nodes whose removal minimizes the size of the largest connected component. All three problems are NP-Complete, and the authors provide a brief survey about the existing approximated algorithms for these problems.

Author(s):  
Ismail Butun ◽  
Patrik Österberg

Interfacing the smart cities with cyber-physical systems (CPSs) improves cyber infrastructures while introducing security vulnerabilities that may lead to severe problems such as system failure, privacy violation, and/or issues related to data integrity if security and privacy are not addressed properly. In order for the CPSs of smart cities to be designed with proactive intelligence against such vulnerabilities, anomaly detection approaches need to be employed. This chapter will provide a brief overview of the security vulnerabilities in CPSs of smart cities. Following a thorough discussion on the applicability of conventional anomaly detection schemes in CPSs of smart cities, possible adoption of distributed anomaly detection systems by CPSs of smart cities will be discussed along with a comprehensive survey of the state of the art. The chapter will discuss challenges in tailoring appropriate anomaly detection schemes for CPSs of smart cities and provide insights into future directions for the researchers working in this field.


Author(s):  
Vijey Thayananthan ◽  
Javad Yazdani

The main aim of this strategic research proposal is to develop a model of secure transportation system using efficient CPS which not only reduce the unnecessary accident rates but also increase safety system that enhances the livability of smart cities and Industry 4.0. Although the main focus is efficient security solutions, dynamic and intelligent approaches of the future security solutions will be able to detect the evolving threats and cyberattacks during the data or signal transmission between the users and service providers.


Author(s):  
Dmitry Namiot ◽  
Manfred Sneps-Sneppe

This chapter describes proposals for organizing university programs on the internet of things (IoT) and cyber-physical systems. The final goal is to provide a structure for a basic educational course for the internet of things and related areas. This base (template) could be used both for direct training and for building other courses, including those that are more deeply specialized in selected areas. For related areas, the authors see, for example, machine-to-machine communications and data-driven cities (smart cities) development. Obviously, the internet of things skills are in high demand nowadays, and, of course, IoT models, architectures, as well as appropriate data proceedings elements should be presented in the university courses. The purpose of the described educational course is to cover information and communication technologies used in the internet of things systems and related areas. Also, the authors discuss big data and AI issues for IoT courses and highlight the importance of data engineering.


Electronics ◽  
2019 ◽  
Vol 8 (7) ◽  
pp. 738 ◽  
Author(s):  
Francisco Pozo ◽  
Guillermo Rodriguez-Navas ◽  
Hans Hansson

Future cyber–physical systems may extend over broad geographical areas, like cities or regions, thus, requiring the deployment of large real-time networks. A strategy to guarantee predictable communication over such networks is to synthesize an offline time-triggered communication schedule. However, this synthesis problem is computationally hard (NP-complete), and existing approaches do not scale satisfactorily to the required network sizes. This article presents a segmented offline synthesis method which substantially reduces this limitation, being able to generate time-triggered schedules for large hybrid (wired and wireless) networks. We also present a series of algorithms and optimizations that increase the performance and compactness of the obtained schedules while solving some of the problems inherent to segmented approaches. We evaluate our approach on a set of realistic large-size multi-hop networks, significantly larger than those considered in the existing literature. The results show that our segmentation reduces the synthesis time by up to two orders of magnitude.


Electronics ◽  
2019 ◽  
Vol 8 (11) ◽  
pp. 1220 ◽  
Author(s):  
Xiaogang Zhu ◽  
Gautam Srivastava ◽  
Reza M. Parizi

The new developments in smart cyber-physical systems can be shown to include smart cities, Internet of things (IoT), and for the most part smart anything. To improve the security of sensitive personal information (SPI) in cyber-physical systems, we present some novel ideas related to the encryption of SPI. Currently, there are issues in traditional encryption methods, such as low speed of information acquisition, low recognition rate, low utilization rate of effective information resources, and high delay of information query. To address these issues, we propose a novel efficient encryption algorithm for the security of incremental SPI. First, our proposed method analyzes user information resources and determines valid data to be encrypted. Next, it uses adaptive acquisition methods to collect information, and uses our encryption method to complete secure encryption of SPI according to the acquisition results. Our experimental analysis clearly shows that the algorithm effectively improves the speed of information acquisition as well as effective information recognition rate, thus enhancing the security of SPI. The encryption model in turn can provide a strong guarantee for user information security.


Author(s):  
Francisco Pozo ◽  
Guillermo Rodriguez-Navas ◽  
Hans Hansson

Future cyber-physical systems may extend over broad geographical areas, like cities or regions, thus requiring the deployment of large real-time networks. A strategy to guarantee predictable communication over such networks is to synthesize an offline time-triggered communication schedule. However, this synthesis problem is computationally hard (NP-complete), and existing approaches do not scale satisfactorily to the required network sizes. This article presents a segmented offline synthesis method which substantially reduces this limitation, being able to generate time-triggered schedules for large hybrid (wired and wireless) networks. We also present a series of algorithms and optimizations that increase the performance and compactness of the obtained schedules while solving some of the problems inherent to segmented approaches. We evaluate our approach on a set of realistic large-size multi-hop networks, significantly larger than those considered in the existing literature. The results show that our segmentation reduces the synthesis time up to two orders of magnitude.


Author(s):  
Thomas J Byrne ◽  
Aleksandr Doikin ◽  
Felician Campean ◽  
Daniel Neagu

AbstractAdvancing Industry 4.0 concepts by mapping the product of the automotive industry on the spectrum of Cyber Physical Systems, we immediately recognise the convoluted processes involved in the design of new generation vehicles. New technologies developed around the communication core (IoT) enable novel interactions with data. Our framework employs previously untapped data from vehicles in the field for intelligent vehicle health management and knowledge integration into design. Firstly, the concept of an inter-disciplinary artefact is introduced to support the dynamic alignment of disparate functions, so that cyber variables change when physical variables change. Secondly, the axiomatic categorisation (AC) framework simulates functional transformations from artefact to artefact, to monitor and control automotive systems rather than components. Herein, an artefact is defined as a triad of the physical and engineered component, the information processing entity, and communication devices at their interface. Variable changes are modelled using AC, in conjunction with the artefacts, to aggregate functional transformations within the conceptual boundary of a physical system of systems.


In three specific model instantiations, this chapter demonstrates how URANOS can be applied to other research domains. The first instantiation, referred to as the body-mind continuum, addresses humans as holistic and spiritual beings embedded in their natural, informational and socio-cultural environments. The second instantiation provides a framework for integral thinking and designing based on the AQAL-model from K. Wilber (2007). The third instantiation addresses holistic and cognitive coordination processes in the context of multi-agent and cyber-physical systems. These three instantiations together build the core of our human-centered modeling approach. Each of them holds our generic system model at its core, but at the same time has its own specific extensions.


2019 ◽  
Vol 76 (4) ◽  
pp. 2643-2664 ◽  
Author(s):  
Steven Walker-Roberts ◽  
Mohammad Hammoudeh ◽  
Omar Aldabbas ◽  
Mehmet Aydin ◽  
Ali Dehghantanha

Abstract Disruptive innovations of the last few decades, such as smart cities and Industry 4.0, were made possible by higher integration of physical and digital elements. In today’s pervasive cyber-physical systems, connecting more devices introduces new vulnerabilities and security threats. With increasing cybersecurity incidents, cybersecurity professionals are becoming incapable of addressing what has become the greatest threat climate than ever before. This research investigates the spectrum of risk of a cybersecurity incident taking place in the cyber-physical-enabled world using the VERIS Community Database. The findings were that the majority of known actors were from the US and Russia, most victims were from western states and geographic origin tended to reflect global affairs. The most commonly targeted asset was information, with the majority of attack modes relying on privilege abuse. The key feature observed was extensive internal security breaches, most often a result of human error. This tends to show that access in any form appears to be the source of vulnerability rather than incident specifics due to a fundamental trade-off between usability and security in the design of computer systems. This provides fundamental evidence of the need for a major reevaluation of the founding principles in cybersecurity.


Sign in / Sign up

Export Citation Format

Share Document