physical system
Recently Published Documents


TOTAL DOCUMENTS

2012
(FIVE YEARS 880)

H-INDEX

47
(FIVE YEARS 13)

Author(s):  
Ms. Keerti Dixit

Abstract: Cyber-physical systems are the systems that combine the physical world with the world of information processing. CPS involves interaction between heterogeneous components that include electronic chips, software systems, sensors and actuators. It makes the CPS vulnerable to attacks. How to deal with the attacks in CPSs has become a research hotspot. In this paper we have study the Architecture of CPS and various security threats at each layer of the archicture of CPS. We have also developed attack taxonomy for CPS. Keywords: Cyber Physical System, Threat, Attack


Mathematics ◽  
2022 ◽  
Vol 10 (2) ◽  
pp. 271
Author(s):  
Vassilis G. Kaburlasos

By “model”, we mean a mathematical description of a world aspect [...]


Author(s):  
Zhiwen Wang ◽  
Bin Zhang ◽  
Xiangnan Xu ◽  
Usman ◽  
Long Li

This paper investigates the security control problem of the cyber-physical system under false data injection attacks. A model predictive switching control strategy based on attack perception is proposed to compensate for the untrusted sequence of data caused by false data injection attacks. First, the binary attack detector is applied whether the system has suffered the attack. If the attack occurs, multistep correction is carried out for the future data according to the previous time data, and the waiting period [Formula: see text] is set. The input and output sequence of the controller is reconstructed, and the system is modeled as a constant time-delay switched system. Subsequently, the Lyapunov methods and average-dwell time are combined to provide sufficient conditions for the asymptotical stability of closed-loop switched system. Finally, the simulation of the networked first-order inverted pendulum model reveals that the control technique can efficiently suppress the influence of the attacks.


2022 ◽  
Vol 9 ◽  
Author(s):  
Helin Gong ◽  
Zhang Chen ◽  
Qing Li

The generalized empirical interpolation method (GEIM) can be used to estimate the physical field by combining observation data acquired from the physical system itself and a reduced model of the underlying physical system. In presence of observation noise, the estimation error of the GEIM is blurred even diverged. We propose to address this issue by imposing a smooth constraint, namely, to constrain the H1 semi-norm of the reconstructed field of the reduced model. The efficiency of the approach, which we will call the H1 regularization GEIM (R-GEIM), is illustrated by numerical experiments of a typical IAEA benchmark problem in nuclear reactor physics. A theoretical analysis of the proposed R-GEIM will be presented in future works.


2022 ◽  
pp. 141-155
Author(s):  
Zia ur Rehman ◽  
Saud Altaf ◽  
Saleem Iqbal ◽  
Khalid Hussain ◽  
Kashif Sattar

2022 ◽  
Vol 70 (1) ◽  
pp. 653-668
Author(s):  
Sadia Ali ◽  
Yaser Hafeez ◽  
Muhammad Bilal ◽  
Saqib Saeed ◽  
Kyung Sup Kwak

2022 ◽  
pp. 1-30
Author(s):  
Viacheslav Izosimov ◽  
Martin Törngren

Our societal infrastructure is transforming into a connected cyber-physical system of systems, providing numerous opportunities and new capabilities, yet also posing new and reinforced risks that require explicit consideration. This chapter addresses risks specifically related to cyber-security. One contributing factor, often neglected, is the level of security education of the users. Another factor, often overlooked, concerns security-awareness of the engineers developing cyber-physical systems. Authors present results of interviews with developers and surveys showing that increase in security-awareness and understanding of security risks, evaluated as low, are the first steps to mitigate the risks. Authors also conducted practical evaluation investigating system connectivity and vulnerabilities in complex multi-step attack scenarios. This chapter advocates that security awareness of users and developers is the foundation to deployment of interconnected system of systems, and provides recommendations for steps forward highlighting the roles of people, organizations and authorities.


Sign in / Sign up

Export Citation Format

Share Document