期刊文献+
共找到1,164,503篇文章
< 1 2 250 >
每页显示 20 50 100
Distributed dynamic event-based finite-time dissipative synchronization control for semi-Markov switched fuzzy cyber-physical systems against random packet losses
1
作者 伍锡如 张煜翀 +1 位作者 张畑畑 张斌磊 《Chinese Physics B》 SCIE EI CAS CSCD 2023年第10期328-342,共15页
This paper is concerned with the finite-time dissipative synchronization control problem of semi-Markov switched cyber-physical systems in the presence of packet losses, which is constructed by the Takagi–Sugeno fuzz... This paper is concerned with the finite-time dissipative synchronization control problem of semi-Markov switched cyber-physical systems in the presence of packet losses, which is constructed by the Takagi–Sugeno fuzzy model. To save the network communication burden, a distributed dynamic event-triggered mechanism is developed to restrain the information update. Besides, random packet dropouts following the Bernoulli distribution are assumed to occur in sensor to controller channels, where the triggered control input is analyzed via an equivalent method containing a new stochastic variable. By establishing the mode-dependent Lyapunov–Krasovskii functional with augmented terms, the finite-time boundness of the error system limited to strict dissipativity is studied. As a result of the help of an extended reciprocally convex matrix inequality technique, less conservative criteria in terms of linear matrix inequalities are deduced to calculate the desired control gains. Finally, two examples in regard to practical systems are provided to display the effectiveness of the proposed theory. 展开更多
关键词 cyber-physical systems finite-time synchronization distributed dynamic event-triggered mechanism random packet losses
下载PDF
Stochastic Models to Mitigate Sparse Sensor Attacks in Continuous-Time Non-Linear Cyber-Physical Systems
2
作者 Borja Bordel Sánchez Ramón Alcarria Tomás Robles 《Computers, Materials & Continua》 SCIE EI 2023年第9期3189-3218,共30页
Cyber-Physical Systems are very vulnerable to sparse sensor attacks.But current protection mechanisms employ linear and deterministic models which cannot detect attacks precisely.Therefore,in this paper,we propose a n... Cyber-Physical Systems are very vulnerable to sparse sensor attacks.But current protection mechanisms employ linear and deterministic models which cannot detect attacks precisely.Therefore,in this paper,we propose a new non-linear generalized model to describe Cyber-Physical Systems.This model includes unknown multivariable discrete and continuous-time functions and different multiplicative noises to represent the evolution of physical processes and randomeffects in the physical and computationalworlds.Besides,the digitalization stage in hardware devices is represented too.Attackers and most critical sparse sensor attacks are described through a stochastic process.The reconstruction and protectionmechanisms are based on aweighted stochasticmodel.Error probability in data samples is estimated through different indicators commonly employed in non-linear dynamics(such as the Fourier transform,first-return maps,or the probability density function).A decision algorithm calculates the final reconstructed value considering the previous error probability.An experimental validation based on simulation tools and real deployments is also carried out.Both,the new technology performance and scalability are studied.Results prove that the proposed solution protects Cyber-Physical Systems against up to 92%of attacks and perturbations,with a computational delay below 2.5 s.The proposed model shows a linear complexity,as recursive or iterative structures are not employed,just algebraic and probabilistic functions.In conclusion,the new model and reconstructionmechanism can protect successfully Cyber-Physical Systems against sparse sensor attacks,even in dense or pervasive deployments and scenarios. 展开更多
关键词 cyber-physical systems sparse sensor attack non-linear models stochastic models security
下载PDF
Aquila Optimization with Machine Learning-Based Anomaly Detection Technique in Cyber-Physical Systems
3
作者 A.Ramachandran K.Gayathri +1 位作者 Ahmed Alkhayyat Rami Q.Malik 《Computer Systems Science & Engineering》 SCIE EI 2023年第8期2177-2194,共18页
Cyber-physical system(CPS)is a concept that integrates every computer-driven system interacting closely with its physical environment.Internet-of-things(IoT)is a union of devices and technologies that provide universa... Cyber-physical system(CPS)is a concept that integrates every computer-driven system interacting closely with its physical environment.Internet-of-things(IoT)is a union of devices and technologies that provide universal interconnection mechanisms between the physical and digital worlds.Since the complexity level of the CPS increases,an adversary attack becomes possible in several ways.Assuring security is a vital aspect of the CPS environment.Due to the massive surge in the data size,the design of anomaly detection techniques becomes a challenging issue,and domain-specific knowledge can be applied to resolve it.This article develops an Aquila Optimizer with Parameter Tuned Machine Learning Based Anomaly Detection(AOPTML-AD)technique in the CPS environment.The presented AOPTML-AD model intends to recognize and detect abnormal behaviour in the CPS environment.The presented AOPTML-AD framework initially pre-processes the network data by converting them into a compatible format.Besides,the improved Aquila optimization algorithm-based feature selection(IAOA-FS)algorithm is designed to choose an optimal feature subset.Along with that,the chimp optimization algorithm(ChOA)with an adaptive neuro-fuzzy inference system(ANFIS)model can be employed to recognise anomalies in the CPS environment.The ChOA is applied for optimal adjusting of the membership function(MF)indulged in the ANFIS method.The performance validation of the AOPTML-AD algorithm is carried out using the benchmark dataset.The extensive comparative study reported the better performance of the AOPTML-AD technique compared to recent models,with an accuracy of 99.37%. 展开更多
关键词 Machine learning industry 4.0 cyber-physical systems anomaly detection aquila optimizer
下载PDF
Abusive adversarial agents and attack strategies in cyber-physical systems
4
作者 Viraj Singh Gaur Vishal Sharma John McAllister 《CAAI Transactions on Intelligence Technology》 SCIE EI 2023年第1期149-165,共17页
The exponential increase in IoT device usage has spawned numerous cyberspace innovations.IoT devices,sensors,and actuators bridge the gap between physical processes and the cyber network in a cyber-physical system(CPS... The exponential increase in IoT device usage has spawned numerous cyberspace innovations.IoT devices,sensors,and actuators bridge the gap between physical processes and the cyber network in a cyber-physical system(CPS).Cyber-physical system is a complex system from a security perspective due to the heterogeneous nature of its components and the fact that IoT devices can serve as an entry point for cyberattacks.Most adversaries design their attack strategies on systems to gain an advantage at a relatively lower cost,whereas abusive adversaries initiate an attack to inflict maximum damage without regard to cost or reward.In this paper,a sensor spoofing attack is modelled as a malicious adversary attempting to cause system failure by interfering with the feedback control mechanism.It is accomplished by feeding spoofed sensor values to the controller and issuing erroneous commands to the actuator.Experiments on a Simulink-simulated linear CPS support the proof of concept for the proposed abusive ideology,demonstrating three attack strategies.The impact of the evaluations stresses the importance of testing the CPS security against adversaries with abusive settings for preventing cyber-vandalism.Finally,the research concludes by highlighting the limitations of the proposed work,followed by recommendations for the future. 展开更多
关键词 intelligent systems SECURITY security evaluation
下载PDF
Chaotic Sandpiper Optimization Based Virtual Machine Scheduling for Cyber-Physical Systems
5
作者 P.Ramadevi T.Jayasankar +1 位作者 V.Dinesh M.Dhamodaran 《Computer Systems Science & Engineering》 SCIE EI 2023年第2期1373-1385,共13页
Recently,with the growth of cyber physical systems(CPS),several applications have begun to deploy in the CPS for connecting the cyber space with the physical scale effectively.Besides,the cloud computing(CC)enabled CP... Recently,with the growth of cyber physical systems(CPS),several applications have begun to deploy in the CPS for connecting the cyber space with the physical scale effectively.Besides,the cloud computing(CC)enabled CPS offers huge processing and storage resources for CPS thatfinds helpful for a range of application areas.At the same time,with the massive development of applica-tions that exist in the CPS environment,the energy utilization of the cloud enabled CPS has gained significant interest.For improving the energy effective-ness of the CC platform,virtualization technologies have been employed for resource management and the applications are executed via virtual machines(VMs).Since effective scheduling of resources acts as an important role in the design of cloud enabled CPS,this paper focuses on the design of chaotic sandpi-per optimization based VM scheduling(CSPO-VMS)technique for energy effi-cient CPS.The CSPO-VMS technique is utilized for searching for the optimum VM migration solution and it helps to choose an effective scheduling strategy.The CSPO algorithm integrates the concepts of traditional SPO algorithm with the chaos theory,which substitutes the main parameter and combines it with the chaos.In order to improve the process of determining the global optimum solutions and convergence rate of the SPO algorithm,the chaotic concept is included in the SPO algorithm.The CSPO-VMS technique also derives afitness function to choose optimal scheduling strategy in the CPS environment.In order to demonstrate the enhanced performance of the CSPO-VMS technique,a wide range of simulations were carried out and the results are examined under varying aspects.The simulation results ensured the improved performance of the CSPO-VMS technique over the recent methods interms of different measures. 展开更多
关键词 Resource scheduling cyber physical systems cloud computing VM migration energy efficiency
下载PDF
A Comprehensive Overview of Cyber-Physical Systems: From Perspective of Feedback System 被引量:14
6
作者 Xinping Guan Bo Yang +2 位作者 Cailian Chen Wenbin Dai Yiyin Wang 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI 2016年第1期1-14,共14页
Cyber-physical systems(CPS) are characterized by integrating cybernetic and physical processes. The theories and applications of CPS face the enormous challenges. The aim of this paper is to provide a latest understan... Cyber-physical systems(CPS) are characterized by integrating cybernetic and physical processes. The theories and applications of CPS face the enormous challenges. The aim of this paper is to provide a latest understanding of this emerging multi-disciplinary methodology. First, the features of CPS are described, and the research progresses are summarized from different components in CPS, such as system modeling,information acquisition, communication, control and security.Each part is also followed by the future directions. Then some typical applications are given to show the prospects of CPS. 展开更多
关键词 cyber-physical systems(CPS) system modeling information acquisition COMMUNICATION control SECURITY
下载PDF
Review on Cyber-physical Systems 被引量:9
7
作者 Yang Liu Yu Peng +2 位作者 Bailing Wang Sirui Yao Zihe Liu 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2017年第1期27-40,共14页
Cyber-physical systems(CPS) are complex systems with organic integration and in-depth collaboration of computation, communications and control(3C) technology. Subject to the theory and technology of existing network s... Cyber-physical systems(CPS) are complex systems with organic integration and in-depth collaboration of computation, communications and control(3C) technology. Subject to the theory and technology of existing network systems and physical systems, the development of CPS is facing enormous challenges.This paper first introduces the concept and characteristics of CPS and analyzes the present situation of CPS researches. Then the development of CPS is discussed from perspectives of system model, information processing technology and software design.At last it analyzes the main obstacles and key researches in developing CPS. 展开更多
关键词 cyber-physical systems(CPS) information processing software design system model
下载PDF
Analysis of cascading failures of power cyber-physical systems considering false data injection attacks 被引量:4
8
作者 Jian Li Chaowei Sun Qingyu Su 《Global Energy Interconnection》 CAS CSCD 2021年第2期204-213,共10页
This study considers the performance impacts of false data injection attacks on the cascading failures of a power cyber-physical system,and identifies vulnerable nodes.First,considering the monitoring and control func... This study considers the performance impacts of false data injection attacks on the cascading failures of a power cyber-physical system,and identifies vulnerable nodes.First,considering the monitoring and control functions of a cyber network and power flow characteristics of a power network,a power cyber-physical system model is established.Then,the influences of a false data attack on the decision-making and control processes of the cyber network communication processes are studied,and a cascading failure analysis process is proposed for the cyber-attack environment.In addition,a vulnerability evaluation index is defined from two perspectives,i.e.,the topology integrity and power network operation characteristics.Moreover,the effectiveness of a power flow betweenness assessment for vulnerable nodes in the cyberphysical environment is verified based on comparing the node power flow betweenness and vulnerability assessment index.Finally,an IEEE14-bus power network is selected for constructing a power cyber-physical system.Simulations show that both the uplink communication channel and downlink communication channel suffer from false data attacks,which affect the ability of the cyber network to suppress the propagation of cascading failures,and expand the scale of the cascading failures.The vulnerability evaluation index is calculated for each node,so as to verify the effectiveness of identifying vulnerable nodes based on the power flow betweenness. 展开更多
关键词 Power cyber-physical systems False date injection attack Cascading failure VULNERABILITY Power flow betweenness.
下载PDF
Cyber-Physical Systems as General Distributed Parameter Systems:Three Types of Fractional Order Models and Emerging Research Opportunities 被引量:2
9
作者 Fudong Ge YangQuan Chen Chunhai Kou 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI 2015年第4期353-357,共5页
Cyber-physical systems(CPSs) are man-made complex systems coupled with natural processes that, as a whole,should be described by distributed parameter systems(DPSs) in general forms. This paper presents three such gen... Cyber-physical systems(CPSs) are man-made complex systems coupled with natural processes that, as a whole,should be described by distributed parameter systems(DPSs) in general forms. This paper presents three such general models for generalized DPSs that can be used to characterize complex CPSs. These three different types of fractional operators based DPS models are: fractional Laplacian operator, fractional power of operator or fractional derivative. This research investigation is motivated by many fractional order models describing natural, physical, and anomalous phenomena, such as sub-diffusion process or super-diffusion process. The relationships among these three different operators are explored and explained. Several potential future research opportunities are then articulated followed by some conclusions and remarks. 展开更多
关键词 cyber-physical systems(CPSs) generalized distributed parameter systems(DPSs) fractional Laplacian operator fractional power of operator fractional derivative
下载PDF
Passivity-Based Robust Control Against Quantified False Data Injection Attacks in Cyber-Physical Systems 被引量:1
10
作者 Yue Zhao Ze Chen +2 位作者 Chunjie Zhou Yu-Chu Tian Yuanqing Qin 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2021年第8期1440-1450,共11页
Secure control against cyber attacks becomes increasingly significant in cyber-physical systems(CPSs).False data injection attacks are a class of cyber attacks that aim to compromise CPS functions by injecting false d... Secure control against cyber attacks becomes increasingly significant in cyber-physical systems(CPSs).False data injection attacks are a class of cyber attacks that aim to compromise CPS functions by injecting false data such as sensor measurements and control signals.For quantified false data injection attacks,this paper establishes an effective defense framework from the energy conversion perspective.Then,we design an energy controller to dynamically adjust the system energy changes caused by unknown attacks.The designed energy controller stabilizes the attacked CPSs and ensures the dynamic performance of the system by adjusting the amount of damping injection.Moreover,with the disturbance attenuation technique,the burden of control system design is simplified because there is no need to design an attack observer.In addition,this secure control method is simple to implement because it avoids complicated mathematical operations.The effectiveness of our control method is demonstrated through an industrial CPS that controls a permanent magnet synchronous motor. 展开更多
关键词 cyber-physical systems energy controller energy conversion false data injection attacks L2 disturbance attenuation technology
下载PDF
A Security Enhancement Model Based on Switching Edge Strategy in Interdependent Heterogeneous Cyber-Physical Systems 被引量:1
11
作者 Dandan Zhao Can Liu +4 位作者 Guangquan Xu Zhiguo Ding Hao Peng Juan Yu Jianmin Han 《China Communications》 SCIE CSCD 2022年第2期158-173,共16页
With the advent of cross-domain interconnection,large-scale sensor network systems such as smart grids,smart homes,and intelligent transportation have emerged.These complex network systems often have a CPS(Cyber-Physi... With the advent of cross-domain interconnection,large-scale sensor network systems such as smart grids,smart homes,and intelligent transportation have emerged.These complex network systems often have a CPS(Cyber-Physical System)architecture and are usually composed of multiple interdependent systems.Minimal faults between interdependent networks may cause serious cascading failures between the entire system.Therefore,in this paper,we will explore the robustness detection schemes for interdependent networks.Firstly,by calculating the largest giant connected component in the entire system,the security of interdependent network systems under different attack models is analyzed.Secondly,a comparative analysis of the cascade failure mechanism between interdependent networks under the edge enhancement strategy is carried out.Finally,the simulation results verify the impact of system reliability under different handover edge strategies and show how to choose a better handover strategy to enhance its robustness.The further research work in this paper can also help design how to reduce the interdependence between systems,thereby further optimizing the interdependent network system’s structure to provide practical support for reducing the cascading failures.In the later work,we hope to explore our proposed strategies in the network model of real-world or close to real networks. 展开更多
关键词 security enhancement switching edge strategy interdependent systems cyber-physical systems
下载PDF
Guest Editorial for Special Issue on Cyber-Physical Systems
12
作者 Youxian Sun Xinping Guan +1 位作者 Jiming Chen Yilin Mo 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI 2015年第3期233-234,共2页
Ⅰ.Introduction CYBER-PHYSICAL system is a system of collaborating computational elements to control physical entities.The coordination and the tight link between computational,virtual and physical resources in cyber-... Ⅰ.Introduction CYBER-PHYSICAL system is a system of collaborating computational elements to control physical entities.The coordination and the tight link between computational,virtual and physical resources in cyber-physical system will have a pervasive effect on our everyday life.The development of cyber-physical system will create new opportunities for the introduction of services that will enhance the quality of life 展开更多
关键词 for WSAN Guest Editorial for Special Issue on cyber-physical systems of into on WSN IS
下载PDF
A Triple Human-Digital Twin Architecture for Cyber-Physical Systems
13
作者 Duansen Shangguan Liping Chen +2 位作者 Chang Su Jianwan Ding Chan Liu 《Computer Modeling in Engineering & Sciences》 SCIE EI 2022年第6期1557-1578,共22页
With the development of information and communication technology and the advent of the Internet of Things(IoT)era,cyber-physical system(CPS)is becoming the trend of products or systems.The deep integration and real-ti... With the development of information and communication technology and the advent of the Internet of Things(IoT)era,cyber-physical system(CPS)is becoming the trend of products or systems.The deep integration and real-time interaction between the physical world and the virtual world expand system functions.Although there are some CPS implementation guidelines,the virtual world is still relatively abstract compared to the concrete physical world that can be touched through the IoT.Besides that,human is a non-negligible CPS endogenous interactive intelligent component.In this paper,we propose a triple human-digital twin architecture,where the physical objects and the digital twins that are the projections of the physical entities establish the cornerstone of human functioning together.And the hierarchically distributed digital twins grow dynamically with the physical entities along the lifecycle.Furthermore,the interaction and collaboration among the physical objects,the digital twins,and the humans in their respective worlds(the expected world,the interpreted world,and the physical world)integrate the full value chain of the products in anticipation of seamless synergy.Finally,we present a power management digital companion platform for the lunar probe to demonstrate the efficacy of the architecture. 展开更多
关键词 cyber-physical systems digital twin human factors systems architecture COLLABORATION
下载PDF
Topology-Based and Event-Oriented Approach to Simulation of Cyber-Physical Systems
14
作者 郑君玺 张平 +2 位作者 金培根 李方 杜广龙 《Journal of Donghua University(English Edition)》 EI CAS 2016年第6期991-996,共6页
A simulation model for cyber-physical systems(CPSs)was presented.The model was developed by the method of combination of topology-based and event-oriented that could be used to simulate systems with routing flexibilit... A simulation model for cyber-physical systems(CPSs)was presented.The model was developed by the method of combination of topology-based and event-oriented that could be used to simulate systems with routing flexibility,service-selection flexibility and service- mode flexibility overall by integrating the strategies related.The validity of the model has been verified by two extensive experiments. 展开更多
关键词 topological-based event-oriented cyber-physical systems discrete event systems simulation model
下载PDF
Simulation of Cyber-Physical Systems of Systems: Some Research Areas-Computational Understanding, Awareness, and Wisdom 被引量:2
15
作者 Tuncer Oren 《系统仿真学报》 CAS CSCD 北大核心 2018年第2期363-385,共23页
After a brief emphasis about the interconnected world, including Cyber-Physical Systems of Systems, the increasing importance of the decision-making by autonomous, quasi-autonomous, and autonomic systems is emphasised... After a brief emphasis about the interconnected world, including Cyber-Physical Systems of Systems, the increasing importance of the decision-making by autonomous, quasi-autonomous, and autonomic systems is emphasised. Promising roles of computational understanding, computational awareness, and computational wisdom for better autonomous decision-making are outlined. The contributions of simulation-based approaches are listed. 展开更多
关键词 cyber-physical systems of systems decision-making by autonomous andautonomic systems COMPUTATIONAL UNDERSTANDING COMPUTATIONAL AWARENESS COMPUTATIONAL WISDOM simulation-based knowledge processing
下载PDF
Water Supply Networks as Cyber-physical Systems and Controllability Analysis 被引量:5
16
作者 Yongsong Wei Shaoyuan Li 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI 2015年第3期313-319,共7页
Cyber-physical systems(CPS) is a system of systems which consists of many subsystems that can stand alone in an individual manner and can be taken as a typical complex network.CPS can be applied in the critical infras... Cyber-physical systems(CPS) is a system of systems which consists of many subsystems that can stand alone in an individual manner and can be taken as a typical complex network.CPS can be applied in the critical infrastructures such as water supply networks,energy supply systems,and so on.In this paper,we analyze the structure of modern city water supply networks from the view of CPS theory,we use complex network theory to build an undirected and unweighted complex network model for the water supply networks to investigate the structural properties,and present the structure of the water supply networks and detect communities by a spectral analysis of the Laplacian matrix.Then,we analyze the structure and controllability of water supply networks by the structural controllability method.The results show the feasibility and effectiveness of the proposed complex network model. 展开更多
关键词 cyber-physical system(CPS) water supply networks spectral information CONTROLLABILITY
下载PDF
Learning-Based Switched Reliable Control of Cyber-Physical Systems With Intermittent Communication Faults 被引量:1
17
作者 Xin Huang Jiuxiang Dong 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2020年第3期711-724,共14页
This study deals with reliable control problems in data-driven cyber-physical systems(CPSs) with intermittent communication faults, where the faults may be caused by bad or broken communication devices and/or cyber at... This study deals with reliable control problems in data-driven cyber-physical systems(CPSs) with intermittent communication faults, where the faults may be caused by bad or broken communication devices and/or cyber attackers. To solve them, a watermark-based anomaly detector is proposed, where the faults are divided to be either detectable or undetectable.Secondly, the fault's intermittent characteristic is described by the average dwell-time(ADT)-like concept, and then the reliable control issues, under the undetectable faults to the detector, are converted into stabilization issues of switched systems. Furthermore,based on the identifier-critic-structure learning algorithm, a datadriven switched controller with a prescribed-performance-based switching law is proposed, and by the ADT approach, a tolerated fault set is given. Additionally, it is shown that the presented switching laws can improve the system performance degradation in asynchronous intervals, where the degradation is caused by the fault-maker-triggered switching rule, which is unknown for CPS operators. Finally, an illustrative example validates the proposed method. 展开更多
关键词 Adaptive dynamic programming(ADP) communication fault cyber-physical systems(CPSs) DATA-DRIVEN CONTROL RELIABLE CONTROL
下载PDF
Security-aware Signal Packing Algorithm for CAN-based Automotive Cyber-physical Systems 被引量:2
18
作者 Yong Xie Liangjiao Liu +3 位作者 Renfa Li Jianqiang Hu Yong Han Xin Peng 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI 2015年第4期422-430,共9页
Network and software integration pose severe challenges in cyber-security for controller area network(CAN)-based automotive cyber-physical system(ACPS), therefore we employ message authentication code(MAC) to defend C... Network and software integration pose severe challenges in cyber-security for controller area network(CAN)-based automotive cyber-physical system(ACPS), therefore we employ message authentication code(MAC) to defend CAN against masquerade attack, but the consequent bandwidth overhead makes it a necessity to find the tradeoff among security, real-time and bandwidth utilization for signal packing problem(SPP) of CAN.A mixed-security signal model is firstly proposed to formally describe the properties and requirements on security and real-time for signals, and then a mixed-integer linear programming(MILP)formulation of SPP security-aware signal packing(SASP) is implemented to solve the tradeoff problem, where the bandwidth utilization is improved and the requirements in both security and real-time are met. Experiments based on both society of automotive engineers(SAE) standard signal set and simulated signal set showed the effectiveness of SASP by comparing with the state-of-the-art algorithm. 展开更多
关键词 Signal packing SECURITY automotive cyberphysical systems(ACPS) integer linear programming
下载PDF
A Priority-aware Frequency Domain Polling MAC Protocol for OFDMA-based Networks in Cyber-physical Systems 被引量:1
19
作者 Meng Zheng Junru Lin +1 位作者 Wei Liang Haibin Yu 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI 2015年第4期412-421,共10页
Wireless networking in cyber-physical systems(CPSs) is characteristically different from traditional wireless systems due to the harsh radio frequency environment and applications that impose high real-time and reliab... Wireless networking in cyber-physical systems(CPSs) is characteristically different from traditional wireless systems due to the harsh radio frequency environment and applications that impose high real-time and reliability constraints.One of the fundamental considerations for enabling CPS networks is the medium access control protocol. To this end, this paper proposes a novel priority-aware frequency domain polling medium access control(MAC) protocol, which takes advantage of an orthogonal frequency-division multiple access(OFDMA)physical layer to achieve instantaneous priority-aware polling.Based on the polling result, the proposed work then optimizes the resource allocation of the OFDMA network to further improve the data reliability. Due to the non-polynomial-complete nature of the OFDMA resource allocation, we propose two heuristic rules,based on which an efficient solution algorithm to the OFDMA resource allocation problem is designed. Simulation results show that the reliability performance of CPS networks is significantly improved because of this work. 展开更多
关键词 cyber-physical system(CPS) medium access control(MAC) protocol POLLING resource allocation
下载PDF
Security and Privacy Challenges in Cyber-Physical Systems
20
作者 Fahd AlDosari 《Journal of Information Security》 2017年第4期285-295,共11页
Cyber-Physical Systems, or Smart-Embedded Systems, are co-engineered for the integration of physical, computational and networking resources. These resources are used to develop an efficient base for enhancing the qua... Cyber-Physical Systems, or Smart-Embedded Systems, are co-engineered for the integration of physical, computational and networking resources. These resources are used to develop an efficient base for enhancing the quality of services in all areas of life and achieving a classier lifestyle in terms of a required service’s functionality and timing. Cyber-Physical Systems (CPSs) complement the need to have smart products (e.g., homes, hospitals, airports, cities). In other words, regulate the three kinds of resources available: physical, computational, and networking. This regulation supports communication and interaction between the human word and digital word to find the required intelligence in all scopes of life, including Telecommunication, Power Generation and Distribution, and Manufacturing. Data Security is among the most important issues to be considered in recent technologies. Because Cyber-Physical Systems consist of interacting complex components and middle-ware, they face real challenges in being secure against cyber-attacks while functioning efficiently and without affecting or degrading their performance. This study gives a detailed description of CPSs, their challenges (including cyber-security attacks), characteristics, and related technologies. We also focus on the tradeoff between security and performance in CPS, and we present the most common Side Channel Attacks on the implementations of cryptographic algorithms (symmetric: AES and asymmetric: RSA) with the countermeasures against these attacks. 展开更多
关键词 SECURITY cyber-physical systems SIDE CHANNEL ATTACKS
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部