2020
DOI: 10.1109/access.2020.2983335
|View full text |Cite
|
Sign up to set email alerts
|

Security Analysis of CPS Systems Under Different Swapping Strategies in IoT Environments

Abstract: In this paper, we give attention to the robustness of the Cyber-Physical System, which consists of interdependent physical resources and computational resources. Numerous infrastructure systems can evolve into the Cyber-Physical System, e.g., smart power grids, traffic control systems, and wireless sensor and actuator networks. These networks depend on their interdependent networks, which provide information or energy to function. In a Cyber-Physical System, a small failure could trigger serious cascading fail… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
12
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 23 publications
(12 citation statements)
references
References 50 publications
(65 reference statements)
0
12
0
Order By: Relevance
“…Degree centrality is widely utilized to calculate the importance of nodes [ 12 , 28 , 35 ]. It is well-known that the intra-link number of one node is the node’s degree in an undirected network [ 9 , 34 ].…”
Section: Methodsmentioning
confidence: 99%
See 2 more Smart Citations
“…Degree centrality is widely utilized to calculate the importance of nodes [ 12 , 28 , 35 ]. It is well-known that the intra-link number of one node is the node’s degree in an undirected network [ 9 , 34 ].…”
Section: Methodsmentioning
confidence: 99%
“…One node’s betweenness centrality is: where is the shortest paths number from node i to node j . is the shortest paths number from node i to node j which are through the node v [ 28 , 34 , 35 ]. If one node has a large number of shortest paths to other nodes, this node must be a critical node in the network.…”
Section: Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…Therefore, this method should guarantee that typical data are not affected; this ensures that abnormal data cannot be hidden in the network’s standard information, thereby making the whole process self-defense. It is worth noting that different methods, including increased traffic and information manipulation, can be used to manipulate the network [ 21 ].…”
Section: Related Workmentioning
confidence: 99%
“…Security is deployed for both physical devices and network resources that are connected through application interfaces. 1 The protection is evaluated to improve the safeguarding of the information from the attacks and provides authenticated verification. 2 The verification is obtained by determining the cybersecurity mechanism that acquires the data from the user and derives the resultant information.…”
Section: Introductionmentioning
confidence: 99%