“…As shown in Figure 1, the first step will be to generate the exact cover of the list that is all possible combinations that are disjoint and when combined, form the list. For example, in this case, the combinatory subsets can be { (1,3,5), (2,4,8), (6,7,9)}, {(1,2,3), (4,6,8), (5,7,9)}, {(1,4,7), (2,5,8), (3,6,9)} etc. The length is 9 and the factors for length will be 1,3,9.…”
Section: A Case Study: Security Of Pacemakermentioning
confidence: 99%
“…Such security measurements can be encryption, access control, and authentication and so on. This dynamic adapting of the environment by context coupling is known as the Context-Aware Security Framework [9].…”
“…Now, the subfamily of subsets according to the polynomial given will be T = {(1,4,7), (2,5,8), (3,6,9)}.…”
Section: A Case Study: Security Of Pacemakermentioning
confidence: 99%
“…Key, K = T + {(1,2,3}, (1,4,5), (3,4), (3,4,5,6), (2,6,8)} = {(1,4,7), (1,2,3), (2,5,8), (1,4,5), (3,4), (3,6,9), (3,4,5,6), (2,6,8)} Then the sender node sends this key combined with the chaff points and shares the features with the receiver.…”
Section: A Case Study: Security Of Pacemakermentioning
Cyber physical systems (CPS) are computer systems that integrate computing, coordination and communication systems in order to monitor physical entities in the physical world. As they interact with the critical systems and infrastructure that may impact real life. There are many issues in design and constructions of these types of systems. One of the key issue that receives so many attention is the security of such systems. Although security solutions for Information Systems handle the security issues associated with Traditional IT security, but the impact of a failure in a cyber-physical system demands a different approach to handle security issues related to the cyber world. In this work, we focus on using a key agreement technique known as Physical Signal Key Agreement (PSKA) technique using the Exact Cover method to generate the random key which will be embedded into an access control model known as the Modified Context-Aware Security The feasibility of our framework (MCASF) to handle both normal and critical situation on demand is demonstrated via a Pervasive Health Monitoring Systems (PHMS).
“…As shown in Figure 1, the first step will be to generate the exact cover of the list that is all possible combinations that are disjoint and when combined, form the list. For example, in this case, the combinatory subsets can be { (1,3,5), (2,4,8), (6,7,9)}, {(1,2,3), (4,6,8), (5,7,9)}, {(1,4,7), (2,5,8), (3,6,9)} etc. The length is 9 and the factors for length will be 1,3,9.…”
Section: A Case Study: Security Of Pacemakermentioning
confidence: 99%
“…Such security measurements can be encryption, access control, and authentication and so on. This dynamic adapting of the environment by context coupling is known as the Context-Aware Security Framework [9].…”
“…Now, the subfamily of subsets according to the polynomial given will be T = {(1,4,7), (2,5,8), (3,6,9)}.…”
Section: A Case Study: Security Of Pacemakermentioning
confidence: 99%
“…Key, K = T + {(1,2,3}, (1,4,5), (3,4), (3,4,5,6), (2,6,8)} = {(1,4,7), (1,2,3), (2,5,8), (1,4,5), (3,4), (3,6,9), (3,4,5,6), (2,6,8)} Then the sender node sends this key combined with the chaff points and shares the features with the receiver.…”
Section: A Case Study: Security Of Pacemakermentioning
Cyber physical systems (CPS) are computer systems that integrate computing, coordination and communication systems in order to monitor physical entities in the physical world. As they interact with the critical systems and infrastructure that may impact real life. There are many issues in design and constructions of these types of systems. One of the key issue that receives so many attention is the security of such systems. Although security solutions for Information Systems handle the security issues associated with Traditional IT security, but the impact of a failure in a cyber-physical system demands a different approach to handle security issues related to the cyber world. In this work, we focus on using a key agreement technique known as Physical Signal Key Agreement (PSKA) technique using the Exact Cover method to generate the random key which will be embedded into an access control model known as the Modified Context-Aware Security The feasibility of our framework (MCASF) to handle both normal and critical situation on demand is demonstrated via a Pervasive Health Monitoring Systems (PHMS).
“…Though related security issues are broadly studied and analyzed in the fields of Wireless Sensor Network (WSN), Ad-hoc network and Mobile Ad-hoc Networks (MANET) etc., they are barely applicable because CPS security covers a larger scope, contains much more content and requires higher levels of security. By investigating he CPS security issue, a content-aware security framework for generic CPS systems was proposed [1]. Several security problems along with the currently proposed solutions at different network layers of mobile ad hoc networks were presented and discussed based on the related studies before [2].…”
Abstract:As the core of intelligent manufacturing, CPS has serious security issues, especially for the communication security of its terminal M2M. In this paper, blockchain technology is introduced to address such a security problem of communications between different types of machines in CPS. According to the principles of blockchain technology, we design a blockchain for secure M2M communications. As a communication system of M2M consists of public network areas, equipment areas and private areas, we design a sophisticated blockchain structure between the public area and private area. For validating our design, we take cotton spinning production as a case study to demonstrate our solution to M2M communication problems under the CPS framework.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.