Periodic coordinated attacks against cyber-physical systems: Detectability and performance bounds

Author(s):  
Rajasekhar Anguluri ◽  
Vijay Gupta ◽  
Fabio Pasqualetti
Author(s):  
Linlin Zhang ◽  
Zehui Zhang ◽  
Cong Guan

AbstractFederated learning (FL) is a distributed learning approach, which allows the distributed computing nodes to collaboratively develop a global model while keeping their data locally. However, the issues of privacy-preserving and performance improvement hinder the applications of the FL in the industrial cyber-physical systems (ICPSs). In this work, we propose a privacy-preserving momentum FL approach, named PMFL, which uses the momentum term to accelerate the model convergence rate during the training process. Furthermore, a fully homomorphic encryption scheme CKKS is adopted to encrypt the gradient parameters of the industrial agents’ models for preserving their local privacy information. In particular, the cloud server calculates the global encrypted momentum term by utilizing the encrypted gradients based on the momentum gradient descent optimization algorithm (MGD). The performance of the proposed PMFL is evaluated on two common deep learning datasets, i.e., MNIST and Fashion-MNIST. Theoretical analysis and experiment results confirm that the proposed approach can improve the convergence rate while preserving the privacy information of the industrial agents.


Sensors ◽  
2020 ◽  
Vol 20 (4) ◽  
pp. 1090 ◽  
Author(s):  
Yongkai Fan ◽  
Guanqun Zhao ◽  
Kuan-Ching Li ◽  
Bin Zhang ◽  
Gang Tan ◽  
...  

The trustworthiness of data is vital data analysis in the age of big data. In cyber-physical systems, most data is collected by sensors. With the increase of sensors as Internet of Things (IoT) nodes in the network, the security risk of data tampering, unauthorized access, false identify, and others are overgrowing because of vulnerable nodes, which leads to the great economic and social loss. This paper proposes a security scheme, Securing Nodes in IoT Perception Layer (SNPL), for protecting nodes in the perception layer. The SNPL is constructed by novel lightweight algorithms to ensure security and satisfy performance requirements, as well as safety technologies to provide security isolation for sensitive operations. A series of experiments with different types and numbers of nodes are presented. Experimental results and performance analysis show that SNPL is efficient and effective at protecting IoT from faulty or malicious nodes. Some potential practical application scenarios are also discussed to motivate the implementation of the proposed scheme in the real world.


2021 ◽  
Vol 20 (4) ◽  
pp. 1-24
Author(s):  
Lukas Gressl ◽  
Christian Steger ◽  
Ulrich Neffe

With the advent of the Internet of Things (IoT) and Cyber-Physical Systems (CPS), embedded devices have been gaining importance in our daily lives, as well as industrial processes. Independent of their usage, be it within an IoT system or a CPS, embedded devices are always an attractive target for security attacks, mainly due to their continuous network availability and the importance of the data they handle. Thus, the design of such systems requires a thorough consideration of the various security constraints they are liable to. Introducing these security constraints, next to other requirements, such as power consumption, and performance increases the number of design choices a system designer must consider. As the various constraints are often conflicting with each other, designers face the complex task of balancing them. System designers facilitate Design Space Exploration (DSE) tools to support a system designer in this job. However, available DSE tools only offer a limited way of considering security constraints during the design process. In this article, we introduce a novel DSE framework, which allows the consideration of security constraints, in the form of attack scenarios, and attack mitigations in the form of security tasks. Based on the descriptions of the system’s functionality and architecture, possible attacks, and known mitigation techniques, the framework finds the optimal design for a secure IoT device or CPS. Our framework’s functionality and its benefits are shown based on the design of a secure sensor system.


2011 ◽  
Vol 2011 ◽  
pp. 1-15 ◽  
Author(s):  
Pradeepkumar Ashok ◽  
Ganesh Krishnamoorthy ◽  
Delbert Tesar

Cyber physical systems (CPSs) typically have numerous sensors monitoring the various physical processes involved. Some sensor failures are inevitable and may have catastrophic effects. The relational nature of the diverse measurands can be very useful in detecting faulty sensors, monitoring the health of the system, and reducing false alarms. This paper provides procedures on how one may integrate data from the various sensors, by careful design of a sensor relationship network. Once such a network has been adopted, choices become available in real time for enhancing the reliability, safety, and performance of the overall system.


Author(s):  
Eliab Z. Opiyo ◽  
Imre Horváth

Prognosis and planning for the future life cycles is critical for both customers and developers of complex systems such as cyber-physical systems (CPSs). There are often uncertainties regarding the eventual costs and performances of CPSs. Having in advance a clear sense of the expected costs and performance is vital in the early development phases for decisions on, e.g., which functional features the CPS should have, whether to proceed with the development process, or whether to own a CPS or product. We focus specifically on prognosis of functional performance and cost implications of CPSs. The problem is that the available forecasting approaches cannot be used straightaway to tradeoff between costs and benefits, or to predict the benefits of investment in the early phases of the processes of development of CPSs. As a first step in an attempt to deal with these challenges, we have developed a feature-based reference scheme for deriving aspects and criteria for forecasting functional performance and cost implications of CPSs. We illustrate the applicability of the proposed scheme in this paper. We used this scheme as the basis for deriving the aspects and criteria for forecasting functional performance and cost implications of a cyber-physical printing utility. The scheme provided a systematic way of acquiring and formulating the aspects and criteria, and of figuring out the features that a cyber-physical printing utility should encompass. Overall, it helps to reduce the chance of overlooking the aspects and criteria.


Author(s):  
Volodymyr Kombarov ◽  
Yevgen Tsegelnyk ◽  
Sergiy Plankovskyy ◽  
Yevhen Aksonov ◽  
Yevhen Kryzhyvets

Improving the accuracy, reliability, and performance of cyber-physical systems such as high-speed machining, laser cutting, welding and cladding etc. is one of the most pressing challenges in modern industry. CNC system carries out data processing and significantly affect on accuracy of operation such equipment. The paper considers the problem of controlled axes motion differential characteristics data processing in the internal representation of the discrete space of the CNC system. Equations for determining the required discreteness of the differential characteristics position and resolution, such as the speed, acceleration, and jerk are proposed. For the most widely used CNC equipment specific discreteness and resolution values have been determined.


IEEE Network ◽  
2016 ◽  
Vol 30 (2) ◽  
pp. 62-66 ◽  
Author(s):  
Heng Zhang ◽  
Yuanchao Shu ◽  
Peng Cheng ◽  
Jiming Chen

Author(s):  
Okolie S.O. ◽  
Kuyoro S.O. ◽  
Ohwo O. B

Cyber-Physical Systems (CPS) will revolutionize how humans relate with the physical world around us. Many grand challenges await the economically vital domains of transportation, health-care, manufacturing, agriculture, energy, defence, aerospace and buildings. Exploration of these potentialities around space and time would create applications which would affect societal and economic benefit. This paper looks into the concept of emerging Cyber-Physical system, applications and security issues in sustaining development in various economic sectors; outlining a set of strategic Research and Development opportunities that should be accosted, so as to allow upgraded CPS to attain their potential and provide a wide range of societal advantages in the future.


Sign in / Sign up

Export Citation Format

Share Document