scholarly journals Node Importance Evaluation of Cyber-Physical System under Cyber-Attacks Spreading

Complexity ◽  
2021 ◽  
Vol 2021 ◽  
pp. 1-15
Author(s):  
Xin-Rui Liu ◽  
Yuan Meng ◽  
Peng Chang

The study of cyber-attacks, and in particular the spread of attack on the power cyber-physical system, has recently attracted considerable attention. Identifying and evaluating the important nodes under the cyber-attack propagation scenario are of great significance for improving the reliability and survivability of the power system. In this paper, we improve the closeness centrality algorithm and propose a compound centrality algorithm based on adaptive coefficient to evaluate the importance of single-layer network nodes. Moreover, we quantitatively calculated the decouple degree of cascading failures caused by exposed nodes formed by attack propagation. At last, experiments based on the IEEE 57 test system show that the proposed compound centrality algorithm can match the cyber-attack propagation scenario well, and we give the importance values of the nodes in a specific attack scenario.

2015 ◽  
Vol 70 ◽  
pp. 238-244 ◽  
Author(s):  
Hemangi Laxman Gawand ◽  
A.K. Bhattacharjee ◽  
Kallol Roy

Extensive research effort is going on to contribute to the Cyber Physical system (CPS). It will create a physical system capable of computation, communication and sharing information between physical devices. Physical devices become smart devices because of CPS. CPS are engineered systems that are built with sensors, microcontrollers which performs computation, communication, control, process and analysis of physical objects. CPS playing important role in smart cities, home automations and other applications. Due to resource constraints like low processing power and low storage space there is a lack of standard security mechanism which can provide adequate security in CPS. In the research paper, we proposed Key establishment mechanism which prevents CPS from cyber-attacks. The goal of this research paper are six -folds: i) to give a detailed overview of cyber physical system. ii) To study architecture of CPS. iii) To study different attacks on CPS with attack points. iv)Application areas of CPS v) security threats in CPS vi) Key establishment algorithm to prevent cyber-attacks in CPS.


Sign in / Sign up

Export Citation Format

Share Document