Open Access Open Access  Restricted Access Subscription or Fee Access

A Study on Cyber Physical System and Network Security

Dr. G. Satyavathy, C. Mercy Praba

Abstract


Cyber-Physical (CPSs) are characterized by integrating computation and physical processes. The theories and applications of CPSs face the enormous challenges. The aim of this work is to provide a better understanding of this emerging multi-disciplinary methodology. The research progresses are summarized from different perspectives such as energy control, secure control, transmission and management, control technique, system resource allocation, and model-based software design. The research challenges and some suggestions for future work are in brief outlined. The computer network technology is developing rapidly, and the development of internet technology is more quickly, people more aware of the importance of the network security.

Network security is main issue of computing because many types of attacks are increasing day by day. Protecting computer and network security are critical issues. The malicious nodes create a problem in the network. This malicious nodes acts as selfishness. After analyzing and quantifying the network information security elements confidentiality, integrity and availability. This paper describes the network security confidentiality vector, network security integrity vector and network security availability vector and also some major type of attacks in networks.


Keywords


Cyber Physical System (CPS), CPS Attacks, CPS Security, Network Security Threats, Network Security Components

Full Text:

PDF

References


L. d. Alfaro and T. A. Henzinger. Interface-based design.In M. Broy, J. Gruenbauer, D. Harel, and C. Hoare, editors, Engineering Theories of Software-intensive Systems,volume NATO Science Series: Mathematics, Physics, and Chemistry, Vol. 195, pages 83–104. Springer, 2005.

F. Arbab. Reo: A channel-based coordination model for component composition. Mathematical Structures in Computer Science, 14(3):329–366, 2004.

O. Avissar, R. Barua, and D. Stewart. An optimal memory allocation scheme for scratch-pad-based embedded systems.Trans. on Embedded Computing Sys. 1(1):6–26, 2002.

D. F. Bacon, P. Cheng, and V. Rajan. The Metronome: A simpler approach to garbage collection in real-time systems.In Workshop on Java Technologies for Real-Time and Embedded Systems, pages 466–478, Catania, Sicily, November 2003.

D. F. Bacon, R. E. Strom, and A. Tarafdar. Guava: a dialect of Java without data races. In ACM SIGPLAN conference on Object-oriented programming, systems, languages, and applications, volume 35 of ACM SIGPLAN Notices, pages 382–400, 2000.

Adeyinka, O., "Internet Attack Methods and Internet Security Technology," Modeling & Simulation, 2008.AICMS 08. Second Asia International Conference on, vol., no., pp.77‐82, 13‐15 May 2008.

"Virtual private network." Wikipedia, The Free Encyclopedia. 30 Jun 2008, 19:32 UTC. Wikimedia Foundation, Inc. 2 Jul 2008 .

“Improving Security,” http://www.cert.org/tech_tips, 2006.

Marin, G.A., "Network security basics," Security & Privacy, IEEE, vol.3, no.6, pp. 68‐72, Nov.‐Dec. 2005.

Molva, R., Institut Eurecom, “Internet Security Architecture,” in Computer Networks & ISDN System Journal, vol. 31, pp. 787‐804, April 1999.

Dowd, P.W.; McHenry, J.T., "Network security: it's time to take it seriously,"Computer, vol.31, no.9, pp.24‐ 28, Sep 1998.

K. Cheolhyeon, L. Weiyi and H. Inseok, “Security analysis for Cyber-Physical Systems against stealthy deception attacks,” American Control Conference (ACC), (2013), pp. 3344-3349.

J.-C. Kao and R. Marculescu, “Eavesdropping Minimization via Transmission Power Control in Ad-Hoc Wireless Networks”, 3rd Annual IEEE Communications Society on Sensor and Ad Hoc Communications and Networks, (2006), pp. 707-714.

Siddharth Ghansela “Network Security: Attacks, Tools and Techniques” , ijarcsse Volume 3, Issue 6, June 2013.

Faizal, M.A., Mohd Zaki M., Shahrin Sahib, Robiah, Y., Siti Rahayu, S., and Asrul Hadi, Y. “Time Based Intrusion Detection on Fast Attack for Network Intrusion Detection System”, Second International Conference on Network Applications, Protocols and Services, IEEE, 2010


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.