Skip to main content
Top
Published in: Mobile Networks and Applications 4/2021

16-12-2019

Security Assessment for Interdependent Heterogeneous Cyber Physical Systems

Authors: Hao Peng, Zhe Kan, Dandan Zhao, Jianmin Han

Published in: Mobile Networks and Applications | Issue 4/2021

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

In this paper, the reliability performance analysis of coupled cyber-physical systems under different network types is investigated. To study the underlying network model, their interactions, and relationships and how cascading failures occur in the interdependent cyber-physical systems, we propose a practical model for interdependent cyber-physical systems using network percolation theory. Besides, for different network models, we also study the effect of cascading failures effect and reveal mathematical analysis of failure propagation in such systems. Then we analyze the reliability of our proposed model caused by random attacks or failures by calculating the size of giant functioning components in interdependent cyber-physical systems. In order to gain an insight into the proposed analysis model, numerical simulation analysis is also provided. The results show that there exists a threshold for the proportion of faulty nodes, beyond which the cyber-physical systems collapse. We also determine the critical values for different system parameters. In this way, the reliability analysis based on network percolation theory can be effectively utilized for anti-attack and protection purposes in coupled cyber-physical systems.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Show more products
Literature
1.
go back to reference Lee E A. Introducing embedded systems: a cyber-physical approach[C]//Proceedings of the 2009 Workshop on Embedded Systems Education. ACM, 2009: 1-2 Lee E A. Introducing embedded systems: a cyber-physical approach[C]//Proceedings of the 2009 Workshop on Embedded Systems Education. ACM, 2009: 1-2
2.
go back to reference Lee E (2008) Cyber physical systems: design challenges. In: IEEE Symposium on Object Oriented Real-Time Distributed Computing. IEEE Computer Society Lee E (2008) Cyber physical systems: design challenges. In: IEEE Symposium on Object Oriented Real-Time Distributed Computing. IEEE Computer Society
3.
go back to reference Kurt S, Yildiz HU, Yigit M, Tavli B, Gungor VC (2016) Packet size optimization in wireless sensor networks for smart grid applications. IEEE Trans Ind Electron 64(3):2392–2401CrossRef Kurt S, Yildiz HU, Yigit M, Tavli B, Gungor VC (2016) Packet size optimization in wireless sensor networks for smart grid applications. IEEE Trans Ind Electron 64(3):2392–2401CrossRef
4.
go back to reference Wang W, Tang M, Stanley HE et al (2018) Social contagions with communication channel alternation on multiplex networks. Phys Rev E 98(6):062320CrossRef Wang W, Tang M, Stanley HE et al (2018) Social contagions with communication channel alternation on multiplex networks. Phys Rev E 98(6):062320CrossRef
5.
go back to reference Wang T, Zhou J, Liu A, et al. Fog-based computing and storage offloading for data synchronization in IoT. IEEE Internet Things J.(2018)[J].2018,6(3):4272 - 4282 Wang T, Zhou J, Liu A, et al. Fog-based computing and storage offloading for data synchronization in IoT. IEEE Internet Things J.(2018)[J].2018,6(3):4272 - 4282
6.
go back to reference Fadel E, Faheem M, Gungor VC, Nassef L, Akkari N, Malik MGA et al (2017) Spectrum-aware bio-inspired routing in cognitive radio sensor networks for smart grid applications. Comput Commun 101:106–120CrossRef Fadel E, Faheem M, Gungor VC, Nassef L, Akkari N, Malik MGA et al (2017) Spectrum-aware bio-inspired routing in cognitive radio sensor networks for smart grid applications. Comput Commun 101:106–120CrossRef
7.
go back to reference Wang W, Wang ZX, Cai SM (2018) Critical phenomena of information spreading dynamics on networks with cliques. Phys Rev E 98(5):052312CrossRef Wang W, Wang ZX, Cai SM (2018) Critical phenomena of information spreading dynamics on networks with cliques. Phys Rev E 98(5):052312CrossRef
8.
go back to reference Khan AA, Rehmani MH, Reisslein M (2017) Requirements, design challenges, and review of routing and mac protocols for cr-based smart grid systems. IEEE Commun Mag 55(5):206–215CrossRef Khan AA, Rehmani MH, Reisslein M (2017) Requirements, design challenges, and review of routing and mac protocols for cr-based smart grid systems. IEEE Commun Mag 55(5):206–215CrossRef
9.
go back to reference Liu Z, Huang Y, Li J et al (2018) DivORAM: towards a practical oblivious RAM with variable block size. Inf Sci 447:1–11CrossRef Liu Z, Huang Y, Li J et al (2018) DivORAM: towards a practical oblivious RAM with variable block size. Inf Sci 447:1–11CrossRef
10.
go back to reference Cai M, Cui Y, Stanley HE (2017) Analysis and evaluation of the entropy indices of a static network structure. Sci Rep 7(1):9340CrossRef Cai M, Cui Y, Stanley HE (2017) Analysis and evaluation of the entropy indices of a static network structure. Sci Rep 7(1):9340CrossRef
12.
go back to reference Bayram IS, Michailidis G, Devetsikiotis M, Granelli F (2013) Electric power allocation in a network of fast charging stations. IEEE J Sel Areas Commun 31(7):1235–1246CrossRef Bayram IS, Michailidis G, Devetsikiotis M, Granelli F (2013) Electric power allocation in a network of fast charging stations. IEEE J Sel Areas Commun 31(7):1235–1246CrossRef
13.
go back to reference Xu G, Liu J, Lu Y, Zeng X, Zhang Y, Li X (2018) A novel efficient maka protocol with desynchronization for anonymous roaming service in global mobility networks. J Netw Comput Appl, S1084804518300407 Xu G, Liu J, Lu Y, Zeng X, Zhang Y, Li X (2018) A novel efficient maka protocol with desynchronization for anonymous roaming service in global mobility networks. J Netw Comput Appl, S1084804518300407
14.
go back to reference Zhao JB, Zhang G, Scala ML, Dong ZY, Chen C, Wang J (2015) Short-term state forecasting-aided method for detection of smart grid general false data injection attacks. IEEE Trans Smart Grid PP(99):1–11 Zhao JB, Zhang G, Scala ML, Dong ZY, Chen C, Wang J (2015) Short-term state forecasting-aided method for detection of smart grid general false data injection attacks. IEEE Trans Smart Grid PP(99):1–11
15.
go back to reference Cai M, Wang W, Cui Y et al (2018) Multiplex network analysis of employee performance and employee social relationships. Physica A 490:1–12MathSciNetCrossRef Cai M, Wang W, Cui Y et al (2018) Multiplex network analysis of employee performance and employee social relationships. Physica A 490:1–12MathSciNetCrossRef
16.
go back to reference Ozay M, Esnaola I, Vural FTY, Kulkarni SR, Poor HV (2015) Machine learning methods for attack detection in the smart grid. IEEE Trans Neural Netw Learn Syst 27(8):1773–1786MathSciNetCrossRef Ozay M, Esnaola I, Vural FTY, Kulkarni SR, Poor HV (2015) Machine learning methods for attack detection in the smart grid. IEEE Trans Neural Netw Learn Syst 27(8):1773–1786MathSciNetCrossRef
17.
go back to reference Xu G, Liu J, Lu Y et al (2018) A novel efficient MAKA protocol with desynchronization for anonymous roaming service in Global Mobility Networks. J Netw Comput Appl 107:83–92CrossRef Xu G, Liu J, Lu Y et al (2018) A novel efficient MAKA protocol with desynchronization for anonymous roaming service in Global Mobility Networks. J Netw Comput Appl 107:83–92CrossRef
18.
go back to reference Tan KM, Ramachandaramurthy VK, Yong JY (2016) Integration of electric vehicles in smart grid: a review on vehicle to grid technologies and optimization techniques. Renew Sustain Energy Rev 53:720–732CrossRef Tan KM, Ramachandaramurthy VK, Yong JY (2016) Integration of electric vehicles in smart grid: a review on vehicle to grid technologies and optimization techniques. Renew Sustain Energy Rev 53:720–732CrossRef
19.
go back to reference Li S, Yilmaz Y, Wang X (2017) Quickest detection of false data injection attack in wide-area smart grids. IEEE Trans Smart Grid 6(6):2725–2735CrossRef Li S, Yilmaz Y, Wang X (2017) Quickest detection of false data injection attack in wide-area smart grids. IEEE Trans Smart Grid 6(6):2725–2735CrossRef
20.
go back to reference Hartmann T, Fouquet F, Klein J, et al. Generating realistic smart grid communication topologies based on real-data[C]//2014 IEEE International Conference on Smart Grid Communications (SmartGridComm). IEEE, 2014: 428-433. Hartmann T, Fouquet F, Klein J, et al. Generating realistic smart grid communication topologies based on real-data[C]//2014 IEEE International Conference on Smart Grid Communications (SmartGridComm). IEEE, 2014: 428-433.
21.
go back to reference Broman Toft M, Schuitema G, Th?Gersen, J. (2014) Responsible technology acceptance: model development and application to consumer acceptance of smart grid technology. Appl Energy 134:392–400 Broman Toft M, Schuitema G, Th?Gersen, J. (2014) Responsible technology acceptance: model development and application to consumer acceptance of smart grid technology. Appl Energy 134:392–400
22.
go back to reference Xu G, Zhang Y, Sangaiah AK et al (2019) CSP-E2: an abuse-free contract signing protocol with low-storage TTP for energy-efficient electronic transaction ecosystems. Inf Sci 476:505–515CrossRef Xu G, Zhang Y, Sangaiah AK et al (2019) CSP-E2: an abuse-free contract signing protocol with low-storage TTP for energy-efficient electronic transaction ecosystems. Inf Sci 476:505–515CrossRef
23.
go back to reference Gao J, Buldyrev SV, Stanley HE, Havlin S (2011) Networks formed from interdependent networks. Nat Phys 8(1):40–48CrossRef Gao J, Buldyrev SV, Stanley HE, Havlin S (2011) Networks formed from interdependent networks. Nat Phys 8(1):40–48CrossRef
24.
go back to reference Gao J, Buldyrev SV, Stanley HE, Xu X, Havlin S (2013) Percolation of a general network of networks. Phys Rev E 88(6):062816CrossRef Gao J, Buldyrev SV, Stanley HE, Xu X, Havlin S (2013) Percolation of a general network of networks. Phys Rev E 88(6):062816CrossRef
25.
go back to reference Buldyrev SV, Parshani R, Paul G, Stanley HE, Havlin S (2009) Catastrophic cascade of failures in interdependent networks. Nature 464(7291):1025–1028CrossRef Buldyrev SV, Parshani R, Paul G, Stanley HE, Havlin S (2009) Catastrophic cascade of failures in interdependent networks. Nature 464(7291):1025–1028CrossRef
Metadata
Title
Security Assessment for Interdependent Heterogeneous Cyber Physical Systems
Authors
Hao Peng
Zhe Kan
Dandan Zhao
Jianmin Han
Publication date
16-12-2019
Publisher
Springer US
Published in
Mobile Networks and Applications / Issue 4/2021
Print ISSN: 1383-469X
Electronic ISSN: 1572-8153
DOI
https://doi.org/10.1007/s11036-019-01489-z

Other articles of this Issue 4/2021

Mobile Networks and Applications 4/2021 Go to the issue