[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ Skip to main content
Log in

Security Assessment for Interdependent Heterogeneous Cyber Physical Systems

  • Published:
Mobile Networks and Applications Aims and scope Submit manuscript

Abstract

In this paper, the reliability performance analysis of coupled cyber-physical systems under different network types is investigated. To study the underlying network model, their interactions, and relationships and how cascading failures occur in the interdependent cyber-physical systems, we propose a practical model for interdependent cyber-physical systems using network percolation theory. Besides, for different network models, we also study the effect of cascading failures effect and reveal mathematical analysis of failure propagation in such systems. Then we analyze the reliability of our proposed model caused by random attacks or failures by calculating the size of giant functioning components in interdependent cyber-physical systems. In order to gain an insight into the proposed analysis model, numerical simulation analysis is also provided. The results show that there exists a threshold for the proportion of faulty nodes, beyond which the cyber-physical systems collapse. We also determine the critical values for different system parameters. In this way, the reliability analysis based on network percolation theory can be effectively utilized for anti-attack and protection purposes in coupled cyber-physical systems.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
£29.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price includes VAT (United Kingdom)

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

References

  1. Lee E A. Introducing embedded systems: a cyber-physical approach[C]//Proceedings of the 2009 Workshop on Embedded Systems Education. ACM, 2009: 1-2

  2. Lee E (2008) Cyber physical systems: design challenges. In: IEEE Symposium on Object Oriented Real-Time Distributed Computing. IEEE Computer Society

  3. Kurt S, Yildiz HU, Yigit M, Tavli B, Gungor VC (2016) Packet size optimization in wireless sensor networks for smart grid applications. IEEE Trans Ind Electron 64(3):2392–2401

    Article  Google Scholar 

  4. Wang W, Tang M, Stanley HE et al (2018) Social contagions with communication channel alternation on multiplex networks. Phys Rev E 98(6):062320

    Article  Google Scholar 

  5. Wang T, Zhou J, Liu A, et al. Fog-based computing and storage offloading for data synchronization in IoT. IEEE Internet Things J.(2018)[J].2018,6(3):4272 - 4282

  6. Fadel E, Faheem M, Gungor VC, Nassef L, Akkari N, Malik MGA et al (2017) Spectrum-aware bio-inspired routing in cognitive radio sensor networks for smart grid applications. Comput Commun 101:106–120

    Article  Google Scholar 

  7. Wang W, Wang ZX, Cai SM (2018) Critical phenomena of information spreading dynamics on networks with cliques. Phys Rev E 98(5):052312

    Article  Google Scholar 

  8. Khan AA, Rehmani MH, Reisslein M (2017) Requirements, design challenges, and review of routing and mac protocols for cr-based smart grid systems. IEEE Commun Mag 55(5):206–215

    Article  Google Scholar 

  9. Liu Z, Huang Y, Li J et al (2018) DivORAM: towards a practical oblivious RAM with variable block size. Inf Sci 447:1–11

    Article  Google Scholar 

  10. Cai M, Cui Y, Stanley HE (2017) Analysis and evaluation of the entropy indices of a static network structure. Sci Rep 7(1):9340

    Article  Google Scholar 

  11. Li J, Huang Y, Wei Y et al (2019) Searchable symmetric encryption with forward search privacy. IEEE Trans Dependable Secure Computhttps://doi.org/10.1109/TDSC.2019.2894411

  12. Bayram IS, Michailidis G, Devetsikiotis M, Granelli F (2013) Electric power allocation in a network of fast charging stations. IEEE J Sel Areas Commun 31(7):1235–1246

    Article  Google Scholar 

  13. Xu G, Liu J, Lu Y, Zeng X, Zhang Y, Li X (2018) A novel efficient maka protocol with desynchronization for anonymous roaming service in global mobility networks. J Netw Comput Appl, S1084804518300407

  14. Zhao JB, Zhang G, Scala ML, Dong ZY, Chen C, Wang J (2015) Short-term state forecasting-aided method for detection of smart grid general false data injection attacks. IEEE Trans Smart Grid PP(99):1–11

    Google Scholar 

  15. Cai M, Wang W, Cui Y et al (2018) Multiplex network analysis of employee performance and employee social relationships. Physica A 490:1–12

    Article  MathSciNet  Google Scholar 

  16. Ozay M, Esnaola I, Vural FTY, Kulkarni SR, Poor HV (2015) Machine learning methods for attack detection in the smart grid. IEEE Trans Neural Netw Learn Syst 27(8):1773–1786

    Article  MathSciNet  Google Scholar 

  17. Xu G, Liu J, Lu Y et al (2018) A novel efficient MAKA protocol with desynchronization for anonymous roaming service in Global Mobility Networks. J Netw Comput Appl 107:83–92

    Article  Google Scholar 

  18. Tan KM, Ramachandaramurthy VK, Yong JY (2016) Integration of electric vehicles in smart grid: a review on vehicle to grid technologies and optimization techniques. Renew Sustain Energy Rev 53:720–732

    Article  Google Scholar 

  19. Li S, Yilmaz Y, Wang X (2017) Quickest detection of false data injection attack in wide-area smart grids. IEEE Trans Smart Grid 6(6):2725–2735

    Article  Google Scholar 

  20. Hartmann T, Fouquet F, Klein J, et al. Generating realistic smart grid communication topologies based on real-data[C]//2014 IEEE International Conference on Smart Grid Communications (SmartGridComm). IEEE, 2014: 428-433.

  21. Broman Toft M, Schuitema G, Th?Gersen, J. (2014) Responsible technology acceptance: model development and application to consumer acceptance of smart grid technology. Appl Energy 134:392–400

  22. Xu G, Zhang Y, Sangaiah AK et al (2019) CSP-E2: an abuse-free contract signing protocol with low-storage TTP for energy-efficient electronic transaction ecosystems. Inf Sci 476:505–515

    Article  Google Scholar 

  23. Gao J, Buldyrev SV, Stanley HE, Havlin S (2011) Networks formed from interdependent networks. Nat Phys 8(1):40–48

    Article  Google Scholar 

  24. Gao J, Buldyrev SV, Stanley HE, Xu X, Havlin S (2013) Percolation of a general network of networks. Phys Rev E 88(6):062816

    Article  Google Scholar 

  25. Buldyrev SV, Parshani R, Paul G, Stanley HE, Havlin S (2009) Catastrophic cascade of failures in interdependent networks. Nature 464(7291):1025–1028

    Article  Google Scholar 

Download references

Acknowledgements

This work was supported by National Natural Science Foundation of China (Grant No.61602418, No.61672468), Zhejiang Provincial Natural Science Foundation of China (Grant No.LQ16F020002), Social development project of Zhejiang provincial public technology research (Grant No.2016C33168), MOE (Ministry of Education in China) Project of Humanity and Social Science (Grant No.15YJCZH125) and the Opening Project of Shanghai Key Laboratory of Integrated Administration Technologies for Information Security (Grant No. AGK2018001).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Dandan Zhao.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Peng, H., Kan, Z., Zhao, D. et al. Security Assessment for Interdependent Heterogeneous Cyber Physical Systems. Mobile Netw Appl 26, 1532–1542 (2021). https://doi.org/10.1007/s11036-019-01489-z

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11036-019-01489-z

Keywords

Navigation