Cyber-physical system security for networked industrial processes
Tóm tắt
Từ khóa
Tài liệu tham khảo
E. A. Lee. Cyber physical systems: Design challenges. In Proceedings of the 11th International Symposium on Object Oriented Real-time Distributed Computing, IEEE, Orlando, USA, pp. 363–369, 2008.
L. J. Zhao, Y. T. Chai, D. C. Yuan. Selective ensemble extreme learning machine modeling of effluent quality in wastewater treatment plants. International Journal of Automation and Computing, vol. 9, no. 6, pp. 627–633, 2012.
M. Y. Zhao, J. Walker, C. C. Wang. Challenges and opportunities for securing intelligent transportation system. IEEE Journal on Emerging and Selected Topics in Circuits and Systems, vol. 3, no. 1, pp. 96–105, 2013.
Y. Hashimoto, T. Toyoshima, S. Yogo, M. Koike, T. Hamaguchi, S. Jing, I. Koshijima. Safety securing approach against cyber-attacks for process control system. Computers and Chemical Engineering, vol. 57, pp. 181–186, 2013.
M. Cheminod, L. Durante, A. Valenzano. Review of security issues in industrial networks. IEEE Transactions on Industrial Informatics, vol. 9, no. 1, pp. 277–293, 2013.
J. Lopez, C. Alcaraz, R. Roman. Smart control of operational threats in control substations. Computers and Security, vol. 38, pp. 14–27, 2013.
N. X. Xiong, A. V. Vasilakos, L. T. Yang, E. Hossain. An adaptive and predictive approach for autonomic multirate multicast networks. ACM Transactions on Autonomous and Adaptive Systems, vol. 6, no. 3, Article number 22, 2011.
U. Altinisik, M. Yildirim. A new fault tolerant control approach for the three-tank system using data mining. Computers and Electrical Engineering, vol. 38, no. 6, pp. 1627–1635, 2012.
Y. Y. Zhang, J. L. Zhang, X. Y. Luo, X. P. Guan. Sensor/actuator faults detection for networked control systems via predictive control. International Journal of Automation and Computing, vol. 10, no. 3, pp. 173–180, 2013.
D. J. Fergus. Industrial Control System Security Current Trends & Risk Mitigation, Technical Report. Intekras, Inc., Sterling, USA, 2009.
C. J. Zhou, H. Chen, Y. Q. Qin, Y. F. Shi, G. C. Yu. Selforganization of reconfigurable protocol stack for networked control systems. International Journal of Automation and Computing, vol. 8, no. 2, pp. 221–235, 2011.
W. Young, N. G. Leveson. An integrated approach to safety and security based on systems theory. Communications of the ACM, vol. 57, no. 2, pp. 31–35, 2014.
H. Zhang, P. Cheng, L. Shi, J. M. Chen. Optimal Denial-of-Service attack scheduling against linear quadratic Gaussian control. In Proceedings of the American Control Conference, IEEE, Portland, USA, pp. 3996–4001, 2014.
L. J. Wells, J. A. Camelio, C. B. Williams, J. White. Cyber-physical security challenges in manufacturing systems. Manufacturing Letters, vol. 2, no. 2, pp. 74–77, 2014.
Z. J. Le, N. X. Xiong, B. Yang, Y. Z. Zhou. SC-OA: A secure and efficient scheme for origin authentication of interdomain routing in cloud computing networks. In Proceedings of International Parallel & Distributed Processing Symposium, IEEE, Anchorage, USA, pp. 243–254, 2011.
Y. B. Wang, M. C. Vuran, S. Goddard. Cyber-physical systems in industrial process control. ACM SIGBED Review, vol. 5, no. 1, Article number 12, 2008.
Q. Y. Zhu, C. Rieger, T. Basar. A hierarchical security architecture for cyber-physical systems. In Proceedings of the 4th International Symposium on Resilient Control Systems, IEEE, Boise, USA, pp. 15–20, 2011.
Y. Z. Zhou, Y. X. Zhang, H. Liu, N. X. Xiong, A. V. Vasilakos. A bare-metal and asymmetric partitioning approach to client virtualization. IEEE Transactions on Services Computing, vol. 7, no. 1, pp. 40–53, 2014.
J. Hugues, B. Zalila, L. Pautet, F. Kordon. From the prototype to the final embedded system using the ocarina AADL tool suite. ACM Transactions in Embedded Computing Systems, vol. 7, no. 4, Article number 42, 2008.
T. Baars, M. Spruit. Designing a secure cloud architecture: The SeCA model. International Journal of Information Security and Privacy, vol. 6, no. 1, pp. 14–32, 2012.
M. Krotofil, A. A. Cardenas. Resilience of process control systems to cyber-physical attacks. In Proceedings of the 18th Nordic Conference, NordSec 2013, Lecture Notes in Computer Science, Springer, Ilulissat, Greenland, pp. 166–182, 2013.
H. Zhang, P. Cheng, L. Shi, J. M. Chen. Optimal DoS attack policy against remote state estimation. In Proceedings of the 52nd Annual Conference on Decision and Control, IEEE, Firenze, Italy, pp. 5444–5449, 2013.
B. Genge, C. Siaterlis. Physical process resilience-aware network design for SCADA systems. Computers and Electrical Engineering, vol. 40, no. 1, pp. 142–157, 2014.
Y. L. Huang, A. A. Cardenas, S. Amin, Z. S. Lin, H. Y. Tsai, S. Sastry. Understanding the physical and economic consequences of attacks on control systems. International Journal of Critical Infrastructure Protection, vol. 2, no. 3, pp. 73–83, 2009.
Y. Z. Zhou, Y. X. Zhang, H. Liu, N. X. Xiong, A. V. Vasilakos. A bare-metal and asymmetric partitioning approach to client virtualization. IEEE Transactions on Services Computing, vol. 7, no. 1, pp. 40–53, 2014.
K. Gill, S. H. Yang, W. L. Wang. Secure remote access to home automation networks. IET Information Security, vol. 7, no. 2, pp. 118–125, 2013.
Functional safety: Safety instrumented systems for the process industry sector, IEC Standard 61511, 2003.
W. Xiong, H. P. Hu, N. X. Xiong, L. T. Yang, W. C. Peng, X. F. Wang, Y. Z. Ou. Anomaly secure detection methods by analyzing dynamic characteristics of the network traffic in cloud communications. Information Sciences, vol. 258, pp. 403–415, 2014.
M. Y. Yang, X. F. Huang, S. Huang, C. J. Zhou. Multiple models based detection of transient faults for networked control system. Applied Mechanics and Materials, vol. 373–375, pp. 1369–1373, 2013.
F. Sha, H. Q. Zhou. The information security risk assessment based on AHP and fuzzy comprehensive evaluation. In Proceedings of the 3rd International Conference on Communication Software and Networks, Xian, China, pp. 124–128, 2011.
R. Sandhu. Good-enough security: Toward a pragmatic business-driven discipline. IEEE Internet Computing, vol.7, no. 1, pp. 66–68, 2003.
B. Kordy, S. Mauw, S. Radomirovic, P. Schweitzer. Attackdefense trees. Journal of Logic and Computation, vol. 24, no. 1, pp. 55–87, 2014.
W. T. Zeng, M. Y. Chow. Modeling and optimizing the performance-security tradeoff on D-NCS using the coevolutionary paradigm. IEEE Transactions on Industrial Informatics, vol. 9, no. 1, pp. 394–402, 2013.
T. Xie, X. Qin, A. Sung, M. Lin, L. T. Yang. Real-time scheduling with quality of security constraints. International Journal of High Performance Computing and Networking, vol. 4, no. 3–4, pp. 188–197, 2013.