BLCS: Brain-Like based Distributed Control Security in Cyber Physical
Systems
- URL: http://arxiv.org/abs/2002.06259v1
- Date: Sat, 8 Feb 2020 09:14:10 GMT
- Title: BLCS: Brain-Like based Distributed Control Security in Cyber Physical
Systems
- Authors: Hui Yang, Kaixuan Zhan, Michel Kadoch, Yongshen Liang, Mohamed Cheriet
- Abstract summary: Cyber security is the biggest issue in Cyber-physical system (CPS) scenario.
We propose a brain-like based distributed control security (BLCS) architecture for F-RON in CPS.
BLCS can accomplish the secure cross-domain control among tripartite controllers verification.
- Score: 14.424965817318816
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Cyber-physical system (CPS) has operated, controlled and coordinated the
physical systems integrated by a computing and communication core applied in
industry 4.0. To accommodate CPS services, fog radio and optical networks
(F-RON) has become an important supporting physical cyber infrastructure taking
advantage of both the inherent ubiquity of wireless technology and the large
capacity of optical networks. However, cyber security is the biggest issue in
CPS scenario as there is a tradeoff between security control and privacy
exposure in F-RON. To deal with this issue, we propose a brain-like based
distributed control security (BLCS) architecture for F-RON in CPS, by
introducing a brain-like security (BLS) scheme. BLCS can accomplish the secure
cross-domain control among tripartite controllers verification in the scenario
of decentralized F-RON for distributed computing and communications, which has
no need to disclose the private information of each domain against
cyber-attacks. BLS utilizes parts of information to perform control
identification through relation network and deep learning of behavior library.
The functional modules of BLCS architecture are illustrated including various
controllers and brain-like knowledge base. The interworking procedures in
distributed control security modes based on BLS are described. The overall
feasibility and efficiency of architecture are experimentally verified on the
software defined network testbed in terms of average mistrust rate, path
provisioning latency, packet loss probability and blocking probability. The
emulation results are obtained and dissected based on the testbed.
Related papers
- Assessing Effectiveness of Cyber Essentials Technical Controls [14.373036416154397]
We reconstruct 45 breaches mapped to MiTRE ATT&CK using an Incident Fault Tree approach.
Our method reveals the intersections where the placement of controls could have protected organisations.
We identify appropriate Cyber Essential controls and/or Additional Controls for these vulnerable intersections.
arXiv Detail & Related papers (2024-06-21T14:52:36Z) - Security Decisions for Cyber-Physical Systems based on Solving Critical Node Problems with Vulnerable Nodes [3.072340427031969]
This work is based on solving the Critical Node Cut Problem with Vulnerable Vertices (CNP-V) - an NP-hard computational problem originally motivated by isolating vulnerable people in case of a pandemic.
arXiv Detail & Related papers (2024-06-12T11:31:46Z) - Building Hybrid B-Spline And Neural Network Operators [0.0]
Control systems are indispensable for ensuring the safety of cyber-physical systems (CPS)
We propose a novel strategy that combines the inductive bias of B-splines with data-driven neural networks to facilitate real-time predictions of CPS behavior.
arXiv Detail & Related papers (2024-06-06T21:54:59Z) - SISSA: Real-time Monitoring of Hardware Functional Safety and
Cybersecurity with In-vehicle SOME/IP Ethernet Traffic [49.549771439609046]
We propose SISSA, a SOME/IP communication traffic-based approach for modeling and analyzing in-vehicle functional safety and cyber security.
Specifically, SISSA models hardware failures with the Weibull distribution and addresses five potential attacks on SOME/IP communication.
Extensive experimental results show the effectiveness and efficiency of SISSA.
arXiv Detail & Related papers (2024-02-21T03:31:40Z) - Effective Intrusion Detection in Heterogeneous Internet-of-Things Networks via Ensemble Knowledge Distillation-based Federated Learning [52.6706505729803]
We introduce Federated Learning (FL) to collaboratively train a decentralized shared model of Intrusion Detection Systems (IDS)
FLEKD enables a more flexible aggregation method than conventional model fusion techniques.
Experiment results show that the proposed approach outperforms local training and traditional FL in terms of both speed and performance.
arXiv Detail & Related papers (2024-01-22T14:16:37Z) - Quantum Key Distribution for Critical Infrastructures: Towards Cyber
Physical Security for Hydropower and Dams [0.4166512373146748]
Hydropower facilities are often remotely monitored or controlled from a centralized remote-control room.
Communications may use the internet to remote control a facility's control systems, or it may involve sending control commands over a network from a control room to a machine.
The content could be encrypted and decrypted using a public key to protect the communicated information.
In contrast, quantum key distribution (QKD) is not based upon a computational problem, and offers an alternative to conventional public-key cryptography.
arXiv Detail & Related papers (2023-10-19T18:59:23Z) - Practical quantum secure direct communication with squeezed states [55.41644538483948]
We report the first table-top experimental demonstration of a CV-QSDC system and assess its security.
This realization paves the way into future threat-less quantum metropolitan networks, compatible with coexisting advanced wavelength division multiplexing (WDM) systems.
arXiv Detail & Related papers (2023-06-25T19:23:42Z) - FedDiSC: A Computation-efficient Federated Learning Framework for Power
Systems Disturbance and Cyber Attack Discrimination [1.0621485365427565]
This paper proposes a novel Federated Learning-based privacy-preserving and communication-efficient attack detection framework, known as FedDiSC.
We put forward a representation learning-based Deep Auto-Encoder network to accurately detect power system and cybersecurity anomalies.
To adapt our proposed framework to the timeliness of real-world cyberattack detection in SGs, we leverage the use of a gradient privacy-preserving quantization scheme known as DP-SIGNSGD.
arXiv Detail & Related papers (2023-04-07T13:43:57Z) - Recursively Feasible Probabilistic Safe Online Learning with Control Barrier Functions [60.26921219698514]
We introduce a model-uncertainty-aware reformulation of CBF-based safety-critical controllers.
We then present the pointwise feasibility conditions of the resulting safety controller.
We use these conditions to devise an event-triggered online data collection strategy.
arXiv Detail & Related papers (2022-08-23T05:02:09Z) - BarrierNet: A Safety-Guaranteed Layer for Neural Networks [50.86816322277293]
BarrierNet allows the safety constraints of a neural controller be adaptable to changing environments.
We evaluate them on a series of control problems such as traffic merging and robot navigations in 2D and 3D space.
arXiv Detail & Related papers (2021-11-22T15:38:11Z) - Safe RAN control: A Symbolic Reinforcement Learning Approach [62.997667081978825]
We present a Symbolic Reinforcement Learning (SRL) based architecture for safety control of Radio Access Network (RAN) applications.
We provide a purely automated procedure in which a user can specify high-level logical safety specifications for a given cellular network topology.
We introduce a user interface (UI) developed to help a user set intent specifications to the system, and inspect the difference in agent proposed actions.
arXiv Detail & Related papers (2021-06-03T16:45:40Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.