2018
DOI: 10.1007/978-3-319-75880-0
|View full text |Cite
|
Sign up to set email alerts
|

Cyber Security for Cyber Physical Systems

Abstract: The series "Studies in Computational Intelligence" (SCI) publishes new developments and advances in the various areas of computational intelligence-quickly and with a high quality. The intent is to cover the theory, applications, and design methods of computational intelligence, as embedded in the fields of engineering, computer science, physics and life sciences, as well as the methodologies behind them. The series contains monographs, lecture notes and edited volumes in computational intelligence spanning th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
13
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 25 publications
(17 citation statements)
references
References 0 publications
0
13
0
Order By: Relevance
“…The vulnerabilities and sensor node limitations associated with wireless media pose particular security challenges. Security is normally achieved through a trusted and controlled atmosphere (Undercoffer et al, 2002;Zia & Zomaya, 2006;Ali et al, 2018). Existing security procedures aim to improve the security of WSNs from two aspects, namely security and reliability.…”
Section: Security -Different Types Of Vulnerability Impacting Wsnsmentioning
confidence: 99%
See 3 more Smart Citations
“…The vulnerabilities and sensor node limitations associated with wireless media pose particular security challenges. Security is normally achieved through a trusted and controlled atmosphere (Undercoffer et al, 2002;Zia & Zomaya, 2006;Ali et al, 2018). Existing security procedures aim to improve the security of WSNs from two aspects, namely security and reliability.…”
Section: Security -Different Types Of Vulnerability Impacting Wsnsmentioning
confidence: 99%
“…The diverse set of WSN cyber-attacks can be divided into different categories; from the attackers' perspective, these are normally categorized into internal and external attacks (Yu et al, 2012;Ali et al, 2018). When an attacker is able to access a node by infringement through the cryptographic procedures, this normally occurs through an internal attack.…”
Section: Security -Different Types Of Vulnerability Impacting Wsnsmentioning
confidence: 99%
See 2 more Smart Citations
“…The cyber system can be equipped with feedback facility, which helps in modifying the way the physical system behaves and thus improving the performance of the physical system . Both the physical system and the cyber system can communicate with the outside world independent of each other . The devices that are capable of performing computation, sense, and communicate are considered as physical systems.…”
Section: Introductionmentioning
confidence: 99%