2021
DOI: 10.1109/tii.2020.3032968
|View full text |Cite
|
Sign up to set email alerts
|

Securing Industrial Cyber–Physical Systems: A Run-Time Multilayer Monitoring

Abstract: Industrial Cyber-Physical Systems (ICPSs) are widely deployed in monitoring and control of the nation's critical industrial processes such as water distribution networks and power grids. ICPSs are the tight integration of cyber (software) and physical entities connected via communication networks. Communication networks are typically realised via wireless channels to reduce the cost of wires and installation. However, they are also inherently unreliable, easy to disrupt and subvert, which makes them a potentia… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 12 publications
(6 citation statements)
references
References 32 publications
0
6
0
Order By: Relevance
“…In this research, we focused on security and did not optimize performance well; hence, finding a balance between security and performance in the next work will be one of the focuses of our research work. With the advent of Industry 4.0, this protocol will involve more application scenarios [24,25], such as cloud center-based device data transmission and computing migration, which requires multifeature authentication (such as biometrics, smart cards) verification. Protocol security solutions based on these application scenarios need to consider the actual environment and development trends [26].…”
Section: Discussionmentioning
confidence: 99%
“…In this research, we focused on security and did not optimize performance well; hence, finding a balance between security and performance in the next work will be one of the focuses of our research work. With the advent of Industry 4.0, this protocol will involve more application scenarios [24,25], such as cloud center-based device data transmission and computing migration, which requires multifeature authentication (such as biometrics, smart cards) verification. Protocol security solutions based on these application scenarios need to consider the actual environment and development trends [26].…”
Section: Discussionmentioning
confidence: 99%
“…Reference [115] developed a methodology called Multilayer Run-Time Security Monitor (ML-RSM), which is capable of identifying divergences caused by communications and attacks on the application layer, as well as preventing the spread to other control layers. The robustness of this approach is tested in a water distribution monitoring system [115]. To monitor and secure ICPSs, the author of [116] developed a robust tool capable of identifying possible cyberattacks through hierarchically distributed intrusion detection.…”
Section: Cybersecurity On Monitoring Systemsmentioning
confidence: 99%
“…Experimental study of intelligent home intrusion detection [124] For monitoring industrial systems, industrial cyber-physical systems (ICPSs) are used, consisting of a link between the software and hardware parts of the system. Reference [115] developed a methodology called Multilayer Run-Time Security Monitor (ML-RSM), which is capable of identifying divergences caused by communications and attacks on the application layer, as well as preventing the spread to other control layers. The robustness of this approach is tested in a water distribution monitoring system [115].…”
Section: Cpsmentioning
confidence: 99%
“…The performance evaluation consists of simulating the workflow scheduling algorithms and measuring their execution times, since the overall goal is to decrease the probability of errors caused by transient faults while ensuring security services. Malicious activities are considered in [35] where the communication layer is monitored to guarantee reliability and to avoid the propagation of security threats at the application level. He et al [12] survey malicious attacks in MAS and report those considered in this paper, i.e., deception attacks including false data injection.…”
Section: Related Workmentioning
confidence: 99%