2016 IEEE Congress on Evolutionary Computation (CEC) 2016
DOI: 10.1109/cec.2016.7743900
|View full text |Cite
|
Sign up to set email alerts
|

The security challenges in the IoT enabled cyber-physical systems and opportunities for evolutionary computing & other computational intelligence

Abstract: Abstract-Internet of Things (IoT) has given rise to the fourth industrial revolution (Industrie 4.0), and it brings great benefits by connecting people, processes and data. However, cybersecurity has become a critical challenge in the IoT enabled cyber physical systems, from connected supply chain, Big Data produced by huge amount of IoT devices, to industry control systems. Evolutionary computation combining with other computational intelligence will play an important role for cybersecurity, such as artificia… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
56
0
1

Year Published

2016
2016
2022
2022

Publication Types

Select...
7
2

Relationship

1
8

Authors

Journals

citations
Cited by 105 publications
(57 citation statements)
references
References 15 publications
0
56
0
1
Order By: Relevance
“…Unlike previous generations of technological development, these challenges go beyond the sphere of control of manufacturers and suppliers. The advent of the Internet-of-Things means that every consumer must now be concerned with cybersecurity and privacy, and needs to have confidence in manufacturing and business processes leading up to supply and customer care (He et al 2016). Approaches to risk and security management clearly require that analysis goes beyond the purely technical to address activities of people in relation to systems with which they interact, or seek to influence (Sadok and Spagnoletti 2011).…”
Section: Concernsmentioning
confidence: 99%
“…Unlike previous generations of technological development, these challenges go beyond the sphere of control of manufacturers and suppliers. The advent of the Internet-of-Things means that every consumer must now be concerned with cybersecurity and privacy, and needs to have confidence in manufacturing and business processes leading up to supply and customer care (He et al 2016). Approaches to risk and security management clearly require that analysis goes beyond the purely technical to address activities of people in relation to systems with which they interact, or seek to influence (Sadok and Spagnoletti 2011).…”
Section: Concernsmentioning
confidence: 99%
“…Open communication protocols are increasingly included in CPS architectures, especially in CPS‐IoT applications . Despite their short ranges, wireless communication technologies such as Radio‐frequency identification (RFID) and Near‐field communications (NFC) are not exempt from intentional attacks .…”
Section: A General Representation Of Cpss For Combined Safety and Secmentioning
confidence: 99%
“…As IoT devices have increased in computing capability and extensively used to handle sensitive tasks and information, the industry has responded by providing secure methodologies and technologies to enhance trustworthiness and ensure correct function of the devices [7], [8]. These technologies involve both hardware and software, along with practices for design and development.…”
Section: Introductionmentioning
confidence: 99%