Abstract
Due to the multi-scale fusion of cyber-physical systems, attackers can attack the physical space based on cyber space intentionally. This process can cause cascading failures and then in sharp contrast with the previous physical space. Thus, how to effectively evaluate the security of cyber-physical systems becomes critical. In this paper, we model the cyber-physical systems and then analyze the cascading failure process under target attack strategy. After doing that, based on the comparative analysis of simulation experiments, we analyze the main factors affecting the security of the cyber-physical system.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Zhang, Y.: Health-CPS: healthcare cyber-physical system assisted by cloud and big data. IEEE Syst. J. 11(1), 88–95 (2017)
Zhang, Y.: Agent and cyber-physical system based self-organizing and self-adaptive intelligent shop floor. IEEE Trans. Ind. Inform 99, 1 (2017)
Cintuglu, M.H.: A Survey on smart grid cyber-physical system testbeds. IEEE Commun. Surv Tutorials 19(1), 446–464 (2017)
Li, B.: DDOA: a Dirichlet-based detection scheme for opportunistic attacks in smart grid cyber-physical system. IEEE Trans. Inf. Forensics Secur. 11(11), 2415–2425 (2016)
Li, B.: Distributed host-based collaborative detection for false data injection attacks in smart grid cyber-physical system. J. Parallel Distrib. Comput. 103, 32–41 (2016)
Yağan, O.: Optimal allocation of interconnecting links in cyber-physical systems: interdependence, cascading failures, and robustness. IEEE Trans. Parallel Distrib. Syst. 23(9), 1708–1720 (2012)
Saad, W., Saad, W., Maham, B.: A colonel blotto game for interdependence-aware cyber-physical systems security in smart cities. In: International Workshop on Science of Smart City Operations and Platforms Engineering, pp. 7–12. ACM (2017)
Zeng, X.: E-AUA: an efficient anonymous user authentication protocol for mobile IoT. IEEE Internet Things J. 99, 1 (2018)
Xu, G.: A novel efficient MAKA protocol with desynchronization for anonymous roaming service in global mobility networks. J. Netw. Comput. Appl. 107, 83–92 (2018)
Zhang, G.: Cascading failures of power grids caused by line breakdown. Int. J. Circuit Theory Appl. 43(12), 1807–1814 (2016)
Liao, W.: Cascading failure attacks in the power system: a stochastic game perspective. IEEE Internet Things J. 4(6), 2247–2259 (2017)
Xu, G.: An algorithm on fairness verification of mobile sink routing in wireless sensor network. Pers. Ubiquit. Comput. 17(5), 851–864 (2013)
Dey, P.: Impact of topology on the propagation of cascading failure in power grid. IEEE Trans. Smart Grid. 7(4), 1970–1978 (2017)
Zhang, X.: Modeling the dynamics of cascading failures in power systems. IEEE J. Emerg. Sel. Top. Circuits Syst. 7(2), 192–204 (2017)
Yazdi, M.: Failure probability analysis by employing fuzzy fault tree analysis. Int. J. Syst. Assur. Eng. Manage. 8(2), 1–17 (2017)
Rampurkar, V.: Cascading failure analysis for indian power grid. IEEE Trans. Smart Grid 7(4), 1951–1960 (2016)
Younes, M.B.: A performance evaluation of a fault-tolerant path recommendation protocol for smart transportation system. Wirel. Netw. 11, 1–16 (2016)
Sanislav, T., Zeadally, S., Mois, G.: Multi-agent architecture for reliable Cyber-Physical Systems (CPS). In: Computers and Communications, pp. 170–175. IEEE (2017)
Yang, G.: Synchronization control of cyber physical systems during malicious stochastic attacks. J. Tsinghua Univ. 1, 14–19 (2018)
Chen, X., Zhou, Y., Zhou, H.: Analysis of production data manipulation attacks in petroleum cyber-physical systems. In: International Conference on Computer-Aided Design, p. 108. ACM (2016)
Sabaliauskaite, G., Mathur, A.P.: Aligning cyber-physical system safety and security. In: Cardin, M.A., Krob, D., Lui, P., Tan, Y., Wood, K. (eds) Complex Systems Design & Management Asia, pp. 41–53. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-12544-2_4
Fang, Y., Zio, E.: Optimizing the resilience of interdependent infrastructure systems against target attacks. In: International Conference on System Reliability and Safety, pp. 62–67. IEEE (2018)
Acknowledgements
This work was supported by National Natural Science Foundation of China (Grant No. 61602418, No. 61672468), Zhejiang Provincial Natural Science Foundation of China (Grant No. LQ16F020002), Social development project of Zhejiang provincial public technology research (Grant No. 2016C33168), MOE (Ministry of Education in China) Project of Humanity and Social Science (Grant No. 15YJCZH125) and the Opening Project of Shanghai Key Laboratory of Integrated Administration Technologies for Information Security (Grant No. AGK2018001).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Peng, H., Kan, Z., Zhao, D., Han, J., Hu, Z. (2019). Security Assessment for Cascading Failures of Cyber-Physical Systems Under Target Attack Strategy. In: Li, J., Liu, Z., Peng, H. (eds) Security and Privacy in New Computing Environments. SPNCE 2019. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 284. Springer, Cham. https://doi.org/10.1007/978-3-030-21373-2_11
Download citation
DOI: https://doi.org/10.1007/978-3-030-21373-2_11
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-21372-5
Online ISBN: 978-3-030-21373-2
eBook Packages: Computer ScienceComputer Science (R0)