Security Assessment for Cascading Failures of Cyber-Physical Systems Under Target Attack Strategy

  • Conference paper
  • First Online:
Security and Privacy in New Computing Environments (SPNCE 2019)

Abstract

Due to the multi-scale fusion of cyber-physical systems, attackers can attack the physical space based on cyber space intentionally. This process can cause cascading failures and then in sharp contrast with the previous physical space. Thus, how to effectively evaluate the security of cyber-physical systems becomes critical. In this paper, we model the cyber-physical systems and then analyze the cascading failure process under target attack strategy. After doing that, based on the comparative analysis of simulation experiments, we analyze the main factors affecting the security of the cyber-physical system.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Zhang, Y.: Health-CPS: healthcare cyber-physical system assisted by cloud and big data. IEEE Syst. J. 11(1), 88–95 (2017)

    Article  Google Scholar 

  2. Zhang, Y.: Agent and cyber-physical system based self-organizing and self-adaptive intelligent shop floor. IEEE Trans. Ind. Inform 99, 1 (2017)

    Google Scholar 

  3. Cintuglu, M.H.: A Survey on smart grid cyber-physical system testbeds. IEEE Commun. Surv Tutorials 19(1), 446–464 (2017)

    Article  Google Scholar 

  4. Li, B.: DDOA: a Dirichlet-based detection scheme for opportunistic attacks in smart grid cyber-physical system. IEEE Trans. Inf. Forensics Secur. 11(11), 2415–2425 (2016)

    Article  Google Scholar 

  5. Li, B.: Distributed host-based collaborative detection for false data injection attacks in smart grid cyber-physical system. J. Parallel Distrib. Comput. 103, 32–41 (2016)

    Article  Google Scholar 

  6. Yağan, O.: Optimal allocation of interconnecting links in cyber-physical systems: interdependence, cascading failures, and robustness. IEEE Trans. Parallel Distrib. Syst. 23(9), 1708–1720 (2012)

    Article  Google Scholar 

  7. Saad, W., Saad, W., Maham, B.: A colonel blotto game for interdependence-aware cyber-physical systems security in smart cities. In: International Workshop on Science of Smart City Operations and Platforms Engineering, pp. 7–12. ACM (2017)

    Google Scholar 

  8. Zeng, X.: E-AUA: an efficient anonymous user authentication protocol for mobile IoT. IEEE Internet Things J. 99, 1 (2018)

    Google Scholar 

  9. Xu, G.: A novel efficient MAKA protocol with desynchronization for anonymous roaming service in global mobility networks. J. Netw. Comput. Appl. 107, 83–92 (2018)

    Article  Google Scholar 

  10. Zhang, G.: Cascading failures of power grids caused by line breakdown. Int. J. Circuit Theory Appl. 43(12), 1807–1814 (2016)

    Article  Google Scholar 

  11. Liao, W.: Cascading failure attacks in the power system: a stochastic game perspective. IEEE Internet Things J. 4(6), 2247–2259 (2017)

    Article  Google Scholar 

  12. Xu, G.: An algorithm on fairness verification of mobile sink routing in wireless sensor network. Pers. Ubiquit. Comput. 17(5), 851–864 (2013)

    Article  Google Scholar 

  13. Dey, P.: Impact of topology on the propagation of cascading failure in power grid. IEEE Trans. Smart Grid. 7(4), 1970–1978 (2017)

    Article  Google Scholar 

  14. Zhang, X.: Modeling the dynamics of cascading failures in power systems. IEEE J. Emerg. Sel. Top. Circuits Syst. 7(2), 192–204 (2017)

    Article  Google Scholar 

  15. Yazdi, M.: Failure probability analysis by employing fuzzy fault tree analysis. Int. J. Syst. Assur. Eng. Manage. 8(2), 1–17 (2017)

    Google Scholar 

  16. Rampurkar, V.: Cascading failure analysis for indian power grid. IEEE Trans. Smart Grid 7(4), 1951–1960 (2016)

    Article  Google Scholar 

  17. Younes, M.B.: A performance evaluation of a fault-tolerant path recommendation protocol for smart transportation system. Wirel. Netw. 11, 1–16 (2016)

    Google Scholar 

  18. Sanislav, T., Zeadally, S., Mois, G.: Multi-agent architecture for reliable Cyber-Physical Systems (CPS). In: Computers and Communications, pp. 170–175. IEEE (2017)

    Google Scholar 

  19. Yang, G.: Synchronization control of cyber physical systems during malicious stochastic attacks. J. Tsinghua Univ. 1, 14–19 (2018)

    Google Scholar 

  20. Chen, X., Zhou, Y., Zhou, H.: Analysis of production data manipulation attacks in petroleum cyber-physical systems. In: International Conference on Computer-Aided Design, p. 108. ACM (2016)

    Google Scholar 

  21. Sabaliauskaite, G., Mathur, A.P.: Aligning cyber-physical system safety and security. In: Cardin, M.A., Krob, D., Lui, P., Tan, Y., Wood, K. (eds) Complex Systems Design & Management Asia, pp. 41–53. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-12544-2_4

    Google Scholar 

  22. Fang, Y., Zio, E.: Optimizing the resilience of interdependent infrastructure systems against target attacks. In: International Conference on System Reliability and Safety, pp. 62–67. IEEE (2018)

    Google Scholar 

Download references

Acknowledgements

This work was supported by National Natural Science Foundation of China (Grant No. 61602418, No. 61672468), Zhejiang Provincial Natural Science Foundation of China (Grant No. LQ16F020002), Social development project of Zhejiang provincial public technology research (Grant No. 2016C33168), MOE (Ministry of Education in China) Project of Humanity and Social Science (Grant No. 15YJCZH125) and the Opening Project of Shanghai Key Laboratory of Integrated Administration Technologies for Information Security (Grant No. AGK2018001).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Dandan Zhao .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Peng, H., Kan, Z., Zhao, D., Han, J., Hu, Z. (2019). Security Assessment for Cascading Failures of Cyber-Physical Systems Under Target Attack Strategy. In: Li, J., Liu, Z., Peng, H. (eds) Security and Privacy in New Computing Environments. SPNCE 2019. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 284. Springer, Cham. https://doi.org/10.1007/978-3-030-21373-2_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-21373-2_11

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-21372-5

  • Online ISBN: 978-3-030-21373-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics

Navigation