Abstract
Due to the decentralized nature and security attributes of blockchain, cyber-physical systems (CPS) emerge more and more interdependent. However, an important challenge of such interdependent CPS is the cascading failures. Thus, how to analyze the invulnerability of interdependent coupled CPS becomes critical and indispensable. In this paper, we have modeled the interdependent CPS in the blockchain environment, and analyzed the cascading failures process based on the network characteristics. Besides, based on simulation experiments, we analyze the main factor affecting the invulnerability of CPS.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Al-Rubaye, S.: Industrial internet of things driven by SDN platform for smart grid resiliency. IEEE Internet Things J. 6(1), 267–277 (2017)
Li, J.Q.: Industrial internet: a survey on the enabling technologies, applications, and challenges. IEEE Commun. Surv. Tutor. 19(3), 1504–1526 (2017)
Mayer, S.: An open semantic framework for the industrial internet of things. IEEE Intell. Syst. 32(1), 96–101 (2017)
Karnouskos, S.: Stuxnet worm impact on industrial cyber-physical system security. In: Conference on IEEE Industrial Electronics Society, pp. 4490–4494. IEEE (2011)
Jia, D.: A survey on platoon-based vehicular cyber-physical systems. IEEE Commun. Surv. Tutor. 18(1), 263–284 (2017)
Colombo, A.W.: Industrial automation based on cyber-physical systems technologies. Comput. Ind. 81(C), 11–25 (2016)
Wei, A.: Adaptive cyber-physical system attack detection and reconstruction with application to power systems. IET Control Theory Appl. 10(12), 1458–1468 (2016)
Pasqualetti, F.: Attack detection and identification in cyber-physical systems – part I: models and fundamental limitations. IEEE Trans. Autom. Control 58(11), 2715–2729 (2012)
Natoli, C.: The balance attack against proof-of-work blockchains: the R3 testbed as an example (2016)
Natoli, C.: The balance attack or why forkable blockchains are Ill-Suited for consortium. In: IEEE/IFIP International Conference on Dependable Systems and Networks, pp. 579–590. IEEE (2017)
Pass, R., Seeman, L., Shelat, A.: Analysis of the blockchain protocol in asynchronous networks. In: Coron, J.-S., Nielsen, J.B. (eds.) EUROCRYPT 2017. LNCS, vol. 10211, pp. 643–673. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-56614-6_22
Dong, Z.: Blockchain: a secure, decentralized, trusted cyber infrastructure solution for future energy systems. J. Mod. Power Syst. Clean Energy 6(5), 958–967 (2018)
Cebe, M.: Block4Forensic: an integrated lightweight blockchain framework for forensics applications of connected vehicles (2018)
Kosba, A., Miller, A., Shi, E.: Hawk: the blockchain model of cryptography and privacy-preserving smart contracts. In: Security & Privacy, pp. 839–858. IEEE (2016)
Amin, S.: In quest of benchmarking security risks to cyber-physical systems. IEEE Netw. 27(1), 19–24 (2013)
Shin, D.H.: Cascading effects in interdependent networks. IEEE Netw. 28(4), 82–87 (2014)
Huang, C.: A study on web security incidents in China by analyzing vulnerability disclosure platforms. Comput. Secur. 58(C), 47–62 (2016)
Rungger, M.: A notion of robustness for cyber-physical systems. IEEE Trans. Autom. Control 61(8), 2108–2123 (2016)
Acknowledgements
This work was supported by National Natural Science Foundation of China (Grant No. 61602418), Zhejiang Provincial Natural Science Foundation of China (Grant No. LQ16F020002), Social development project of Zhejiang provincial public technology research (Grant No. 2016C33168), MOE (Ministry of Education in China) Project of Humanity and Social Science (Grant No. 15YJCZH125) and the Opening Project of Shanghai Key Laboratory of Integrated Administration Technologies for Information Security (Grant No. AGK2018001).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Peng, H., Kan, Z., Zhao, D., Zheng, Z., Lin, F. (2019). Invulnerability Assessment of Cyber-Physics Systems for Blockchain Environment. In: Li, J., Liu, Z., Peng, H. (eds) Security and Privacy in New Computing Environments. SPNCE 2019. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 284. Springer, Cham. https://doi.org/10.1007/978-3-030-21373-2_36
Download citation
DOI: https://doi.org/10.1007/978-3-030-21373-2_36
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-21372-5
Online ISBN: 978-3-030-21373-2
eBook Packages: Computer ScienceComputer Science (R0)