Skip to main content

Robustness Enhancement Analysis of CPS Systems Under the Swapping Strategies Between Different Networks

  • Conference paper
  • First Online:
Frontiers in Cyber Security (FCS 2020)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1286))

Included in the following conference series:

  • 1135 Accesses

Abstract

With the advent of the Internet of Everything, the robustness of cyber physics system (CPS) has received more attention and research. In this paper, for the heterogeneous CPS network environment, based on the exchange edge enhancement strategy between the neutron networks of the system, we study the robustness of CPS. Based on the performance analysis of the most significant functional component in the system, we comparatively analyze the robustness of CPS under random attacks. Our simulation results show that the system’s heterogeneity will affect the system reliability under the exchange-side strategy. Besides, we have drawn a graph of node central values after different approaches to explain and supplement the above analysis conclusions.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Banerjee, S., Balas, V.E., Pandey, A., Bouzefrane, S.: Towards intelligent optimization of design strategies of cyber-physical systems: measuring efficacy through evolutionary computations. In: Llanes Santiago, O., Cruz Corona, C., Silva Neto, A.J., Verdegay, J.L. (eds.) Computational Intelligence in Emerging Technologies for Engineering Applications. SCI, vol. 872, pp. 73–101. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-34409-2_5

    Chapter  Google Scholar 

  2. Bergamini, E., Borassi, M., Crescenzi, P., Marino, A., Meyerhenke, H.: Computing top-k closeness centrality faster in unweighted graphs. ACM Trans. Knowl. Discov. Data (TKDD) 13(5), 1–40 (2019)

    Article  MATH  Google Scholar 

  3. Buldyrev, S.V., Parshani, R., Paul, G., Stanley, H.E., Havlin, S.: Catastrophic cascade of failures in interdependent networks. Nature 464(7291), 1025–1028 (2010)

    Article  Google Scholar 

  4. Burleson-Lesser, K., Morone, F., Tomassone, M.S., Makse, H.A.: K-core robustness in ecological and financial networks. Sci. Rep. 10(1), 1–14 (2020)

    Article  Google Scholar 

  5. Chattopadhyay, S., Dai, H., Hosseinalipour, S., et al.: Designing optimal interlink patterns to maximize robustness of interdependent networks against cascading failures. IEEE Trans. Commun. 65(9), 3847–3862 (2017)

    Article  Google Scholar 

  6. Chen, L., Yue, D., Dou, C.: Optimization on vulnerability analysis and redundancy protection in interdependent networks. Phys. A: Stat. Mech. Appl. 523, 1216–1226 (2019)

    Article  Google Scholar 

  7. Chen, L., Yue, D., Dou, C., Chen, J., Cheng, Z.: Study on attack paths of cyber attack in cyber-physical power systems. IET Gener. Transm. Distrib. 14(12), 2352–2360 (2020)

    Article  Google Scholar 

  8. Chen, L., Yue, D., Dou, C., Cheng, Z., Chen, J.: Robustness of cyber-physical power systems in cascading failure: survival of interdependent clusters. Int. J. Electr. Power Energy Syst. 114, 105374 (2020)

    Article  Google Scholar 

  9. Dong, G., Chen, Y., Wang, F., Du, R., Tian, L., Stanley, H.E.: Robustness on interdependent networks with a multiple-to-multiple dependent relationship. Chaos: Interdisc. J. Nonlinear Sci. 29(7), 073107 (2019)

    Article  MathSciNet  MATH  Google Scholar 

  10. Gazafroudi, A.S., Shafie-khah, M., Fitiwi, D.Z., Santos, S.F., Corchado, J.M., Catalão, J.P.S.: Impact of strategic behaviors of the electricity consumers on power system reliability. In: Amini, M.H., Boroojeni, K.G., Iyengar, S.S., Pardalos, P.M., Blaabjerg, F., Madni, A.M. (eds.) Sustainable Interdependent Networks II. SSDC, vol. 186, pp. 193–215. Springer, Cham (2019). https://doi.org/10.1007/978-3-319-98923-5_11

    Chapter  Google Scholar 

  11. Huang, Z., Wang, C., Stojmenovic, M., Nayak, A.: Characterization of cascading failures in interdependent cyber-physical systems. IEEE Trans. Comput. 64(8), 2158–2168 (2015)

    Article  MathSciNet  MATH  Google Scholar 

  12. Iri, N., Kosut, O.: Fine asymptotics for universal one-to-one compression of parametric sources. IEEE Trans. Inf. Theory 65(4), 2442–2458 (2019)

    Article  MathSciNet  MATH  Google Scholar 

  13. Ishigaki, G., Devic, S., Gour, R., Jue, J.P.: Deeppr: progressive recovery for interdependent VNFs with deep reinforcement learning. IEEE J. Sel. Commun. (2020)

    Google Scholar 

  14. Javed, Y., Felemban, M., Shawly, T., Kobes, J., Ghafoor, A.: A partition-driven integrated security architecture for cyberphysical systems. Computer 53(3), 47–56 (2020)

    Article  Google Scholar 

  15. Jerraya, A.A.: Hardware/software interface codesign for cyber physical systems. In: Bhattacharyya, S.S., Potkonjak, M., Velipasalar, S. (eds.) Embedded, Cyber-Physical, and IoT Systems, pp. 73–77. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-16949-7_3

    Chapter  Google Scholar 

  16. Jiang, J., Xia, Y., Xu, S., Shen, H.L., Wu, J.: An asymmetric interdependent networks model for cyber-physical systems. Chaos: Interdisc. J. Nonlinear Sci. 30(5), 053135 (2020)

    Article  MathSciNet  Google Scholar 

  17. Kong, P.Y.: Optimal configuration of interdependence between communication network and power grid. IEEE Trans. Ind. Inform. 15(7), 4054–4065 (2019)

    Article  Google Scholar 

  18. Lai, R., Qiu, X., Wu, J.: Robustness of asymmetric cyber-physical power systems against cyber attacks. IEEE Access 7, 61342–61352 (2019)

    Article  Google Scholar 

  19. Lee, L., Hu, P.: Vulnerability analysis of cascading dynamics in smart grids under load redistribution attacks. Int. J. Electr. Power Energy Syst. 111, 182–190 (2019)

    Article  Google Scholar 

  20. Majchrzak, T.A., Kaindl, H., Grønli, T.M.: Introduction to the minitrack on software development for mobile devices, the internet-of-things, and cyber-physical systems. In: Proceedings of the 53rd Hawaii International Conference on System Sciences (2020)

    Google Scholar 

  21. Mekonnen, Y., Namuduri, S., Burton, L., Sarwat, A., Bhansali, S.: Machine learning techniques in wireless sensor network based precision agriculture. J. Electrochem. Soc. 167(3), 037522 (2019)

    Article  Google Scholar 

  22. Newman, M.: Networks. Oxford University Press, United Kingdom (2018)

    Book  MATH  Google Scholar 

  23. Ni, Z., Paul, S.: A multistage game in smart grid security: a reinforcement learning solution. IEEE Trans. Neural Netw. Learn. Syst. 30(9), 2684–2695 (2019)

    Article  MathSciNet  Google Scholar 

  24. Peng, H., Kan, Z., Zhao, D., Han, J.: Security assessment for interdependent heterogeneous cyber physical systems. Mob. Netw. Appl. 12(1), 1–11 (2019)

    Google Scholar 

  25. Peng, H., Liu, C., Zhao, D., Ye, H., Fang, Z., Wang, W.: Security analysis of CPS systems under different swapping strategies in IoT environments. IEEE Access 8, 63567–63576 (2020)

    Article  Google Scholar 

  26. Sen, A., Basu, K.: On connectivity of interdependent networks. In: 2019 IEEE Global Communications Conference (GLOBECOM), pp. 1–6. IEEE (2019)

    Google Scholar 

  27. Singh, A., Cherifi, H., et al.: Centrality-based opinion modeling on temporal networks. IEEE Access 8, 1945–1961 (2019)

    Google Scholar 

  28. Xie, J., Yuan, Y., Fan, Z., Wang, J., Wu, J., Hu, Y.: Eradicating abrupt collapse on single network with dependency groups. Chaos: Interdisc. J. Nonlinear Sci. 29(8), 083111 (2019)

    Article  MathSciNet  MATH  Google Scholar 

  29. Xing, J., Wei, Z., Zhang, G.: A line matching method based on multiple intensity ordering with uniformly spaced sampling. Sensors 20(6), 1639 (2020)

    Article  Google Scholar 

  30. Yamagata, Y., Liu, S., Akazaki, T., Duan, Y., Hao, J.: Falsification of cyber-physical systems using deep reinforcement learning. IEEE Trans. Softw. Eng. (2020)

    Google Scholar 

  31. Zhong, J., Zhang, F., Yang, S., Li, D.: Restoration of interdependent network against cascading overload failure. Phys. A: Stat. Mech. Appl. 514, 884–891 (2019)

    Article  Google Scholar 

  32. Zhou, Y., Lutz, P.E., Ibrahim, E.C., Courtet, P., Tzavara, E., Turecki, G., Belzeaux, R.: Suicide and suicide behaviors: a review of transcriptomics and multiomics studies in psychiatric disorders. J. Neurosci. Res. 98(4), 601–615 (2020)

    Article  Google Scholar 

Download references

Acknowledgments

This work was supported in part by the National Natural Science Foundation of China (Grant No.61902359, No.61672467 and No.61672468), in part by Zhejiang Provincial Natural Science Foundation of China (Grant No.LQ19F030010), and in part by the Opening Project of Shanghai Key Laboratory of Integrated Administration Technologies for Information Security (Grant No.AGK2018001).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Dandan Zhao .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Peng, H., Liu, C., Zhao, D., Han, J., Zheng, Z. (2020). Robustness Enhancement Analysis of CPS Systems Under the Swapping Strategies Between Different Networks. In: Xu, G., Liang, K., Su, C. (eds) Frontiers in Cyber Security. FCS 2020. Communications in Computer and Information Science, vol 1286. Springer, Singapore. https://doi.org/10.1007/978-981-15-9739-8_24

Download citation

  • DOI: https://doi.org/10.1007/978-981-15-9739-8_24

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-15-9738-1

  • Online ISBN: 978-981-15-9739-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics