Robustness improvement for cyber physical system based on an optimization model of interdependent constraints.

Chaos

The College of Information Science and Electronic Engineering, Zhejiang University, Hangzhou 310027, China.

Published: March 2021

With the rapid development of information technology, traditional infrastructure networks have evolved into cyber physical systems (CPSs). However, this evolution has brought along with it cyber failures, in addition to physical failures, which can affect the safe and stable operation of the whole system. In light of this, in this paper, we propose an interdependence-constrained optimization model to improve the robustness of the cyber physical system. The proposed model includes not only the realistic physical law but also the interdependence between the physical network and the cyber network. However, this model is highly nonlinear and cannot be solved directly. Therefore, we transform the model into a bi-level mixed integer linear programming problem, which can be easily and effectively solved in polynomial time. We conduct the simulation based on standard Institute of Electrical and Electronics Engineers test cases and study the impact of the disaster level and coupling strength on the robustness of the whole system. The simulation results show that our proposed model can effectively improve the robustness of the cyber physical system. Moreover, we compare the performance of the power supply in different CPSs, which have different network structures of the cyber network. Our work can provide useful instructions for system operators to improve the robustness of CPSs after extreme events happen in them.

Download full-text PDF

Source
http://dx.doi.org/10.1063/5.0043601DOI Listing

Publication Analysis

Top Keywords

cyber physical
16
physical system
12
improve robustness
12
optimization model
8
robustness cyber
8
proposed model
8
cyber network
8
cyber
7
physical
7
system
6

Similar Publications

The Internet of Vehicles (IoV), a key component of smart transportation systems, leverages 5G communication for low-latency data transmission, facilitating real-time interactions between vehicles, roadside units (RSUs), and sensor networks. However, the open nature of 5G communication channels exposes IoV systems to significant security threats, such as eavesdropping, replay attacks, and message tampering. To address these challenges, this paper proposes the Efficient Cluster-based Mutual Authentication and Key Update Protocol (ECAUP) designed to secure IoV systems within 5G-enabled sensor networks.

View Article and Find Full Text PDF

Cybersecurity Solutions for Industrial Internet of Things-Edge Computing Integration: Challenges, Threats, and Future Directions.

Sensors (Basel)

January 2025

Department of Computer Science and Engineering, Yanbu Industrial College, Royal Commission for Jubail and Yanbu, Yanbu Industrial City 41912, Saudi Arabia.

This paper provides the complete details of current challenges and solutions in the cybersecurity of cyber-physical systems (CPS) within the context of the IIoT and its integration with edge computing (IIoT-edge computing). We systematically collected and analyzed the relevant literature from the past five years, applying a rigorous methodology to identify key sources. Our study highlights the prevalent IIoT layer attacks, common intrusion methods, and critical threats facing IIoT-edge computing environments.

View Article and Find Full Text PDF

A comprehensive review of digital twin in healthcare in the scope of simulative health-monitoring.

Digit Health

January 2025

Faculty IV: School of Science and Technology, Institute for Knowledge-Based Systems and Knowledge Management, University of Siegen, Siegen, Germany.

Objective: Digital twins (DTs) emerged in the wake of Industry 4.0 and the creation of cyber-physical systems, motivated by the increased availability and variability of machine and sensor data. DTs are a concept to create a digital representation of a physical entity and imitate its behavior, while feeding real-world data to the digital counterpart, thus allowing enabling digital simulations related to the real-world entity.

View Article and Find Full Text PDF

The growing prevalence of cybersecurity threats is a significant concern for railway systems, which rely on an extensive network of onboard and trackside sensors. These threats have the potential to compromise the safety of railway operations and the integrity of the railway infrastructure itself. This paper aims to examine the current cybersecurity measures in use, identify the key vulnerabilities that they address, and propose solutions for enhancing the security of railway infrastructures.

View Article and Find Full Text PDF

Current technologies could potentially solve many of the urban problems in today's cities. Many cities already possess cameras, drones, thermometers, pollution air gauges, and other sensors. However, most of these have been designated for use in individual domains within City Hall, creating a maze of individual data domains that cannot connect to each other.

View Article and Find Full Text PDF

Want AI Summaries of new PubMed Abstracts delivered to your In-box?

Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!