CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Enhancing Security in Cyber Physical Systems through Policy based Trust Management against Deception Attack

by Kanchana Devi V, Ganesan R
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 70 - Number 6
Year of Publication: 2013
Authors: Kanchana Devi V, Ganesan R
10.5120/11965-7805

Kanchana Devi V, Ganesan R . Enhancing Security in Cyber Physical Systems through Policy based Trust Management against Deception Attack. International Journal of Computer Applications. 70, 6 ( May 2013), 10-13. DOI=10.5120/11965-7805

@article{ 10.5120/11965-7805,
author = { Kanchana Devi V, Ganesan R },
title = { Enhancing Security in Cyber Physical Systems through Policy based Trust Management against Deception Attack },
journal = { International Journal of Computer Applications },
issue_date = { May 2013 },
volume = { 70 },
number = { 6 },
month = { May },
year = { 2013 },
issn = { 0975-8887 },
pages = { 10-13 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume70/number6/11965-7805/ },
doi = { 10.5120/11965-7805 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:32:08.967867+05:30
%A Kanchana Devi V
%A Ganesan R
%T Enhancing Security in Cyber Physical Systems through Policy based Trust Management against Deception Attack
%J International Journal of Computer Applications
%@ 0975-8887
%V 70
%N 6
%P 10-13
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The World is moving towards invisible computers, Ubiquitous Computing (any information everywhere), Pervasive Computing (which combines current network technology with wireless computing), Ambient Intelligence (which refers to electronic environments that are sensitive and responsive to the presence of people), and Traditional Embedded System (which is a closed system, not only in the sense of closed physical locations or dedicated hardware, but also closed with respect to the boundaries, where CPS (Cyber Physical Systems) is an open system which integrate computing and communication with monitoring and/or control of entities in physical world. CPS is the integration of several Wireless Sensor Networks. CPS is used in several applications like Automotive electronics, Avionics, Medical systems, Forestry machines, Logistics, Autonomous Vehicles, and Smart Structures. These are all "Critical Systems", the failure of the system will harm the people who depend on it. Some challenges in CPS are low power, no standard interface of sensors, low cost and high accuracy terminal devices and security. A system without security is like bank without locks. "Trust Management" plays an important role in security of CPS, since it is an open system. Trust Management is a dynamic concept which changes depending on the application. Trust is related to the authentication, authorization which comes under the hard side of trust. And also competence, reliability, integrity, timeliness, accuracy which comes under soft side of trust. Secured data or information can be trusted. This paper mainly focuses on the trustworthiness of a sensor and controller, where the trust depends on the reliability of the data sent by them. The Policy Based Trust Management is used to identify the false information sent from sensors/controllers by calculating the weight-age of the data integrity. This ensures the truthfulness of the sensor/controller in the CPS.

References
  1. C. Neuman, 2009, Challenges in Security for Cyber-Physical Systems, in Proc. S&T Workshop Future Directions Cyber-Physical Syst. Security.
  2. Insup Lee, 2010, Cyber-Physical Systems: The Next Computing Revolution Design Automation Conference 2010, Anaheim, California, USA.
  3. Gunnar Peterson, September/October 2010, Don't Trust. And Verify, Co-published by the IEEE Computer and Reliability Societies.
  4. Radha Poovendran, August 2010, Cyber–Physical Systems: Close Encounters between Two Parallel Worlds, Proceedings of the IEEE Vol. 98, No. 8.
  5. Jatit & Lls, 2010, A Study of Security Challenges in Wireless Sensor Networks, Journal of Theoretical and Applied Information Technology.
  6. Lichen Zhang, Jifeng He et al. March, 2013. Challenges, Promising Solutions and Open Problems of Cyber-Physical Systems, International Journal of Hybrid Information Technology Vol. 6, No. 2.
  7. Parolini L. , Sinopoli, B. , Krogh, B. H. , 2012, A Cyber–Physical Systems Approach to Data Center Modeling and Control for Energy Efficiency, proceedings of IEEE Vol. 100, Issue: 1.
  8. January 2012, Toward Continuous State–Space Regulation of Coupled Cyber–Physical Systems, Proceedings of the IEEE, Vol. 100, No. 1,
  9. June 2012, Hierarchical Trust Management for Wireless Sensor Networks and its Applications to Trust-Based Routing and Intrusion Detection, IEEE Transactions on Network and Service Management, Vol. 9, No. 2.
  10. Second Quarter 2012, Trust Computations and Trust Dynamics in Mobile Adhoc Networks: A Survey, IEEE Communications Surveys & Tutorials, Vol. 14, No. 2.
  11. A. A. Ca´rdenas, S. Aminy, Jun. 2008, Secure control: Towards survivable cyber physical Systems, in Proc. 28th Int. Conf. Distrib. Comput. Syst. Workshops, pp. 495–500.
  12. Xu Li, Inria Lille & et. al, July 2012, Servicing Wireless Sensor Networks by Mobile Robots, IEEE Communications Magazine.
  13. Xu Li, Rongxing Lu, Xiaohui Liang, and Xuemin (Sherman) Shen Jiming Chen Xiaodong Lin, November 2011, Smart Community: An Internet of Things Application, IEEE Communications Magazine.
  14. Xu Wu, October 2011, A Lightweight Trust Establishment Method for Wireless Sensor Networks, Advances in information Sciences and Service Sciences (AISS). Vol. 3, No. 9.
  15. Ragunathan (Raj) Rajkumar, May 2012, A Cyber–Physical Future, Proceedings of the IEEE, Vol. 100.
  16. Weiqi Dai, T. , Paul Parker, Hai Jin, and Shouhuai Xu, November/December 2012, Enhancing Data Trustworthiness Via assured Digital Signing, IEEE Transactions on Dependable and Secure Computing, Vol. 9, No. 6.
  17. Insup Lee, Oleg Sokolsky, Sanjian Chen, et. al, January 2012, Challenges and Research Directions in Medical Cyber–Physical Systems, Proceedings of the IEEE, Vol. 100, No. 1.
  18. Kyoung-Dae Kim and P. R. Kumar, May 2012, Cyber–Physical Systems: A Perspective at the Centennial, Proceedings of the IEEE.
  19. Xu Li, Chunming Qiao, & et al. , Sep 2012, Toward Effective Service Scheduling For Human Drivers in Vehicular Cyber-Physical Systems, IEEE Transactions on Parallel and Distributed Systems, Vol. 23, No. 9.
  20. Wattana Viriyasitavat, Andrew Martin, Third Quarter 2012, A Survey of Trust in Workflows and Relevant Contexts, IEEE Communications Surveys & Tutorials, Vol. 14, No. 3.
  21. Zhengqiang Liang and Weisong Shi, January 2010, TRECON: A Trust-Based Economic Framework For Efficient Internet Routing, IEEE Transactions on Systems, Man, and Cybernetics—Part A: Systems And Humans, Vol. 40, No. 1.
  22. Felix Gomez Marmol, TRMSim-WSN, A Trust & Reputation Models Simulator for Wireless Sensor Networks, http://ants. dif. um. es/felixgm/research/trmsim-w
  23. S. Karthik, K. Vanitha, Dr . G. Radhamani, 2011, Trust Management Techniques in Wireless Sensor Networks: An Evaluation, International Conference Communications and Signal Processing (ICCSP).
Index Terms

Computer Science
Information Sciences

Keywords

Cyber Physical Systems Security Trust Management Data Integrity