Topic Editors

Graduate School of Science and Engineering, Hosei University, Tokyo, Japan
Birla Institute of Technology, Jharkhand, India

Cyber-Physical Security for IoT Systems

Abstract submission deadline
30 April 2024
Manuscript submission deadline
30 June 2024
Viewed by
5680

Topic Information

Dear Colleagues,

The Internet of Things (IoT) and cyber-physical systems (CPS) offer enormous advantages in interacting and sensing the physical world. They play an important role in smart grid, medical monitoring, robotics systems, and industrial control systems. However, the emerging systems are vulnerable to external attacks due to the open availability of sensor networks. Therefore, this Special Issue is dedicated to publishing original research for solving and enhancing cybersecurity issues.

Topics of interests include, but are not limited to:

  • Attack detection for CPS;
  • Data security and privacy for CPS and IoT;
  • Digital twins for CPS;
  • Embedded systems security;
  • Security of IoT networks and smart grids;
  • Security of CPS in medical system;
  • Cyber security and safety in Industry 4.0 and Industry 5.0.

Dr. Keping Yu
Dr. Chinmay Chakraborty
Topic Editors

Keywords

  • cyber-physical systems
  • embedded systems
  • IoT networks
  • smart grids
  • autonomous automotive systems
  • Industry 4.0 and Industry 5.0

Participating Journals

Journal Name Impact Factor CiteScore Launched Year First Decision (median) APC
Applied Sciences
applsci
2.7 4.5 2011 15.8 Days CHF 2300 Submit
Electronics
electronics
2.9 4.7 2012 15.8 Days CHF 2200 Submit
Future Internet
futureinternet
3.4 6.7 2009 13.6 Days CHF 1600 Submit
Journal of Cybersecurity and Privacy
jcp
- - 2021 20 Days CHF 1000 Submit
Sensors
sensors
3.9 6.8 2001 16.4 Days CHF 2600 Submit
Technologies
technologies
3.6 5.5 2013 13.6 Days CHF 1400 Submit

Preprints is a platform dedicated to making early versions of research outputs permanently available and citable. MDPI journals allow posting on preprint servers such as Preprints.org prior to publication. For more details about reprints, please visit https://www.preprints.org.

Published Papers (5 papers)

Order results
Result details
Journals
Select all
Export citation of selected articles as:
Article
Detecting Cyber Attacks In-Vehicle Diagnostics Using an Intelligent Multistage Framework
Sensors 2023, 23(18), 7941; https://doi.org/10.3390/s23187941 - 16 Sep 2023
Viewed by 495
Abstract
The advanced technology of vehicles makes them vulnerable to external exploitation. The current trend of research is to impose security measures to protect vehicles from different aspects. One of the main problems that counter Intrusion Detection Systems (IDSs) is the necessity to have [...] Read more.
The advanced technology of vehicles makes them vulnerable to external exploitation. The current trend of research is to impose security measures to protect vehicles from different aspects. One of the main problems that counter Intrusion Detection Systems (IDSs) is the necessity to have a low false acceptance rate (FA) with high detection accuracy without major changes in the vehicle network infrastructure. Furthermore, the location of IDSs can be controversial due to the limitations and concerns of Electronic Control Units (ECUs). Thus, we propose a novel framework of multistage to detect abnormality in vehicle diagnostic data based on specifications of diagnostics and stacking ensemble for various machine learning models. The proposed framework is verified against the KIA SOUL and Seat Leon 2018 datasets. Our IDS is evaluated against point anomaly attacks and period anomaly attacks that have not been used in its training. The results show the superiority of the framework and its robustness with high accuracy of 99.21%, a low false acceptance rate of 0.003%, and a good detection rate (DR) of 99.63% for Seat Leon 2018, and an accuracy of 99.22%, a low false acceptance rate of 0.005%, and good detection rate of 98.59% for KIA SOUL. Full article
(This article belongs to the Topic Cyber-Physical Security for IoT Systems)
Show Figures

Figure 1

Article
Moving Target Defense for Detecting Coordinated Cyber-Physical Attacks on Power Grids via a Modified Sensor Measurement Expression
by and
Electronics 2023, 12(7), 1679; https://doi.org/10.3390/electronics12071679 - 02 Apr 2023
Viewed by 1060
Abstract
This paper proposes a modified sensor measurement expression for a moving target defense (MTD) strategy to detect coordinated cyber-physical attacks (CCPAs). Essentially, the MTD defense characteristics for detecting false data injection attacks (FDIAs) differ from those used to detect CCPAs. In the first [...] Read more.
This paper proposes a modified sensor measurement expression for a moving target defense (MTD) strategy to detect coordinated cyber-physical attacks (CCPAs). Essentially, the MTD defense characteristics for detecting false data injection attacks (FDIAs) differ from those used to detect CCPAs. In the first case, the MTD performance in detecting FDIAs at the attack-execution stage is mainly considered, which is generally denoted by the detection probability; however, whether the construction of undetectable CCPAs is disrupted via the MTD strategy used during the attack-preparation stage is the focus of the latter case. There has been little work on the detection of undetectable CCPAs in the context of MTD post-activation. In our work, a novel approach to detecting undetectable CCPAs via a modified sensor measurement expression is proposed. First, the production mechanism for undetectable CCPAs without the application of an MTD strategy is transferred to that which occurs after MTD activation; then, based on an in-depth analysis of the CCPAs’ production mechanism after MTD activation, a novel modified sensor measurement expression is presented to detect undetectable CCPAs. Extensive simulations were conducted on three standard power systems to verify the effectiveness and simplicity of our approach to detecting CCPAs. Full article
(This article belongs to the Topic Cyber-Physical Security for IoT Systems)
Show Figures

Figure 1

Article
A Distributed Algorithm for UAV Cluster Task Assignment Based on Sensor Network and Mobile Information
Appl. Sci. 2023, 13(6), 3705; https://doi.org/10.3390/app13063705 - 14 Mar 2023
Cited by 5 | Viewed by 957
Abstract
Cluster formation and task processing are standard features for leveraging the performance of unmanned aerial vehicles (UAVs). As the UAV network is aided by sensors, functions such as clustering, reformation, and autonomous working are adaptively used for dense task processing. In consideration of [...] Read more.
Cluster formation and task processing are standard features for leveraging the performance of unmanned aerial vehicles (UAVs). As the UAV network is aided by sensors, functions such as clustering, reformation, and autonomous working are adaptively used for dense task processing. In consideration of the distributed nature of the UAV network coupled with wireless sensors, this article introduces a Rational Clustering Method (RCM) using dense task neighbor information exchange. The Rational Clustering Method (RCM) is an algorithm for dense task neighbor information exchange that can be used to cluster objects according to their shared properties. Each object’s task neighbors, and the similarities between them, are calculated using this method. Starting with the task density of its neighbors, the RCM algorithm gives each object in the dataset a weight. This information exchange process identifies a UAV units’ completing tasks and free slots. Using this information, high-slot UAVs within the communication range can be grouped as clusters. Unlike wireless sensor clusters, task allocation is performed on the basis of available slots and UAV longevity within the cluster; this prevents task incompletion/failures and delays in a densely populated UAV scenario. Cluster sustainability or dispersion is recommended when using distributed state learning. State learning transits between the pending task and UAV longevity; an intermediate state is defined for task reassignment amid immediate cluster deformation. This triple feature-based distributed method balances tasks between failures, overloading, and idle UAVs. The RCM was verified using task processing rate, completion ratio, reassignment, failures, and delay. Task processing rate was increased by 8.16% and completion ratio was increased by 10.3% with the proposed RCM-IE. Reassignment, failure, and delay were all reduced by 12.5%, 9.87%, and 11.99%, respectively, using this method. Full article
(This article belongs to the Topic Cyber-Physical Security for IoT Systems)
Show Figures

Figure 1

Article
Robustness Assessment of Cyber–Physical System with Different Interdependent Mechanisms
Electronics 2023, 12(5), 1093; https://doi.org/10.3390/electronics12051093 - 22 Feb 2023
Cited by 1 | Viewed by 830
Abstract
Cyber–physical systems (CPSs) are a new generation of intelligent system that integrate communication, control and computation functions and are widely used in traditional infrastructure networks, such as power network, transportation network and others. In order to ensure the stable operation and improve the [...] Read more.
Cyber–physical systems (CPSs) are a new generation of intelligent system that integrate communication, control and computation functions and are widely used in traditional infrastructure networks, such as power network, transportation network and others. In order to ensure the stable operation and improve the robustness of CPSs, the studies of robustness assessment have attracted much attention from academia. However, previous models assume that the failure propagation conforms to a strongly interdependent relationship, and only consider the interaction between nodes, while ignoring the interaction between nodes and links. In this paper, we develop a novel simulation model with the consideration of both the coupling modes and the failure propagation objects. Based on the simulation model, we study how the interdependent mechanisms, failure propagation probability and protection strategies affect the robustness of CPSs. The simulations of our proposed model are demonstrated in a test CPS formed by coupling two classical complex networks. Compared with previous models, our proposed model shows different performances and comprehensively characterizes the interdependent relationship of CPSs. In detail, disassortative coupling shows the worst performance and the CPS becomes more sensitive to failure propagation when Node–Link is selected as the failure propagation object. In addition, compared to the communication network, the power network is more sensitive to failure propagation. Protecting electrical nodes is a more effective way to strengthen the robustness of CPSs when conservation resources are limited. Our work provides useful advice to operators on how to effectively design and protect a CPS. Full article
(This article belongs to the Topic Cyber-Physical Security for IoT Systems)
Show Figures

Figure 1

Article
Multiplicative Attacks with Essential Stealthiness in Sensor and Actuator Loops against Cyber-Physical Systems
Sensors 2023, 23(4), 1957; https://doi.org/10.3390/s23041957 - 09 Feb 2023
Viewed by 847
Abstract
Stealthy attacks in sensor and actuator loops are the research priorities in the security of cyber-physical systems. Existing attacks define the stealthiness conditions against the Chi-square or Kullback-Leibler divergence detectors and parameterize the attack model based on additive signals. Such conditions ignore the [...] Read more.
Stealthy attacks in sensor and actuator loops are the research priorities in the security of cyber-physical systems. Existing attacks define the stealthiness conditions against the Chi-square or Kullback-Leibler divergence detectors and parameterize the attack model based on additive signals. Such conditions ignore the potential anomalies of the vulnerable outputs in the control layer, and the attack sequences need to be generated online, increasing the hardware and software costs. This paper investigates a type of multiplicative attack with essential stealthiness where the employed model is a novel form. The advantage is that the parameters can be designed in a constant form without having to be generated online. An essential stealthiness condition is proposed for the first time and complements the existing ones. Two sufficient conditions for the existence of constant attack matrices are given in the form of theorems, where two methods for decoupling the unknown variables are particularly considered. A quadruple-tank process, an experimental platform for attack and defense, is developed to verify the theoretical results. The experiments indicate that the proposed attack strategy can fulfill both the attack performance and stealthiness conditions. Full article
(This article belongs to the Topic Cyber-Physical Security for IoT Systems)
Show Figures

Figure 1

Back to TopTop