A survey on network security for cyber–physical systems: From threats to resilient design

S Kim, KJ Park, C Lu - IEEE Communications Surveys & …, 2022 - ieeexplore.ieee.org
Cyber-physical systems (CPS) are considered the integration of physical systems in the real
world and control software in computing systems. In CPS, the real world and the computing …

A survey on machine-learning based security design for cyber-physical systems

S Kim, KJ Park - Applied Sciences, 2021 - mdpi.com
A cyber-physical system (CPS) is the integration of a physical system into the real world and
control applications in a computing system, interacting through a communications network …

Cross-layer defense methods for jamming-resistant CBTC systems

L Zhu, Y Li, FR Yu, B Ning, T Tang… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Communication-based Train Control (CBTC) systems are the burgeoning directions for
develo** future train control systems. With the adoption of wireless communication and …

A cross-layer defense method for blockchain empowered CBTC systems against data tampering attacks

H Liang, L Zhu, FR Yu, X Wang - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Due to the high integration of wireless communication and networking technologies, the
communication-based train control (CBTC) systems are exposed to additional cyber-attack …

Taxonomy and challenges of out-of-band signal injection attacks and defenses

I Giechaskiel, K Rasmussen - IEEE Communications Surveys & …, 2019 - ieeexplore.ieee.org
Recent research has shown that the integrity of sensor measurements can be violated
through out-of-band signal injection attacks. These attacks target the conversion process …

Cyber-physical vulnerability analysis of communication-based train control

S Kim, Y Won, IH Park, Y Eun… - IEEE Internet of Things …, 2019 - ieeexplore.ieee.org
A cyber-physical system (CPS) is an entanglement of physical and computing systems by
real-time information exchange through networking, which can be considered as real-time …

A survey on industrial Internet of Things security: Requirements, attacks, AI-based solutions, and edge computing opportunities

B Alotaibi - Sensors, 2023 - mdpi.com
The Industrial Internet of Things (IIoT) paradigm is a key research area derived from the
Internet of Things (IoT). The emergence of IIoT has enabled a revolution in manufacturing …

Blinded and confused: uncovering systemic flaws in device telemetry for smart-home internet of things

TJ OConnor, W Enck, B Reaves - … of the 12th Conference on Security …, 2019 - dl.acm.org
The always-on, always-connected nature of smart home devices complicates Internet-of-
Things (IoT) security and privacy. Unlike traditional hosts, IoT devices constantly send …

Data‐driven detection and identification of IoT‐enabled load‐altering attacks in power grids

S Lakshminarayana, S Sthapit, H Jahangir… - IET Smart …, 2022 - Wiley Online Library
Advances in edge computing are powering the development and deployment of Internet of
Things (IoT) systems to provide advanced services and resource efficiency. However, large …

Fast IP hop** randomization to secure hop-by-hop access in SDN

SY Chang, Y Park, BBA Babu - IEEE Transactions on Network …, 2018 - ieeexplore.ieee.org
Moving target defense (MTD) is useful for thwarting network reconnaissance and preventing
unauthorized access. While previous research in MTD focuses on protecting the endnodes …