A Review Cases in Cyber Physical Systems

  IJPTT-book-cover
 
International Journal of P2P Network Trends and Technology (IJPTT)          
 
© 2020 by IJPTT Journal
Volume-10 Issue-3
Year of Publication : 2020
Authors : Girija Lakshmi L, Ashika Jadhav, Lavanya S

Citation

MLA Style:Girija Lakshmi L, Ashika Jadhav, Lavanya S "A Review Cases in Cyber Physical Systems" International Journal of P2P Network Trends and Technology 10.3 (2020): 6-9.

APA Style:Girija Lakshmi L, Ashika Jadhav, Lavanya S(2019). A Review Cases in Cyber Physical Systems. International Journal of P2P Network Trends and Technology, 10(3),6-9.

Abstract

The CPSs [cyber physical systems] are the communication between the two devices. That is the internet devices and the hacking devices. This system is mainly used to solve a real-world problems. This CPSs are currently becomes the main target of the hackers. And it leads highly damage to our nation. By these CPSs , valid resources, and several cases are involved in this breaches for security purpose. At the view point of the security in the digital world the fundamental and theoretical concepts are discussed worldwide. At the point of security cases in the CPSs it it still remained as less explored. In this paper a lot of securities methods are used and implemented. So here we are looking about the attacks, impacts and the intentions and incidents of the categories. This is the main thing in the cyber-physical systems.

References


[1] Yang, Wencheng , et al. "Securing mobile healthcare data: a smart card based cancelable finger-vein bio-cryptosystem." IEEE Access 6 (2018): 36939-36947.
[2] Al-Mhiqani, Mohammed Nasser, et al. "Investigation study of Cyber-Physical Systems: Characteristics, application domains, and security challenges." ARPN Journal of Engineering and Applied Sciences 12.22 (2017): 6557-6567.
[3] Venkatachary,Sampath Kumar,Jagdish Prasad,and Ravi Samikannu. "Economic impacts of cyber security in energy sector: a review." International Journal of Energy Economics and Policy 7.5 (2017): 250-262.
[4] Vidyasagar, K., G. Balaji, and K. Narendra Reddy. "RFID-GSM imparted School children Security System." Communications on Applied Electronics (CAE). Vol. 2. No. 2. Foundation of Computer Science FCS, 2015.
[5] Al-Mhiqani, Mohammed Nasser, et al. "Cyber-security incidents: a review cases in cyber-physical systems." International Journal of Advanced Computer Science and Applications 9.1 (2018): 499-508.
[6] Al-Muhtadi, Jalal, et al. "A critical analysis of mobility management related issues of wireless sensor networks in cyber physical systems." IEEE Access 6 (2018): 16363-16376.
[7] Li, Qianmu, et al. "Safety risk monitoring of cyber-physical power systems based on ensemble learning algorithm." IEEE Access 7 (2019): 24788-24805.
[8] Wang, Yu, et al. "A fast feature fusion algorithm in image classification for cyber physical systems." IEEE Access 5 (2017): 9089-9098.
[9] Wang, Jun-Sheng, and Guang-Hong Yang. "Data-driven methods for stealthy attacks on TCP/IP-based networked control systems equipped with attack detectors." IEEE transactions on cybernetics 49.8 (2018): 3020-3031.
[10] Loukas, George, et al. "Cloud-based cyber-physical intrusion detection for vehicles using deep learning." Ieee Access 6 (2017): 3491-3508.
[11] Tian, Zhihong, et al. "A real-time correlation of host-level events in cyber range service for smart campus." IEEE Access 6 (2018): 35355-35364.
[12] Friedberg, Ivo, et al. "Evidential network modeling for cyber-physical system state inference." IEEE Access 5 (2017): 17149-17164.
[13] Reddy, G. Nikhita, and G. J. Reddy. "A Study of Cyber Security Challenges and its emerging trends on latest technologies." arXiv preprint arXiv:1402.1842 (2014).
[14] Husák, Martin, et al. "Survey of attack projection, prediction, and forecasting in cyber security." IEEE Communications Surveys & Tutorials 21.1 (2018): 640-660.
[15] Al-Muhtadi, Jalal, et al. "Cybersecurity and privacy issues for socially integrated mobile healthcare applications operating in a multi-cloud environment." Health informatics journal 25.2 (2019): 315-329

Keywords
cyber physical systems, threat, security, cyber ethics ,mobile phones ,network.