Protection Window Based Security-Aware Scheduling against Schedule-Based Attacks

J Ren, C Liu, C Lin, R Bi, S Li, Z Wang, Y Qian… - ACM Transactions on …, 2023 - dl.acm.org
With widespread use of common-off-the-shelf components and the drive towards connection
with external environments, the real-time systems are facing more and more security …

Sensor anomaly detection in the industrial internet of things based on edge computing

D Kong, D Liu, L Zhang, L He… - Turkish Journal of …, 2020 - journals.tubitak.gov.tr
In the industrial internet of things (IIoT), because thousands of pieces of hardware,
instruments, and various controllers are involved, the core problem is the sensors. Detection …

Developing and experimenting simulation model of DDoS attacks in IIoT networks using Python

A Hristov, G Pavlova, K Raynova - 2023 31st National …, 2023 - ieeexplore.ieee.org
The DDOS attack vector on a PLC in an automated process control system is investigated
and a simulation model for determining the DDOS attack vector on a PLC in an IIoT network …

Multicore resource isolation for deterministic, resilient and secure concurrent execution of safety-critical applications

H Omar, H Dogan, B Kahne… - IEEE Computer …, 2018 - ieeexplore.ieee.org
Multicores increasingly deploy spatial execution of safety-critical applications that demand a
deterministic, resilient, and secure environment to meet the safety standards. However …

Securing Real-Time Systems using Schedule Reconfiguration

ZAH Hammadeh, M Hasan… - 2024 IEEE 27th …, 2024 - ieeexplore.ieee.org
Modern real-time systems are susceptible to cyber-attacks. The growing adoption of multi-
core platforms, where safety and non-safety critical tasks coexist, further introduces new …

Optimizing Smart City Virtual Power Plants with V2G Integration for Improved Grid Resilience

S Roy, DC Das, N Sinha - 2024 IEEE International Conference …, 2024 - ieeexplore.ieee.org
Virtual Power Plant (VPP) is coming as the must need option for the modern-day electricity
grid to build a robust smart city framework, where electric vehicles (EV) will play a crucial …

You Can't Always Check What You Wanted: Selective Checking and Trusted Execution to Prevent False Actuations in Cyber-Physical Systems

M Hasan, S Mohan - arXiv preprint arXiv:2304.13956, 2023 - arxiv.org
Cyber-physical systems (CPS) are vulnerable to attacks targeting outgoing actuation
commands that modify their physical behaviors. The limited resources in such systems …

A Hardware-Aware Application Execution Model in Mixed-Criticality Internet of Things

CS Stângaciu, EA Capota, V Stângaciu, MV Micea… - Mathematics, 2022 - mdpi.com
The Real-Time Internet of Things is an emerging technology intended to enable real-time
information communication and processing over a global network of devices at the edge …

[PDF][PDF] Dominance of hardware firewalls and denial of firewall attacks (case study blacknurse attack)

TV Krishna, P Karthik - … Journal of Science and Research (IJSR), 2022 - researchgate.net
Network security is the most important aspect which concerns with protection of the data of
an organization and firewalls play a crucial role in this. The main goal of this paper is to …

On scheduler side-channels in dynamic-priority real-time systems

CY Chen, S Mohan, R Pellizzoni, RB Bobba - arXiv preprint arXiv …, 2020 - arxiv.org
While the existence of scheduler side-channels has been demonstrated recently for fixed-
priority real-time systems (RTS), there have been no similar explorations for dynamic-priority …