A privacy-preserving algorithm for AC microgrid cyber-physical system against false data injection attacks

J Yang, Y Zhang - Journal of Modern Power Systems and …, 2022 - ieeexplore.ieee.org
A new privacy-preserving algorithm based on the Paillier cryptosystem including a new
cooperative control strategy is proposed in this paper, which can resist the false data …

Integrated functional safety and security diagnosis mechanism of cps based on blockchain

A Gu, Z Yin, C Cui, Y Li - IEEE Access, 2020 - ieeexplore.ieee.org
This paper proposes a functional safety and information security protection mechanism
based on blockchain technology. The design of the basic level and integration level …

Safeguarding the IoT from malware epidemics: A percolation theory approach

A Zhaikhan, MA Kishk, H ElSawy… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
The upcoming Internet of Things (IoT) is foreseen to encompass massive numbers of
connected devices, smart objects, and cyber-physical systems. Due to the large scale and …

Quick boot of trusted execution environment with hardware accelerators

TT Hoang, C Duran, DT Nguyen-Hoang, DH Le… - IEEE …, 2020 - ieeexplore.ieee.org
The Trusted Execution Environment (TEE) offers a software platform for secure applications.
The TEE offers a memory isolation scheme and software authentication from a high privilege …

Indistinguishability prevents scheduler side channels in real-time systems

CY Chen, D Sanyal, S Mohan - Proceedings of the 2021 ACM SIGSAC …, 2021 - dl.acm.org
Scheduler side-channels can leak critical information in real-time systems, thus posing
serious threats to many safety-critical applications. The main culprit is the inherent …

Secure networked control via software rejuvenation

P Griffioen, R Romagnoli, BH Krogh… - 2019 IEEE 58th …, 2019 - ieeexplore.ieee.org
Software rejuvenation has been proposed as a prevention mechanism against
unanticipated and undetectable attacks on cyber-physical systems. Without needing to …

Safe-visor architecture for sandboxing (AI-based) unverified controllers in stochastic cyber–physical systems

B Zhong, A Lavaei, H Cao, M Zamani… - Nonlinear Analysis: Hybrid …, 2021 - Elsevier
High performance but unverified controllers, eg, artificial intelligence-based (aka AI-based)
controllers, are widely employed in cyber–physical systems (CPSs) to accomplish complex …

Modeling and optimization of watering robot optimal path for ornamental plant care

M Zhang, W Guo, L Wang, D Li, B Hu, Q Wu - Computers & Industrial …, 2021 - Elsevier
Watering ornamental plants is considered to be a time-consuming task with the increasing
garden size. Employing robots to conduct the watering task is a feasible way to improve the …

Task parameters analysis in schedule-based timing side-channel attack

S Liu, W Yi - IEEE access, 2020 - ieeexplore.ieee.org
Recent work has shown that the timing behavior of a real-time system can be utilized by
attackers for various adverse purposes via schedule-based timing side-channel attacks. An …

Software fault tolerance for cyber-physical systems via full system restart

P Jagtap, F Abdi, M Rungger, M Zamani… - ACM Transactions on …, 2020 - dl.acm.org
The article addresses the issue of reliability of complex embedded control systems in the
safety-critical environment. In this article, we propose a novel approach to design controller …