KMS Of Academy of mathematics and systems sciences, CAS
Complex Cyber-Physical Networks: From Cybersecurity to Security Control | |
Wen Guanghui1; Yu Wenwu1; Yu Xinghuo2; Lue Jinhu3![]() | |
2017-02-01 | |
Source Publication | JOURNAL OF SYSTEMS SCIENCE & COMPLEXITY
![]() |
ISSN | 1009-6124 |
Volume | 30Issue:1Pages:46-67 |
Abstract | Complex cyber-physical network refers to a new generation of complex networks whose normal functioning significantly relies on tight interactions between its physical and cyber components. Many modern critical infrastructures can be appropriately modelled as complex cyber-physical networks. Typical examples of such infrastructures are electrical power grids, WWW, public transportation systems, state financial networks, and the Internet. These critical facilities play important roles in ensuring the stability of society as well as the development of economy. Advances in information and communication technology open opportunities for malicious attackers to launch coordinated attacks on cyber-physical critical facilities in networked infrastructures from any Internet-accessible place. Cybersecurity of complex cyber-physical networks has emerged as a hot topic within this context. In practice, it is also very crucial to understand the interplay between the evolution of underlying network structures and the collective dynamics on these complex networks and consequently to design efficient security control strategies to protect the evolution of these networks. In this paper, cybersecurity of complex cyber-physical networks is first outlined and then some security enhancing techniques, with particular emphasis on safety communications, attack detection and fault-tolerant control, are suggested. Furthermore, a new class of efficient secure control strategies are proposed for guaranteeing the achievement of desirable pinning synchronization behaviors in complex cyber-physical networks against malicious attacks on nodes. The authors hope that this paper motivates to design enhanced security strategies for complex cyber-physical network systems, to realize resilient and secure critical infrastructures. |
Keyword | Communication topology complex cyber-physical network cybersecurity Internet of Things secure control |
DOI | 10.1007/s11424-017-6181-x |
Language | 英语 |
Funding Project | National Key Research and Development Program of China[2016YFB0800401] ; National Nature Science Foundation of China[61304168] ; National Nature Science Foundation of China[61673104] ; National Nature Science Foundation of China[61322302] ; Natural Science Foundation of Jiangsu Province of China[BK20130595] ; National Ten Thousand Talent Program for Young Top-Notch Talents ; Six Talent Peaks of Jiangsu Province of China[2014-DZXX-004] ; Doctoral Program of Higher Education of China[20130092120030] ; Fundamental Research Funds for the Central Universities of China[2242016K41030] |
WOS Research Area | Mathematics |
WOS Subject | Mathematics, Interdisciplinary Applications |
WOS ID | WOS:000397236700005 |
Publisher | SPRINGER HEIDELBERG |
Citation statistics | |
Document Type | 期刊论文 |
Identifier | http://ir.amss.ac.cn/handle/2S8OKBNM/24878 |
Collection | 系统科学研究所 |
Corresponding Author | Wen Guanghui |
Affiliation | 1.Southeast Univ, Dept Math, Nanjing 210096, Peoples R China 2.RMIT Univ, Sch Engn, Melbourne, Vic 3001, Australia 3.Chinese Acad Sci, Acad Math & Syst Sci, Inst Syst Sci, Beijing 100190, Peoples R China |
Recommended Citation GB/T 7714 | Wen Guanghui,Yu Wenwu,Yu Xinghuo,et al. Complex Cyber-Physical Networks: From Cybersecurity to Security Control[J]. JOURNAL OF SYSTEMS SCIENCE & COMPLEXITY,2017,30(1):46-67. |
APA | Wen Guanghui,Yu Wenwu,Yu Xinghuo,&Lue Jinhu.(2017).Complex Cyber-Physical Networks: From Cybersecurity to Security Control.JOURNAL OF SYSTEMS SCIENCE & COMPLEXITY,30(1),46-67. |
MLA | Wen Guanghui,et al."Complex Cyber-Physical Networks: From Cybersecurity to Security Control".JOURNAL OF SYSTEMS SCIENCE & COMPLEXITY 30.1(2017):46-67. |
Files in This Item: | There are no files associated with this item. |
Items in the repository are protected by copyright, with all rights reserved, unless otherwise indicated.
Edit Comment