The Train Control & Monitoring System(TCMS) plays a crucial role in ensuring the reliable and safe operation of rail trains. However, in recent years, the adoption of Ethernet and wireless technologies has exposed...The Train Control & Monitoring System(TCMS) plays a crucial role in ensuring the reliable and safe operation of rail trains. However, in recent years, the adoption of Ethernet and wireless technologies has exposed TCMS to serious security challenges. Risk assessment, as a critical component of dynamic security protection, plays a vital role in identifying system vulnerabilities and guiding mitigation efforts. Therefore, the accurate identification of system security risks is essential for ensuring the safe and stable operation of TCMS. To address this need, this paper proposes a hierarchical model-based assessment approach. This method utilizes a Bayesian network to model attack behaviours and incorporates cellular automata to model the propagation impacts of attacks. It allows for the inference of probabilities associated with TCMS functions being compromised, thereby quantifying system risks posed by attacks. Then it focuses on the modelling process of the evaluation model and the calculation method for quantifying risk. The effectiveness of the approach is demonstrated through a simulated TCMS scenario involving a high-speed train.展开更多
Cyber-Physical System (CPS) devices are increasing exponentially. Lacking confidentiality creates a vulnerable network. Thus, demanding the overall system with the latest and robust solutions for the defence mechanism...Cyber-Physical System (CPS) devices are increasing exponentially. Lacking confidentiality creates a vulnerable network. Thus, demanding the overall system with the latest and robust solutions for the defence mechanisms with low computation cost, increased integrity, and surveillance. The proposal of a mechanism that utilizes the features of authenticity measures using the Destination Sequence Distance Vector (DSDV) routing protocol which applies to the multi-WSN (Wireless Sensor Network) of IoT devices in CPS which is developed for the Device-to-Device (D2D) authentication developed from the local-chain and public chain respectively combined with the Software Defined Networking (SDN) control and monitoring system using switches and controllers that will route the packets through the network, identify any false nodes, take preventive measures against them and preventing them for any future problems. Next, the system is powered by Blockchain cryptographic features by utilizing the TrustChain features to create a private, secure, and temper-free ledger of the transactions performed inside the network. Results are achieved in the legitimate devices connecting to the network, transferring their packets to their destination under supervision, reporting whenever a false node is causing hurdles, and recording the transactions for temper-proof records. Evaluation results based on 1000+ transactions illustrate that the proposed mechanism not only outshines most aspects of Cyber-Physical systems but also consumes less computation power with a low latency of 0.1 seconds only.展开更多
基金supported in part by funds from the Regional Joint Fund Project of Natural Science Foundation of Hunan Province (Grant No. 2025JJ70016)the National Key Research and Development Program (Grant No. 2022YFB4301202)。
文摘The Train Control & Monitoring System(TCMS) plays a crucial role in ensuring the reliable and safe operation of rail trains. However, in recent years, the adoption of Ethernet and wireless technologies has exposed TCMS to serious security challenges. Risk assessment, as a critical component of dynamic security protection, plays a vital role in identifying system vulnerabilities and guiding mitigation efforts. Therefore, the accurate identification of system security risks is essential for ensuring the safe and stable operation of TCMS. To address this need, this paper proposes a hierarchical model-based assessment approach. This method utilizes a Bayesian network to model attack behaviours and incorporates cellular automata to model the propagation impacts of attacks. It allows for the inference of probabilities associated with TCMS functions being compromised, thereby quantifying system risks posed by attacks. Then it focuses on the modelling process of the evaluation model and the calculation method for quantifying risk. The effectiveness of the approach is demonstrated through a simulated TCMS scenario involving a high-speed train.
基金funded by Ajman University,AU-Funded Research Grant 2023-IRG-ENIT-22.
文摘Cyber-Physical System (CPS) devices are increasing exponentially. Lacking confidentiality creates a vulnerable network. Thus, demanding the overall system with the latest and robust solutions for the defence mechanisms with low computation cost, increased integrity, and surveillance. The proposal of a mechanism that utilizes the features of authenticity measures using the Destination Sequence Distance Vector (DSDV) routing protocol which applies to the multi-WSN (Wireless Sensor Network) of IoT devices in CPS which is developed for the Device-to-Device (D2D) authentication developed from the local-chain and public chain respectively combined with the Software Defined Networking (SDN) control and monitoring system using switches and controllers that will route the packets through the network, identify any false nodes, take preventive measures against them and preventing them for any future problems. Next, the system is powered by Blockchain cryptographic features by utilizing the TrustChain features to create a private, secure, and temper-free ledger of the transactions performed inside the network. Results are achieved in the legitimate devices connecting to the network, transferring their packets to their destination under supervision, reporting whenever a false node is causing hurdles, and recording the transactions for temper-proof records. Evaluation results based on 1000+ transactions illustrate that the proposed mechanism not only outshines most aspects of Cyber-Physical systems but also consumes less computation power with a low latency of 0.1 seconds only.