期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
A hierarchical model-based security risk assessment approach for the Train Control & Monitoring System
1
作者 Jun Yang Yan Xiong +2 位作者 Chunjie Zhou Qing Xu Shangru Zhou 《Transportation Safety and Environment》 2025年第4期249-259,共11页
The Train Control & Monitoring System(TCMS) plays a crucial role in ensuring the reliable and safe operation of rail trains. However, in recent years, the adoption of Ethernet and wireless technologies has exposed... The Train Control & Monitoring System(TCMS) plays a crucial role in ensuring the reliable and safe operation of rail trains. However, in recent years, the adoption of Ethernet and wireless technologies has exposed TCMS to serious security challenges. Risk assessment, as a critical component of dynamic security protection, plays a vital role in identifying system vulnerabilities and guiding mitigation efforts. Therefore, the accurate identification of system security risks is essential for ensuring the safe and stable operation of TCMS. To address this need, this paper proposes a hierarchical model-based assessment approach. This method utilizes a Bayesian network to model attack behaviours and incorporates cellular automata to model the propagation impacts of attacks. It allows for the inference of probabilities associated with TCMS functions being compromised, thereby quantifying system risks posed by attacks. Then it focuses on the modelling process of the evaluation model and the calculation method for quantifying risk. The effectiveness of the approach is demonstrated through a simulated TCMS scenario involving a high-speed train. 展开更多
关键词 Train control&monitoring System(TCMS) security protection risk assessment hierarchical model
在线阅读 下载PDF
Combined Architecture of Destination Sequence Distance Vector (DSDV) Routing with Software Defined Networking (SDN) and Blockchain in Cyber-Physical Systems
2
作者 Jawad Ahmad Ansari Mohamad Khairi Ishak Khalid Ammar 《Computers, Materials & Continua》 2025年第2期2311-2330,共20页
Cyber-Physical System (CPS) devices are increasing exponentially. Lacking confidentiality creates a vulnerable network. Thus, demanding the overall system with the latest and robust solutions for the defence mechanism... Cyber-Physical System (CPS) devices are increasing exponentially. Lacking confidentiality creates a vulnerable network. Thus, demanding the overall system with the latest and robust solutions for the defence mechanisms with low computation cost, increased integrity, and surveillance. The proposal of a mechanism that utilizes the features of authenticity measures using the Destination Sequence Distance Vector (DSDV) routing protocol which applies to the multi-WSN (Wireless Sensor Network) of IoT devices in CPS which is developed for the Device-to-Device (D2D) authentication developed from the local-chain and public chain respectively combined with the Software Defined Networking (SDN) control and monitoring system using switches and controllers that will route the packets through the network, identify any false nodes, take preventive measures against them and preventing them for any future problems. Next, the system is powered by Blockchain cryptographic features by utilizing the TrustChain features to create a private, secure, and temper-free ledger of the transactions performed inside the network. Results are achieved in the legitimate devices connecting to the network, transferring their packets to their destination under supervision, reporting whenever a false node is causing hurdles, and recording the transactions for temper-proof records. Evaluation results based on 1000+ transactions illustrate that the proposed mechanism not only outshines most aspects of Cyber-Physical systems but also consumes less computation power with a low latency of 0.1 seconds only. 展开更多
关键词 DSDV intelligent authentication SDN control&monitoring blockchain recording of transactions
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部