메뉴 건너뛰기




Volumn , Issue , 2016, Pages 239-267

Resilient wireless sensor networks for cyber-physical systems

Author keywords

Attack resilience; Control decisions; CPS operations; Deployment cost; Intelligent traffic control; Malicious attackers; Resilient wireless sensor networks; Smart grids; Spatially distributed cyber physical system; Telecommunication computing; Telecommunication network reliability; Telecommunication security; Wireless sensor networks; WSN

Indexed keywords

COSTS; CYBER PHYSICAL SYSTEM; DISTRIBUTED COMPUTER SYSTEMS; ELECTRIC POWER TRANSMISSION NETWORKS; EMBEDDED SYSTEMS; LOSSES; NETWORK SECURITY; SECURE COMMUNICATION; SMART POWER GRIDS; SPATIAL DISTRIBUTION; TRAFFIC CONTROL;

EID: 85014192628     PISSN: None     EISSN: None     Source Type: Book    
DOI: 10.1049/PBCE096E_ch11     Document Type: Chapter
Times cited : (6)

References (75)
  • 4
    • 42249106275 scopus 로고    scopus 로고
    • A design and implementation of forest-fires surveillance system based on wireless sensor networks for South Korea mountains
    • Son B., Her Y., Kim J.G. A design and implementation of forest-fires surveillance system based on wireless sensor networks for South Korea mountains. International Journal of Computer Science and Network Security, 6(9): 124-130, 2006.
    • (2006) International Journal of Computer Science and Network Security , vol.6 , Issue.9 , pp. 124-130
    • Son, B.1    Her, Y.2    Kim, J.G.3
  • 5
    • 79960924365 scopus 로고    scopus 로고
    • From wireless sensor networks towards cyber physical systems
    • Wu F.J., Kao Y.F., Tseng Y.C. From wireless sensor networks towards cyber physical systems. Pervasive and Mobile Computing, 7(4): 397-413, 2011.
    • (2011) Pervasive and Mobile Computing , vol.7 , Issue.4 , pp. 397-413
    • Wu, F.J.1    Kao, Y.F.2    Tseng, Y.C.3
  • 7
    • 84155167085 scopus 로고    scopus 로고
    • Cyber-physical system security for the electric power grid
    • Sridhar S., Hahn A., Govindarasu M. Cyber-physical system security for the electric power grid. Proceedings of the IEEE, 100(1): 210-224, 2012.
    • (2012) Proceedings of the IEEE , vol.100 , Issue.1 , pp. 210-224
    • Sridhar, S.1    Hahn, A.2    Govindarasu, M.3
  • 8
    • 67650822699 scopus 로고    scopus 로고
    • Security and privacy challenges in the smart grid
    • May
    • McDaniel P., McLaughlin S. Security and privacy challenges in the smart grid. IEEE Security Privacy, 7(3/May): 75-77, 2009.
    • (2009) IEEE Security Privacy , vol.7 , Issue.3 , pp. 75-77
    • McDaniel, P.1    McLaughlin, S.2
  • 11
    • 77956882701 scopus 로고    scopus 로고
    • Wireless sensor networks for healthcare: A survey
    • Alemdar H., Ersoy C. Wireless sensor networks for healthcare: A survey. Computer Networks, 54(15): 2688-2710, 2010.
    • (2010) Computer Networks , vol.54 , Issue.15 , pp. 2688-2710
    • Alemdar, H.1    Ersoy, C.2
  • 14
    • 84906788733 scopus 로고    scopus 로고
    • A survey on electric power demand forecasting: Future trends in smart grids, microgrids and smart buildings
    • Hernandez L., Baladrón C., Aguiar J., et al. A survey on electric power demand forecasting: Future trends in smart grids, microgrids and smart buildings. IEEE Communications Surveys & Tutorials, 16(3): 1460-1495, 2014.
    • (2014) IEEE Communications Surveys & Tutorials , vol.16 , Issue.3 , pp. 1460-1495
    • Hernandez, L.1    Baladrón, C.2    Aguiar, J.3
  • 16
    • 84921496860 scopus 로고    scopus 로고
    • Game-theoretic models of electricity theft detection in smart utility networks: Providing new capabilities with advanced metering infrastructure
    • Amin S., Schwartz G., Cardenas A., Sastry S. Game-theoretic models of electricity theft detection in smart utility networks: Providing new capabilities with advanced metering infrastructure. IEEE Control Systems, 35 (1): 66-81, 2015.
    • (2015) IEEE Control Systems , vol.35 , Issue.1 , pp. 66-81
    • Amin, S.1    Schwartz, G.2    Cardenas, A.3    Sastry, S.4
  • 19
    • 77956607253 scopus 로고    scopus 로고
    • Opportunities and challenges of wireless sensor networks in smart grid
    • Gungor V.C., Lu B., Hancke G.P. Opportunities and challenges of wireless sensor networks in smart grid. IEEE Transactions on Industrial Electronics, 57(10): 3557-3564, 2010.
    • (2010) IEEE Transactions on Industrial Electronics , vol.57 , Issue.10 , pp. 3557-3564
    • Gungor, V.C.1    Lu, B.2    Hancke, G.P.3
  • 22
    • 0031472064 scopus 로고    scopus 로고
    • Traffic flow forecasting: Comparison of modeling approaches
    • Smith B.L., Demetsky M.J. Traffic flow forecasting: Comparison of modeling approaches. Journal of Transportation Engineering, 123(4): 261-266, 1997.
    • (1997) Journal of Transportation Engineering , vol.123 , Issue.4 , pp. 261-266
    • Smith, B.L.1    Demetsky, M.J.2
  • 24
    • 38349154579 scopus 로고    scopus 로고
    • Denial-of-service in wireless sensor networks: Attacks and defenses
    • Raymond D.R., Midkiff S.F. Denial-of-service in wireless sensor networks: Attacks and defenses. IEEE Pervasive Computing, 7(1): 74-81, 2008.
    • (2008) IEEE Pervasive Computing , vol.7 , Issue.1 , pp. 74-81
    • Raymond, D.R.1    Midkiff, S.F.2
  • 26
    • 0036793924 scopus 로고    scopus 로고
    • Denial of service in sensor networks
    • Wood A., Stankovic J.A. Denial of service in sensor networks. Computer, 35 (10): 54-62, 2002.
    • (2002) Computer , vol.35 , Issue.10 , pp. 54-62
    • Wood, A.1    Stankovic, J.A.2
  • 27
    • 33745062882 scopus 로고    scopus 로고
    • Jamming sensor networks: Attack and defense strategies
    • Xu W., Ma K., Trappe W., Zhang Y. Jamming sensor networks: Attack and defense strategies. Network, IEEE, 20(3): 41-47, 2006.
    • (2006) Network, IEEE , vol.20 , Issue.3 , pp. 41-47
    • Xu, W.1    Ma, K.2    Trappe, W.3    Zhang, Y.4
  • 29
    • 33845916834 scopus 로고    scopus 로고
    • A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks
    • Poovendran R., Lazos L. A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks. Wireless Networks, 13(1): 27-59, 2007.
    • (2007) Wireless Networks , vol.13 , Issue.1 , pp. 27-59
    • Poovendran, R.1    Lazos, L.2
  • 30
    • 79251600457 scopus 로고    scopus 로고
    • A study of self-propagating mal-packets in sensor networks: Attacks and defenses
    • Gu Q., Ferguson C., Noorani R. A study of self-propagating mal-packets in sensor networks: Attacks and defenses. Computers & Security, 30(1): 13-27, 2011.
    • (2011) Computers & Security , vol.30 , Issue.1 , pp. 13-27
    • Gu, Q.1    Ferguson, C.2    Noorani, R.3
  • 37
    • 27544460282 scopus 로고    scopus 로고
    • Distributed detection of node replication attacks in sensor networks
    • IEEE
    • Parno B., Perrig A., Gligor V. Distributed detection of node replication attacks in sensor networks. In IEEE Symposium on Security and Privacy, pp. 49-63. IEEE, 2005.
    • (2005) IEEE Symposium on Security and Privacy , pp. 49-63
    • Parno, B.1    Perrig, A.2    Gligor, V.3
  • 38
    • 67650109811 scopus 로고    scopus 로고
    • Safe and secure networked control systems under denial-of-service attacks
    • Springer
    • Amin S., Cárdenas A.A., Sastry S.S. Safe and secure networked control systems under denial-of-service attacks. In Hybrid Systems: Computation and Control, pp. 31-45. Springer, 2009.
    • (2009) Hybrid Systems: Computation and Control , pp. 31-45
    • Amin, S.1    Cárdenas, A.A.2    Sastry, S.S.3
  • 40
    • 84897628591 scopus 로고    scopus 로고
    • Cyber security of water SCADA systems - Part I: Analysis and experimentation of stealthy deception attacks
    • Amin S., Litrico X., Sastry S., Bayen A.M. Cyber security of water SCADA systems - Part I: Analysis and experimentation of stealthy deception attacks. IEEE Transactions on Control Systems Technology, 21(5): 1963-1970, 2013.
    • (2013) IEEE Transactions on Control Systems Technology , vol.21 , Issue.5 , pp. 1963-1970
    • Amin, S.1    Litrico, X.2    Sastry, S.3    Bayen, A.M.4
  • 43
  • 44
    • 84874917979 scopus 로고    scopus 로고
    • The real story of Stuxnet
    • Kushner D. The real story of Stuxnet. IEEE Spectrum, 50(3): 48-53, 2013.
    • (2013) IEEE Spectrum , vol.50 , Issue.3 , pp. 48-53
    • Kushner, D.1
  • 45
    • 84928042204 scopus 로고    scopus 로고
    • 24 September, Accessed: 1 May 2015
    • Kaspersky Lab. Kaspersky Lab provides its insights on Stuxnet worm, 24 September 2010. See http://www.kaspersky.com/about/news/virus/2010/Kaspersky_Lab_provides_its_insights_on_Stuxnet_worm. Accessed: 1 May 2015.
    • (2010) Kaspersky Lab provides its insights on Stuxnet worm
  • 46
    • 84909605962 scopus 로고    scopus 로고
    • The Stuxnet attack on Iran’s nuclear plant was ‘far more dangerous’ than previously thought
    • 20 November, Accessed: 27 April 2015
    • Kelley M.B. The Stuxnet attack on Iran’s nuclear plant was ‘far more dangerous’ than previously thought. Business Insider, 20 November 2013. See http://www.businessinsider.com/stuxnet-was-far-more-dangerous-than-previous-thought-2013-11. Accessed: 27 April 2015.
    • (2013) Business Insider
    • Kelley, M.B.1
  • 47
    • 85014195759 scopus 로고    scopus 로고
    • Hacking US (and UK, Australia, France, etc.) traffic control systems
    • 30 April, Accessed: 3 May 2015
    • Cerrudo C. Hacking US (and UK, Australia, France, etc.) traffic control systems. IOActive Labs Blog, 30 April 2014. See http://blog.ioactive.com/2014/04/hacking-us-and-uk-australia-france-etc.html. Accessed: 3 May 2015.
    • (2014) IOActive Labs Blog
    • Cerrudo, C.1
  • 48
    • 84973447258 scopus 로고    scopus 로고
    • Hackers can mess with traffic lights to jam roads and reroute cars
    • 30 April, Accessed: 3 May 2015
    • Zetter K. Hackers can mess with traffic lights to jam roads and reroute cars. Wired, 30 April 2014. See http://www.wired.com/2014/04/traffic-lights-hacking/. Accessed: 3 May 2015.
    • (2014) Wired
    • Zetter, K.1
  • 49
    • 85014257600 scopus 로고    scopus 로고
    • 28 October, Advisory (ICSA-14-247-01A), Accessed: 3 May 2015
    • ICS-CERT. Sensys Networks Traffic Sensor Vulnerabilities, 28 October 2014. Advisory (ICSA-14-247-01A). See http://ics-cert.us-cert.gov/advisories/ICSA-14-247-01A. Accessed: 3 May 2015.
    • (2014) Sensys Networks Traffic Sensor Vulnerabilities
  • 50
    • 77955181796 scopus 로고    scopus 로고
    • Conflict narrows oil options for West
    • 14 August, Accessed: 3 May 2015
    • Mouawad J. Conflict narrows oil options for West. The New York Times, 14 August 2008. See http://www.nytimes.com/2008/08/14/world/europe/14oil.html. Accessed: 3 May 2015.
    • (2008) The New York Times
    • Mouawad, J.1
  • 51
    • 84996955895 scopus 로고    scopus 로고
    • Mysterious '08 Turkey pipeline blast opened new cyberwar
    • 10 December, Accessed: 27 April 2015
    • Robertson J., Riley M.A. Mysterious '08 Turkey pipeline blast opened new cyberwar. Bloomberg, 10 December 2014. See http://www.bloomberg.com/news/articles/2014-12-10/mysterious-08-turkey-pipeline-blast-opened-newcyberwar. Accessed: 27 April 2015.
    • (2014) Bloomberg
    • Robertson, J.1    Riley, M.A.2
  • 54
    • 77955848771 scopus 로고    scopus 로고
    • Robust solutions to Stackelberg games: Addressing bounded rationality and limited observations in human cognition
    • Pita J., Jain M., Tambe M., Ordóñez F., Kraus S. Robust solutions to Stackelberg games: Addressing bounded rationality and limited observations in human cognition. Artificial Intelligence, 174(15): 1142-1171, 2010.
    • (2010) Artificial Intelligence , vol.174 , Issue.15 , pp. 1142-1171
    • Pita, J.1    Jain, M.2    Tambe, M.3    Ordóñez, F.4    Kraus, S.5
  • 57
    • 11144277843 scopus 로고    scopus 로고
    • Routing techniques in wireless sensor networks: A survey
    • Al-Karaki J.N., Kamal A.E. Routing techniques in wireless sensor networks: A survey. Wireless Communications, 11(6): 6-28, 2004.
    • (2004) Wireless Communications , vol.11 , Issue.6 , pp. 6-28
    • Al-Karaki, J.N.1    Kamal, A.E.2
  • 58
    • 13944283393 scopus 로고    scopus 로고
    • A survey on routing protocols for wireless sensor networks
    • Akkaya K., Younis M. A survey on routing protocols for wireless sensor networks. Ad Hoc Networks, 3(3): 325-349, 2005.
    • (2005) Ad Hoc Networks , vol.3 , Issue.3 , pp. 325-349
    • Akkaya, K.1    Younis, M.2
  • 59
    • 39149099807 scopus 로고    scopus 로고
    • Strategies and techniques for node placement in wireless sensor networks: A survey
    • Younis M., Akkaya K. Strategies and techniques for node placement in wireless sensor networks: A survey. Ad Hoc Networks, 6(4): 621-655, 2008.
    • (2008) Ad Hoc Networks , vol.6 , Issue.4 , pp. 621-655
    • Younis, M.1    Akkaya, K.2
  • 61
    • 49349106443 scopus 로고    scopus 로고
    • Distributed deployment schemes for mobile wireless sensor networks to ensure multilevel coverage
    • Wang Y.C., Tseng Y.C. Distributed deployment schemes for mobile wireless sensor networks to ensure multilevel coverage. IEEE Transactions on Parallel and Distributed Systems, 19(9): 1280-1294, 2008.
    • (2008) IEEE Transactions on Parallel and Distributed Systems , vol.19 , Issue.9 , pp. 1280-1294
    • Wang, Y.C.1    Tseng, Y.C.2
  • 65
    • 84878649481 scopus 로고    scopus 로고
    • Designing robust network topologies for wireless sensor networks in adversarial environments
    • Laszka A., Buttyán L., Szeszlér D. Designing robust network topologies for wireless sensor networks in adversarial environments. Pervasive and Mobile Computing, 9(4): 546-563, 2013.
    • (2013) Pervasive and Mobile Computing , vol.9 , Issue.4 , pp. 546-563
    • Laszka, A.1    Buttyán, L.2    Szeszlér, D.3
  • 66
    • 27344446387 scopus 로고    scopus 로고
    • Topology control in wireless ad hoc and sensor networks
    • Santi P. Topology control in wireless ad hoc and sensor networks. ACM Computing Surveys, 37(2): 164-194, 2005.
    • (2005) ACM Computing Surveys , vol.37 , Issue.2 , pp. 164-194
    • Santi, P.1
  • 69
    • 79960124958 scopus 로고    scopus 로고
    • Distributed function calculation via linear iterative strategies in the presence of malicious agents
    • Sundaram S., Hadjicostis C.N. Distributed function calculation via linear iterative strategies in the presence of malicious agents. IEEE Transactions on Automatic Control, 56(7): 1495-1508, 2011.
    • (2011) IEEE Transactions on Automatic Control , vol.56 , Issue.7 , pp. 1495-1508
    • Sundaram, S.1    Hadjicostis, C.N.2
  • 70
  • 71
    • 79951919001 scopus 로고    scopus 로고
    • Belief consensus and distributed hypothesis testing in sensor networks
    • eds Antsaklis P.J., Tabuada P., Lecture Notes in Control and Information Science, Springer
    • Olfati-Saber R., Franco E., Frazzoli E., Shamma J. Belief consensus and distributed hypothesis testing in sensor networks. In Networked Embedded Sensing and Control, eds Antsaklis P.J., Tabuada P., Lecture Notes in Control and Information Science, pp. 169-182. Springer, 2006.
    • (2006) Networked Embedded Sensing and Control , pp. 169-182
    • Olfati-Saber, R.1    Franco, E.2    Frazzoli, E.3    Shamma, J.4
  • 72
    • 85032750887 scopus 로고    scopus 로고
    • Distributed inference with byzantine data: State-of-the-art review on data falsification attacks
    • Vempaty A., Tong L., Varshney P. Distributed inference with byzantine data: state-of-the-art review on data falsification attacks. IEEE Signal Processing Magazine, 30(5): 65-75, 2013.
    • (2013) IEEE Signal Processing Magazine , vol.30 , Issue.5 , pp. 65-75
    • Vempaty, A.1    Tong, L.2    Varshney, P.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.