Abstract
Networked cyber-physical systems are facing serious security threats from malicious attacks. It is noted that the networked cyber-physical system should take defense measures into account at the beginning of its construction. From the conservative defensive perspective, this paper proposes a robust optimal defense resource allocation strategy to reduce the maximum possible losses of the networked cyber-physical system caused by potential attacks. Then, based on the robust optimal allocation strategy, it can be proved that the topology of the networked cyber-physical system has a great influence on the loss function. In order to further improve security, the effects of adding redundant connections are investigated. Furthermore, by taking geographical knowledge into account, a hexagonal construction scheme is proposed for providing a geographically-feasible and economically-viable solution for building networked cyber-physical systems, where the loss function has a cubic decay.
Similar content being viewed by others
References
Liu GP, Networked learning predictive control of nonlinear cyber-physical systems, Journal of Systems Science and Complexity, 2020, 33(6): 1719–1732.
Sha L, Gopalakrishnan S, Liu X, et al, Cyber-physical systems: A new frontier, Proceedings of 2008 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing, Taiwan, China, 2008, 1–9.
Sun C, Cembrano G, Puig V, et al, Cyber-physical systems for real-time management in the urban water cycle, Proceedings of 2018 International Workshop on Cyber-Physical Systems for Smart Water Networks, 2018, 5–8.
Mo Y, Kim T H, Brancik K, et al, Cyber-physical security of a smart grid infrastructure, Proceedings of the IEEE, 2012, 100(1): 195–209.
Lu G, De D, and Song W, SmartGridLab: A laboratory-based smart grid testbed, Proceedings of the First IEEE International Conference on Smart Grid Communications, Gaithersburg, USA, 2010, 143–148.
Younis O and Moayeri N, Employing cyber-physical systems: Dynamic traffic light control at road intersections, IEEE Internet of Things Journal, 2017, 4(6): 2286–2296.
Wang L, Lin F, and Yin G, Network robustness depth and topology management of networked dynamic systems, Journal of Systems Science and Complexity, 2016, 29(1): 1–21.
Wen G, Yu W, Yu X, et al, Complex cyber-physical networks: From cybersecurity to security control, Journal of Systems Science and Complexity, 2017, 30(1): 46–67.
Sridhar S, Hahn A, and Govindarasu M, Cyber-physical system security for the electric power grid, Proceedings of the IEEE, 2012, 100(1): 210–224.
Lindsay J R, Stuxnet and the limits of cyber warfare, Security Studies, 2013, 22(3): 365–404.
Zhang Q, Liu K, Xia Y, et al, Optimal stealthy deception attack against cyber-physical systems, IEEE Transactions on Cybernetics, 2020, 50(9): 3963–3972.
Zhang X, Liu Y, and Zhang Y, A secure clock synchronization scheme for wireless sensor networks against malicious attacks, Journal of Systems Science and Complexity, 2021, 34(6): 2125–2138.
Zhang H and Zheng W X, Denial-of-service power dispatch against linear quadratic control via a fading channel, IEEE Transactions on Automatic Control, 2018, 63(9): 3032–3039.
Mo H and Sansavini G, Dynamic defense resource allocation for minimizing unsupplied demand in cyber-physical systems against uncertain attacks, IEEE Transactions on Reliability, 2017, 66(4): 1253–1265.
Wang Y, Yu F R, Tang H, et al, A mean field game theoretic approach for security enhancements in mobile Ad hoc networks, IEEE Transactions on Wireless Communications, 2014, 13(3): 1616–1627.
Wu H and Wang W, A game theory based collaborative security detection method for internet of things systems, IEEE Transactions on Information Forensics and Security, 2018, 13(6): 1432–1445.
Ismail Z, Leneutre J, Bateman D, et al, A game theoretical analysis of data confidentiality attacks on smart-grid AMI, IEEE Journal on Selected Areas in Communications, 2014, 32(7): 1486–1499.
Li Y, Shi L, Cheng P, et al, Jamming attacks on remote state estimation in cyber-physical systems: A game-theoretic approach, IEEE Transactions on Automatic Control, 2015, 60(10): 2831–2836.
Abedi M R, Mokari N, Saeedi H, et al, Robust resource allocation to enhance physical layer security in systems with full-duplex receivers: Active adversary, IEEE Transactions on Wireless Communications, 2017, 16(2): 885–899.
Xu D and Li Q, Resource allocation for secure communications in cooperative cognitive wireless powered communication networks, IEEE Systems Journal, 2019, 13(3): 2431–2442.
Alpcan T and Buchegger S, Security games for vehicular networks, IEEE Transactions on Mobile Computing, 2011, 10(2): 280–290.
Liu Y and Cheng L, Optimal defense resource allocation and geographically feasible hexagonal topology construction for power grid security, Communications in Computer and Information Science, 2021, 1468: 452–462.
Wang H, Zhao Q, Jia Q, et al, Efficient topology optimization for a wired networked system by adding wireless communication, Proceedings of 2012 American Control Conference, Montreal, Canada, 2012, 448–453.
Hsu W and Zou X, Central place theory and the power law for cities, The Mathematics of Urban Morphology, 2019, 55–75.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
CHENG Long is an editorial board member for Journal of Systems Science and Complexity and was not involved in the editorial review or the decision to publish this article. All authors declare that there are no competing interests.
Additional information
This research was supported by the National Natural Science Foundation of China under Grant Nos. 62025307 and U1913209.
Rights and permissions
About this article
Cite this article
Liu, Y., Cheng, L. Optimal Resource Allocation and Feasible Hexagonal Topology for Cyber-Physical Systems. J Syst Sci Complex 36, 1583–1608 (2023). https://doi.org/10.1007/s11424-023-2256-z
Received:
Revised:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11424-023-2256-z