Skip to main content
Log in

Optimal Resource Allocation and Feasible Hexagonal Topology for Cyber-Physical Systems

  • Published:
Journal of Systems Science and Complexity Aims and scope Submit manuscript

Abstract

Networked cyber-physical systems are facing serious security threats from malicious attacks. It is noted that the networked cyber-physical system should take defense measures into account at the beginning of its construction. From the conservative defensive perspective, this paper proposes a robust optimal defense resource allocation strategy to reduce the maximum possible losses of the networked cyber-physical system caused by potential attacks. Then, based on the robust optimal allocation strategy, it can be proved that the topology of the networked cyber-physical system has a great influence on the loss function. In order to further improve security, the effects of adding redundant connections are investigated. Furthermore, by taking geographical knowledge into account, a hexagonal construction scheme is proposed for providing a geographically-feasible and economically-viable solution for building networked cyber-physical systems, where the loss function has a cubic decay.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Liu GP, Networked learning predictive control of nonlinear cyber-physical systems, Journal of Systems Science and Complexity, 2020, 33(6): 1719–1732.

    Article  MathSciNet  MATH  Google Scholar 

  2. Sha L, Gopalakrishnan S, Liu X, et al, Cyber-physical systems: A new frontier, Proceedings of 2008 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing, Taiwan, China, 2008, 1–9.

  3. Sun C, Cembrano G, Puig V, et al, Cyber-physical systems for real-time management in the urban water cycle, Proceedings of 2018 International Workshop on Cyber-Physical Systems for Smart Water Networks, 2018, 5–8.

  4. Mo Y, Kim T H, Brancik K, et al, Cyber-physical security of a smart grid infrastructure, Proceedings of the IEEE, 2012, 100(1): 195–209.

    Article  Google Scholar 

  5. Lu G, De D, and Song W, SmartGridLab: A laboratory-based smart grid testbed, Proceedings of the First IEEE International Conference on Smart Grid Communications, Gaithersburg, USA, 2010, 143–148.

  6. Younis O and Moayeri N, Employing cyber-physical systems: Dynamic traffic light control at road intersections, IEEE Internet of Things Journal, 2017, 4(6): 2286–2296.

    Article  Google Scholar 

  7. Wang L, Lin F, and Yin G, Network robustness depth and topology management of networked dynamic systems, Journal of Systems Science and Complexity, 2016, 29(1): 1–21.

    Article  MathSciNet  MATH  Google Scholar 

  8. Wen G, Yu W, Yu X, et al, Complex cyber-physical networks: From cybersecurity to security control, Journal of Systems Science and Complexity, 2017, 30(1): 46–67.

    Article  MathSciNet  MATH  Google Scholar 

  9. Sridhar S, Hahn A, and Govindarasu M, Cyber-physical system security for the electric power grid, Proceedings of the IEEE, 2012, 100(1): 210–224.

    Article  Google Scholar 

  10. Lindsay J R, Stuxnet and the limits of cyber warfare, Security Studies, 2013, 22(3): 365–404.

    Article  Google Scholar 

  11. Zhang Q, Liu K, Xia Y, et al, Optimal stealthy deception attack against cyber-physical systems, IEEE Transactions on Cybernetics, 2020, 50(9): 3963–3972.

    Article  Google Scholar 

  12. Zhang X, Liu Y, and Zhang Y, A secure clock synchronization scheme for wireless sensor networks against malicious attacks, Journal of Systems Science and Complexity, 2021, 34(6): 2125–2138.

    Article  MathSciNet  MATH  Google Scholar 

  13. Zhang H and Zheng W X, Denial-of-service power dispatch against linear quadratic control via a fading channel, IEEE Transactions on Automatic Control, 2018, 63(9): 3032–3039.

    Article  MathSciNet  MATH  Google Scholar 

  14. Mo H and Sansavini G, Dynamic defense resource allocation for minimizing unsupplied demand in cyber-physical systems against uncertain attacks, IEEE Transactions on Reliability, 2017, 66(4): 1253–1265.

    Article  Google Scholar 

  15. Wang Y, Yu F R, Tang H, et al, A mean field game theoretic approach for security enhancements in mobile Ad hoc networks, IEEE Transactions on Wireless Communications, 2014, 13(3): 1616–1627.

    Article  Google Scholar 

  16. Wu H and Wang W, A game theory based collaborative security detection method for internet of things systems, IEEE Transactions on Information Forensics and Security, 2018, 13(6): 1432–1445.

    Article  Google Scholar 

  17. Ismail Z, Leneutre J, Bateman D, et al, A game theoretical analysis of data confidentiality attacks on smart-grid AMI, IEEE Journal on Selected Areas in Communications, 2014, 32(7): 1486–1499.

    Article  Google Scholar 

  18. Li Y, Shi L, Cheng P, et al, Jamming attacks on remote state estimation in cyber-physical systems: A game-theoretic approach, IEEE Transactions on Automatic Control, 2015, 60(10): 2831–2836.

    Article  MathSciNet  MATH  Google Scholar 

  19. Abedi M R, Mokari N, Saeedi H, et al, Robust resource allocation to enhance physical layer security in systems with full-duplex receivers: Active adversary, IEEE Transactions on Wireless Communications, 2017, 16(2): 885–899.

    Article  Google Scholar 

  20. Xu D and Li Q, Resource allocation for secure communications in cooperative cognitive wireless powered communication networks, IEEE Systems Journal, 2019, 13(3): 2431–2442.

    Article  Google Scholar 

  21. Alpcan T and Buchegger S, Security games for vehicular networks, IEEE Transactions on Mobile Computing, 2011, 10(2): 280–290.

    Article  Google Scholar 

  22. Liu Y and Cheng L, Optimal defense resource allocation and geographically feasible hexagonal topology construction for power grid security, Communications in Computer and Information Science, 2021, 1468: 452–462.

    Article  Google Scholar 

  23. Wang H, Zhao Q, Jia Q, et al, Efficient topology optimization for a wired networked system by adding wireless communication, Proceedings of 2012 American Control Conference, Montreal, Canada, 2012, 448–453.

  24. Hsu W and Zou X, Central place theory and the power law for cities, The Mathematics of Urban Morphology, 2019, 55–75.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Long Cheng.

Ethics declarations

CHENG Long is an editorial board member for Journal of Systems Science and Complexity and was not involved in the editorial review or the decision to publish this article. All authors declare that there are no competing interests.

Additional information

This research was supported by the National Natural Science Foundation of China under Grant Nos. 62025307 and U1913209.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Liu, Y., Cheng, L. Optimal Resource Allocation and Feasible Hexagonal Topology for Cyber-Physical Systems. J Syst Sci Complex 36, 1583–1608 (2023). https://doi.org/10.1007/s11424-023-2256-z

Download citation

  • Received:

  • Revised:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11424-023-2256-z

Keywords

Navigation