Abstract

In this manuscript, we explore the network and cyber security challenges furthermore, issues of cyber or digital physical frameworks. (1) We epitomize the general work process of cyber or digital physical frameworks, (2) identify the conceivable vulnerabilities, assault issues, foes qualities and an arrangement of difficulties that are required to be addressed. A framework has been proposed for setting situation-apprehensive security structure for general digital or cyber physical frameworks with the implementation of biometrics.

Highlights

  • Cyber-Physical System (CPS) focuses at watching the behavior of physical procedures, and impelling activities to variation its behavior making the physical condition work exactly and healthier

  • A framework has been proposed for setting situation- apprehensive security structure for general digital or cyber physical frameworks with the implementation of biometrics

  • As the physical and cyber frameworks connections increment, the physical frameworks are exceptionally subject to the vulnerabilities with respect to the security in the digital framework

Read more

Summary

INTRODUCTION

Cyber-Physical System (CPS) focuses at watching the behavior of physical procedures, and impelling activities to variation its behavior making the physical condition work exactly and healthier. CPS comprises of two driving peripherals, a physical procedure and a digital framework. The physical procedure may incorporate checking security and developments of travelers in an open transport framework, or of vehicles on a street system or observing wellbeing and prosperity of domesticated animals and raising programmed alerts of ailments or wounds or the mix of both. The vulnerabilities in security are being found basically in electronic power matrices, shrewd transportation frameworks, and medicinal frameworks, etc which are the digital physical frameworks. The customary working of a Cyber-Physical System has 4 main steps: Monitoring, Networking, Computing and Actuation. CPS contains many such sensors data accumulated can be aggregated or diffused for processing by analyser. X Actuate various forms of actions including correcting the cyber behaviour of the CPS, changing the physical process.

Authenticity
Denial-of-Service Attack
Expert Elicited Model
Attack Graph
Game theoretic model
Stochastic games
CONTEXT-AWARE BIOMETRIC SECURITY FRAMEWORK
Sensing security
Cyber Security
Control Security
CONCLUSION
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.