دانلود رایگان مقاله انگلیسی آسیب پذیری سیستم های کنترل در کاربردهای اینترنت اشیا - IEEE 2018

عنوان فارسی
آسیب پذیری سیستم های کنترل در کاربردهای اینترنت اشیا
عنوان انگلیسی
Vulnerabilities of Control Systems in Internet of Things Applications
صفحات مقاله فارسی
0
صفحات مقاله انگلیسی
10
سال انتشار
2018
نشریه
آی تریپل ای - IEEE
فرمت مقاله انگلیسی
PDF
نوع مقاله
ISI
پایگاه
اسکوپوس
کد محصول
E9836
رشته های مرتبط با این مقاله
مهندسی برق، فناوری اطلاعات
گرایش های مرتبط با این مقاله
مهندسی کنترل، اینترنت و شبکه های گسترده
مجله
مجله اینترنت اشیا - IEEE Internet of Things Journal
دانشگاه
Mechanical Engineering Department - University of Villanova - Villanova - USA
کلمات کلیدی
سیستم های فیزیکی سایبری، اینترنت اشیا، آسیب پذیری سیستم های کنترل
doi یا شناسه دیجیتال
https://doi.org/10.1109/JIOT.2017.2787962
چکیده

Abstract


In this paper, we present some initial results about vulnerability of control systems that can be used in Internet of Things (IoT) applications. Up to our best knowledge, this paper is the first study about vulnerability of applied control systems in general, and especially in the IoT environment. The purpose of this paper is to examine fundamentals of linear control systems and consider vulnerability of its main features and concepts used in Internet of Things applications under potential malicious attacks. We examine vulnerabilities of system stability, controllability, observability, design of feedback loops, and design and placement of sensors and controllers (actuators). The detailed study is limited to the most important vulnerability issues in time-invariant, unconstrained, deterministic, linear physical systems. Several interesting and motivating examples are provided. We have outlined also some basic vulnerability studies for time-invariant nonlinear unconstrained systems, and indicate that such a study is particularly needed for distributed parameter systems that are very prone to outside physical and cyber-attacks.

نتیجه گیری

CONCLUSIONS


Vulnerability of several main attributes (features) of linear control feedback systems that are integral parts of the IoT to malicious attacks was considered, and some motivating examples were presented. The study was limited to timeinvariant systems. Future research is needed to address these issues and propose the best defense strategies in cases of such attacks. It is expected that this paper will motivate corresponding vulnerability studies of time-invariant linear and nonlinear systems with algebraic constraints, and eventually the corresponding study will be extended to time varying and/or stochastic physical systems with and without constraints, as well as to distributed parameter physical systems whose dynamics is described by partial differential equations.


بدون دیدگاه