An Introduction to Multilevel Security in Cyber Physical System

International Journal of Computer Science and Engineering
© 2017 by SSRG - IJCSE Journal
Volume 4 Issue 7
Year of Publication : 2017
Authors : M.Sharada Varalakshmi

pdf
How to Cite?

M.Sharada Varalakshmi, "An Introduction to Multilevel Security in Cyber Physical System," SSRG International Journal of Computer Science and Engineering , vol. 4,  no. 7, pp. 26-29, 2017. Crossref, https://doi.org/10.14445/23488387/IJCSE-V4I7P106

Abstract:

Society has been facing considerable amount of challenges in recent years. Congestion of traffic, scarcity of energy, an increase in medical expenses and other problems have increased and turned for the worse and need urgent attention. These problems can be alleviated by applying technology and developing smart infrastructures. Smart infrastructures assimilate intelligence in everyday objects in order to improve the efficiency of certain elementary but crucial tasks. For example, a smart coffee pot detects decrease in temperature of its content and alerts its owner so that coffee is not unnecessarily reheated. This saves energy and reduces consumption of electricity. Similarly, traffic congestion can be reduced by incorporating sensors at specific location that sends signals to the base station about locations of congestion.

Keywords:

 

Cyber Physical, CPS, PDA, RFID

References:

[1] Adelstein, Frank, et al. Fundamentals of mobile and pervasive computing. Vol. 1. New York: McGraw-Hill, 2005. 
[2] Ahn, Gail-Joon, and Ravi Sandhu. "Role-based authorization constraints specification." ACM Transactions on Information and System Security (TISSEC) 3.4 (2000): 207-226. 
[3] Alfred J, Menezes, Paul C. Van Oorschot, and Scott A. Vanstone. Handbook of applied cryptography. CRC press, 1996. 
[4] Amioy ,Kumar and Ajay Kumar. "Development of a new cryptographic construct using palmprint-based fuzzy vault." EURASIP Journal on Advances in Signal Processing 2009.1 (2009): 967046. 
[5] Androutsopoulos, Ion, et al. "Learning to filter spam e-mail: A comparison of a naive bayesian and a memory-based approach." arXiv preprint cs/0009009 (2000). 
[6] Anunciaçao, Orlando, et al. "A data mining approach for the detection of high-risk breast cancer groups." Advances in Bioinformatics. Springer Berlin Heidelberg, 2010. 43-51. 
[7] Anyanwu, Matthew N., and Sajjan G. Shiva. "Comparative analysis of serial decision tree classification algorithms." International Journal of Computer Science and Security 3.3 (2009): 230-240. 
[8] Ardagna, Claudio Agostino, et al. "Regulating exceptions in healthcare using policy spaces." IFIP Annual Conference on Data and Applications Security and Privacy. Springer Berlin Heidelberg, 2008. 
[9] Clarke, Roger. "A major impediment to B2C success is... the concept'B2C'." Proceedings of the 8th international conference on Electronic commerce: The new e-commerce: innovations for conquering current barriers, obstacles and limitations to conducting successful business on the internet. ACM, 2006. 
[10] Covington, Michael J., et al. "Securing context-aware applications using environment roles." Proceedings of the sixth ACM symposium on Access control models and technologies. ACM, 2001. 
[11] Sandeep KS, Tridib Mukherjee, and Krishna Venkatasubramanian. "Criticality aware access control model for pervasive applications." Pervasive Computing and Communications, 2006. PerCom 2006. Fourth Annual IEEE International Conference on. IEEE, 2006. 
[12] Han, Jiawei, Jian Pei, and Micheline Kamber. Data mining: concepts and techniques. Elsevier, 2011.