Security Analysis and a Potential Layer to Layer Security Solution of Medical Cyber-Physical Systems
暂无分享,去创建一个
Md. Atiqur Rahman Ahad | Md Atiqur Rahman Ahad | Mosabber Uddin Ahmed | Mehedi Hasan Raju | M. H. Raju
[1] Ayan Banerjee,et al. Ensuring Safety, Security, and Sustainability of Mission-Critical Cyber–Physical Systems , 2012, Proceedings of the IEEE.
[2] Eduard Ayguadé,et al. AXIOM: A Hardware-Software Platform for Cyber Physical Systems , 2016, 2016 Euromicro Conference on Digital System Design (DSD).
[3] Ling Shi,et al. Jamming attack on Cyber-Physical Systems: A game-theoretic approach , 2013, 2013 IEEE International Conference on Cyber Technology in Automation, Control and Intelligent Systems.
[4] Dhiren Patel,et al. A Survey on Internet of Things: Security and Privacy Issues , 2014 .
[5] Liviu Miclea,et al. About dependability in cyber-physical systems , 2011, 2011 9th East-West Design & Test Symposium (EWDTS).
[6] Kai Zhao,et al. A Survey on the Internet of Things Security , 2013, 2013 Ninth International Conference on Computational Intelligence and Security.
[7] Long Cheng,et al. On Threat Modeling and Mitigation of Medical Cyber-Physical Systems , 2017, 2017 IEEE/ACM International Conference on Connected Health: Applications, Systems and Engineering Technologies (CHASE).
[8] Mostafa Azizi,et al. Review on security issues in RFID systems , 2017 .
[9] Mehmet K. Aktas,et al. Emerging Security Mechanisms for Medical Cyber Physical Systems , 2016, IEEE/ACM Transactions on Computational Biology and Bioinformatics.
[10] Reza Ebrahimi Atani,et al. A Comparison of Link Layer Attacks on Wireless Sensor Networks , 2011, J. Information Security.
[11] Walid Taha,et al. Developing A First Course on Cyber-Physical Systems , 2014, WESE'14.
[12] Félix J. García Clemente,et al. Sustainable securing of Medical Cyber-Physical Systems for the healthcare of the future , 2018, Sustain. Comput. Informatics Syst..
[13] Zhang,et al. Security Architecture on the Trusting Internet of Things , 2011 .
[14] Anupam Joshi,et al. Security in Sensor Networks , 2020, Texts in Computer Science.
[15] David A. Wagner,et al. Security in wireless sensor networks , 2004, SASN '04.
[16] Imran A. Zualkernan,et al. Internet of things (IoT) security: Current status, challenges and prospective measures , 2015, 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST).
[17] Xu Jin,et al. An adaptive control architecture for cyber-physical system security in the face of sensor and actuator attacks and exogenous stochastic disturbances , 2018 .
[18] Radu Marculescu,et al. Eavesdropping Minimization via Transmission Power Control in Ad-Hoc Wireless Networks , 2006, 2006 3rd Annual IEEE Communications Society on Sensor and Ad Hoc Communications and Networks.
[19] Jiang Li,et al. Attacks and Countermeasures in Sensor Networks: A Survey , 2010 .
[20] Refik Molva,et al. Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.
[21] Ciprian-Radu Rad,et al. Smart Monitoring of Potato Crop: A Cyber-Physical System Architecture Model in the Field of Precision Agriculture , 2015 .
[22] G. Padmavathi,et al. A Survey of Attacks, Security Mechanisms and Challenges in Wireless Sensor Networks , 2009, ArXiv.
[23] Wade Trappe,et al. The challenges facing physical layer security , 2015, IEEE Communications Magazine.
[24] Ioan Dumitrache,et al. Agricultural Enterprise as a Complex System: A Cyber Physical Systems Approach , 2015, 2015 20th International Conference on Control Systems and Computer Science.
[25] Athanasios V. Vasilakos,et al. Security of the Internet of Things: perspectives and challenges , 2014, Wireless Networks.
[26] Juan E. Tapiador,et al. RFID Systems: A Survey on Security Threats and Proposed Solutions , 2006, PWC.
[27] Mary Baker,et al. Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.
[28] Delia Ioana Dogaru,et al. Cyber-physical systems in healthcare networks , 2015, 2015 E-Health and Bioengineering Conference (EHB).
[29] Kalpana Sharma,et al. Wireless Sensor Networks: An Overview on its Security Threats , 2010 .
[30] Jean-Yves Le Boudec,et al. Nodes bearing grudges: towards routing security, fairness, and robustness in mobile ad hoc networks , 2002, Proceedings 10th Euromicro Workshop on Parallel, Distributed and Network-based Processing.
[31] Maede Ashouri-Talouki,et al. DoS, impersonation and de-synchronization attacks against an ultra-lightweight RFID mutual authentication protocol for IoT , 2017, The Journal of Supercomputing.
[32] Jie Gao,et al. Detecting Wormhole Attacks in Wireless Networks Using Connectivity Information , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[33] Radha Poovendran,et al. Node capture attacks in wireless sensor networks: A system theoretic approach , 2010, 49th IEEE Conference on Decision and Control (CDC).
[34] Frank Vahid,et al. A Survey on Concepts, Applications, and Challenges in Cyber-Physical Systems , 2014, KSII Trans. Internet Inf. Syst..
[35] Sarmad Ullah Khan,et al. Future Internet: The Internet of Things Architecture, Possible Applications and Key Challenges , 2012, 2012 10th International Conference on Frontiers of Information Technology.
[36] Qusay H. Mahmoud,et al. Cyber physical systems security: Analysis, challenges and solutions , 2017, Comput. Secur..
[37] Insup Lee,et al. Medical Cyber Physical Systems , 2010, Design Automation Conference.
[38] Albert Y. Zomaya,et al. Security Issues in Wireless Sensor Networks , 2006, 2006 International Conference on Systems and Networks Communications (ICSNC'06).
[39] Khushboo Gupta,et al. Design Issues and Challenges in Wireless Sensor Networks , 2015 .
[40] Edward A. Lee. Cyber Physical Systems: Design Challenges , 2008, 2008 11th IEEE International Symposium on Object and Component-Oriented Real-Time Distributed Computing (ISORC).
[41] David A. Wagner,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Ad Hoc Networks.
[42] Nikolaos Papakonstantinou,et al. Common cause failure analysis of cyber–physical systems situated in constructed environments , 2013, Research in Engineering Design.
[43] Kazuaki Murakami,et al. A Smart Cyber-physical Systems-Based Solution for Pest Control (Work in Progress) , 2013, 2013 IEEE International Conference on Green Computing and Communications and IEEE Internet of Things and IEEE Cyber, Physical and Social Computing.
[44] Lui Sha,et al. A framework for the safe interoperability of medical devices in the presence of network failures , 2010, ICCPS '10.
[45] Yang Li,et al. A Security Architecture in Cyber-Physical Systems: Security Theories, Analysis, Simulation and Application Fields , 2015 .
[46] Levent Gürgen,et al. Self-aware cyber-physical systems and applications in smart buildings and cities , 2013, 2013 Design, Automation & Test in Europe Conference & Exhibition (DATE).
[47] Rutuja Jadhav,et al. Security Issues and Solutions in Wireless Sensor Networks , 2017 .
[48] Michail Maniatakos,et al. Cyber-physical systems: A security perspective , 2015, 2015 20th IEEE European Test Symposium (ETS).
[49] Umar Mujahid,et al. RCIA: A New Ultralightweight RFID Authentication Protocol Using Recursive Hash , 2015, Int. J. Distributed Sens. Networks.
[50] Nilanjan Dey,et al. Medical cyber-physical systems: A survey , 2018, Journal of Medical Systems.
[51] Liang Hu,et al. Review of Cyber-Physical System Architecture , 2012, 2012 IEEE 15th International Symposium on Object/Component/Service-Oriented Real-Time Distributed Computing Workshops.
[52] Qaisar Shafi,et al. Cyber Physical Systems Security: A Brief Survey , 2012, 2012 12th International Conference on Computational Science and Its Applications.
[53] Syed Hassan Ahmed,et al. Cyber Physical System: Architecture, applications and research challenges , 2013, 2013 IFIP Wireless Days (WD).
[54] Richard Candell,et al. Towards a systematic threat modeling approach for cyber-physical systems , 2015, 2015 Resilience Week (RWS).
[55] Shahzad Sarwar,et al. A New Ultralightweight RFID Authentication Protocol for Passive Low Cost Tags: KMAP , 2017, Wirel. Pers. Commun..
[56] Christos G. Cassandras,et al. Smart Cities as Cyber-Physical Social Systems , 2016 .
[57] Jiafu Wan,et al. A survey of Cyber-Physical Systems , 2011, 2011 International Conference on Wireless Communications and Signal Processing (WCSP).
[58] Tianbo Lu,et al. Cyber-physical System Risk Assessment , 2013, 2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.
[59] Rina Bhattacharya. A COMPARATIVE STUDY OF PHYSICAL ATTACKS ON WIRELESS SENSOR NETWORKS , 2013 .
[60] Piyush Maheshwari,et al. Security Issues of Cyber Physical System: A Review , 2016 .
[61] Jiafu Wan,et al. Security in the Internet of Things: A Review , 2012, 2012 International Conference on Computer Science and Electronics Engineering.
[62] Tim Kerins,et al. Public-Key Cryptography for RFID-Tags , 2007, Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07).
[63] Ruttikorn Varakulsiripunth,et al. Detecting Sinkhole attacks in wireless sensor networks , 2009, 2009 ICCAS-SICE.
[64] Choong Seon Hong,et al. Security in wireless sensor networks: issues and challenges , 2006, 2006 8th International Conference Advanced Communication Technology.
[65] Yu-Ting Li,et al. A Cyber-Physical Management System for Delivering and Monitoring Surgical Instruments in the OR , 2013, Surgical innovation.
[66] Srdjan Capkun,et al. Self-organization in mobile ad hoc networks: the approach of Terminodes , 2001, IEEE Commun. Mag..