Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Cyber-Physical Systems and Humane Security Engineering


Affiliations
1 Department of Computer Science and Engineering, College of Engineering, Anna University, Chennai Tamil Nadu, India
     

   Subscribe/Renew Journal


There is plenty of on-going research in the area of supporting protocol stacks, crypt systems and formal methods. Multicast authentication is a critical security service in mobile and sensor networks. Cyber-Physical Systems [CPS] are controlled or monitored by computer-based algorithms, tightly integrated with the Internet and its users. The interaction patterns are increasingly becoming complicated. Unless, humane approaches are introduced in security engineering the computer-based approaches become increasingly sophisticated, faster, expensive and complex. These solutions are replete with several vulnerabilities leaving ample scope for breaches resulting in serious tangible and intangible losses to the organizational assets. This paper has a focus on the human integration in CPS. It also positions the analog systems in the digital space. Humane Security Engineering is intended to result in civilizing effect on people.

Keywords

Algorithms, Cyber-Physical Systems, Humane Security Engineering.
Subscription Login to verify subscription
User
Notifications
Font Size


  • G. Loukas, Cyber-Physical Attacks - A Growing Invisible Threat, Elsevier, USA, 2015.
  • C. Marti, “A survey of the European security market,” Economics of Security Working Paper 43, Berlin: Economics of Security, 2011.
  • B. Hadorn, M. Courant, and B. Hirsbrunner, “Towards human-centered cyber-physical systems: A modeling approach, Technical Report, January 2016.
  • R. Kling, and S. L. Star, “Human centered systems in the perspective of organizational and social informatics,” SIGCAS Computers and Society, vol. 28, no. 1, pp. 22-29, March 1998.
  • S. Shibu, and S. Jain, “Pervasive computing for automobiles: An approach to maximize user convenience and safety using VANETs,” International Journal of Computer and Electrical Engineering, vol. 2, no. 6, pp. 1053-1058, December 2010.
  • J.-L. McLamb, Keeping Religious Institutions Secure, Elsevier, USA, 2015.
  • J. Valente, C. Barreto, and A. A. Cardenas, “Cyber-physical systems attestation,” 2014 IEEE International Conference on Distributed Computing in Sensor Systems, Marina Del Rey, California, USA, pp. 354-357, 2014.
  • T. V. Gopal, “Engineering software behavior in cyber-physical systems,” International Journal of Engineering Issues, vol. 2016, no. 1, pp. 44-52, 2015.
  • R. Pugalenthi, and T. V. Gopal, “Performance evaluation of multimedia data in heterogeneous network using multicasting with kerberos protocol,” International Journal of Soft Computing, vol. 8, no. 4, pp. 247-251, 2013.
  • R. Pugalenthi, and T. V. Gopal, “An efficient and variable interval rekeying for dynamic Ad Hoc multicast groups using key path reduction,” Journal of Computer Science, vol. 10, no. 8, pp. 1281-1290, 2014.
  • T. V. Gopal, “The physics of evolving complex software systems,” International Journal of Engineering Issues, vol. 2015, no. 1, pp. 33-39, 2015.
  • J. Lasenby, A. N. Lasenby, and C. J. L. Doran, “A unified mathematical language for physics and engineering in the 21st century,” Philosophical Transactions of Royal Society of London, A, vol. 358, no. 1765, pp. 21-39, 2000.
  • V. P. Kruglov, S. P. Kuznetsov, and A. Pikovsky, “Attractor of smale - Williams type in an autonomous distributed system,” Regular and Chaotic Dynamics, vol. 19, no. 4, pp. 483-494, 2014.
  • M. Sezera, and A. Akyuz-Dascıoglu, “A Taylor method for numerical solution of generalized pantograph equations with linear functional argument,” Journal of Computational and Applied Mathematics, vol. 200, no. 1, pp. 217-225, 2007.
  • G. Makay, and J. Terjeki, “On the asymptotic behavior of the pantograph equations,” Electronic Journal of Qualitative Theory of Differential Equations [EJQTDE], no. 2, pp. 1-12, 1998.
  • M. M. Bahsi, and M. Çevik, “Numerical solution of pantograph-type delay differential equations using perturbation-iteration algorithms,” Journal of Applied Mathematics, vol. 2015, pp. 1-10, 2015.
  • S. Yu. Reutskiy, “A new collocation method for approximate solution of the pantograph functional differential equations with proportional delay,” Applied Mathematics and Computation, vol. 266, pp. 642-655, 2015.
  • W. Ming, and C. Huang, “Collocation methods for Volterra functional integral equations with non-vanishing delays,” Applied Mathematics and Computation, vol. 296, pp. 198-214, 2017.
  • F. Auricchio, L. B. D. Veiga, T. J. R. Hughes, A. Reali, and G. Sangalli, “Isogeometric collocation methods,” Mathematical Models and Methods in Applied Sciences, vol. 20, no. 11, pp. 2075-2107, 2010.
  • A. Guessab, and F. Guessab, “Symmetrization, convexity and applications,” Applied Mathematics and Computation, vol. 240, pp. 149-160, 2014.
  • A. Guessab, “Symmetrization procedures and convexity in centrally symmetric polytopes,” Applied Mathematics and Computation, vol. 243, pp. 74-82, 2014.
  • N. Naylor, Naked Geometry, Lulu, Inc., Raleigh, 2005.
  • S. Papert, The Children’s Machine: Rethinking School in the Age of the Computer, Basic Books, New York, 1992.
  • G. Derfel, and A. Iserles, “The pantograph equation in the complex plane,” Journal of Mathematical Analysis and Applications, vol. 213, no. 1, pp. 117-132, 1997.
  • A. K. Nayak, Digital Forensics, CSI Communications, Computer Society of India, Mumbai, vol. 39, no. 12, March 2016.

Abstract Views: 214

PDF Views: 0




  • Cyber-Physical Systems and Humane Security Engineering

Abstract Views: 214  |  PDF Views: 0

Authors

T. V. Gopal
Department of Computer Science and Engineering, College of Engineering, Anna University, Chennai Tamil Nadu, India

Abstract


There is plenty of on-going research in the area of supporting protocol stacks, crypt systems and formal methods. Multicast authentication is a critical security service in mobile and sensor networks. Cyber-Physical Systems [CPS] are controlled or monitored by computer-based algorithms, tightly integrated with the Internet and its users. The interaction patterns are increasingly becoming complicated. Unless, humane approaches are introduced in security engineering the computer-based approaches become increasingly sophisticated, faster, expensive and complex. These solutions are replete with several vulnerabilities leaving ample scope for breaches resulting in serious tangible and intangible losses to the organizational assets. This paper has a focus on the human integration in CPS. It also positions the analog systems in the digital space. Humane Security Engineering is intended to result in civilizing effect on people.

Keywords


Algorithms, Cyber-Physical Systems, Humane Security Engineering.

References