摘要
为了对信息物理系统的安全问题进行有效评估,从而为信息物理系统故障预测和安全性分析提供有效支撑,对信息物理系统进行建模,并给出蓄意攻击策略下级联失效过程的理论分析.在此基础上,基于仿真实验对比分析,给出影响信息物理系统安全性的主要因素及分析;最后探讨了信息物理系统的安全性分析的挑战和下一步研究工作的延伸方向.
To effectively evaluate the security problems of information physical systems and to provide effective support for information physical system fault prediction and security analysis,the information physics system was modeled. The theoretical analysis of the cascading failure process under the deliberate attack strategy was given. On the basis of this,based on the comparative analysis of simulation experiments,the main factors affecting the security of the information physics system were analyzed. The challenges of security analysis of information physics systems and the direction of further research were explored.
引文
[1]李仁发,谢勇,李蕊,等.信息-物理融合系统若干关键问题综述[J].计算机研究与发展,2012,49(6):1149-1161.
[2]何明,梁文辉,陈希亮,等.CPS系统体系结构顶层设计研究[J].计算机科学,2013,40(11):18-22.
[3]何廷润.“工业4. 0”战略中CPS系统的挑战与前瞻[J].移动通信,2014,38(21):19-21.
[4] JONES D,ROONEY P,BISSELL R E. American competitiveness initiative[J]. World education information,2006,16:1-25.
[5]杨解朴.解读中德创新伙伴关系[J].当代世界,2014(11):21-23.
[6]中国信息物理系统发展论坛.信息物理系统白皮书[R/OL].(2018-03-02)[2018-12-01]. http://www.cesi.cn/201703/2251.html.
[7]张恒.信息物理系统安全理论研究[D].杭州:浙江大学,2015.
[8]李钊,彭勇,谢丰,等.信息物理系统安全威胁与措施[J].清华大学学报(自然科学版),2012,52(10):1482-1487.
[9]李伯宇,高飞,朱建平,等.信息物理系统研究与应用综述[J].成都信息工程学院学报,2014,29(4):388-393.
[10]邢静宇,张立臣.信息物理系统安全及相关措施[J].计算机系统应用,2014,23(6):1-6.
[11]郑明辉,吕含笑,段洋洋.相同敏感值数据集的隐私保护泛化算法[J].郑州大学学报(理学版),2018,50(2):35-40.
[12]李曦,孙贝磊,万波,等.安全关键信息物理系统的时序可预测性[J].计算机科学,2017,44(S2):490-493.
[13]敖伟.信息物理系统中攻击检测与安全状态估计问题研究[D].重庆:重庆大学,2017.
[14]蔡亮.基于故障树的信息安全风险评估方法研究[D].武汉:华中科技大学,2008.
[15]张晖,杨小彦,赵旭剑,等.基于社会网络关注度的学科前沿热点挖掘[J].郑州大学学报(理学版),2018,50(3):49-55.
[16] YOUNES M B,BOUKERCHE A. A performance evaluation of a fault-tolerant path recommendation protocol for smart transportation system[J]. Wireless networks,2018,24(2):345-360.
[17]邓良辰,刘艳丽,柏天缘.考虑分布式发电的配电网CPS可靠性评估[J].电力系统及其自动化学报,2017,29(11):32-38.
[18]高洋,马洋洋,张亮,等.伴随随机攻击的信息物理系统的同步控制[J].清华大学学报(自然科学版),2018,58(1):14-19.
[19] CHEN X D,ZHOU Y C,ZHOU H,et al. Analysis of production data manipulation attacks in petroleum cyber-physical systems[C]∥IEEE/ACM International Conference on Computer-Aided Design(ICCAD). Austin,2017:108.
[20] SABALIAUSKAITE G,MATHUR A P. Aligning cyber-physical system safety and security[C]∥Asia-Pacific Conference on Complex Systems Design&Management. Singapore,2015:41-53.
[21] FANG Y P,ZIO E. Optimizing the resilience of interdependent infrastructure systems against intentional attacks[C]∥International Conference on System Reliability and Safety. Milan,2017:62-67.
[22] BULDYREV S V,PARSHANI R,PAUL G,et al. Catastrophic cascade of failures in interdependent networks[J]. Nature,2010,464(7291):1025-1028.
[23] HUANG Z,WANG C,RUJ S,et al. Modeling cascading failures in smart power grid using interdependent complex networks and percolation theory[C]∥IEEE International Conference on Industrial Electronics&Applications. Melbourne,2013:1023-1028.
[24] BABALOLA A A,BELKACEMI R,ZARRABIAN S. Real-time cascading failures prevention for multiple contingencies in smart grids through a multi-agent system[J]. IEEE transactions on smart grid,2018,9(1):373-385.
[25] YAGAN O,QIAN D J,ZHANG J S. Optimal allocation of interconnecting links in cyber-physical systems:interdependence,cascading failures,and robustness[J]. IEEE transactions on parallel&distributed systems,2012,23(9):1708-1720.
[26] GALLOS L K,COHEN R,ARGYRAKIS P,et al. Stability and topology of scale-free networks under attack and defense strategies[J]. Physical review letters,2005,94(18):188701.
[27] SHAO J,BULDYREV S V,BRAUNSTEIN L A,et al. Structure of shells in complex networks[J]. Physical review E,2009,80(3):036105.