Browsing by Author "Sen, S"
Now showing 1 - 5 of 5
- Results Per Page
- Sort Options
Publication Embargo Analysis of Cyber-Attack in Big Data IoT and Cyber-Physical Systems-A Technical Approach to Cybersecurity Modeling(IEEE, 2019-03-29) Sen, S; Jayawardena, CThe Internet of Things (IoT) and Cyber-Physical Systems (CPS) are generating widespread data. Their success depends on a well secured infrastructure, which necessitates providing a robust infrastructure by securing the CPS and IoT system setup against the possibility of cyberattacks. With an increased utilization of CPS as well as widespread implementation of IoT with low power wireless sensors, the security vulnerability is growing, and increasing the possibility of cyberattacks. This paper has discussed models of how different categories of CPS can be stabilized in the event of a disaster, and analyzed how possible cyberattacks can be mitigated by taking a technical approach to model the cybersecurity.Publication Embargo Analysis of network techniques and cybersecurity for improving performance of big data IoT and cyber-physical communication internetwork(IEEE, 2019-02-13) Sen, S; Jayawardena, CThe Internet of Things (IoT) and Cyber-Physical Systems (CPS), are generating wide spread data. The success of these trio depends on a well performed cyber-communication infrastructure. This necessitates improving the performance of the cyber-communication internetwork; this performance improvement includes optimization of network techniques as well as the security of the cyber-network. Internet infrastructure has been upgraded to higher level ever than before, where we are enjoying technologies like fibre, 10-gig ethernet and even 100-gig ethernet, but there is no guarantee of communication in the cyber space, internet still providing packet delivery on "best effort" basis. On the other side, cyber hackers are targeting big physical infrastructures, industrial hardware in addition to the financial institutions. Therefore, it has become vital to address secure and faster data communications, in order to improve the Performance of the Internetwork.Publication Embargo Cybersecurity and Network Performance Modeling in Cyber-Physical Communication for BigData and Industrial IoT Technologies(IEEE, 2019-07-26) Sen, S; Jayawardena, CThe information and networking technology have been revolutionized with the inception of recent evolution of Cyber-Physical Systems (CPS) and the Internet of Things (IoT). The next generation distributed computing systems i.e., CPS and IoT are highly interconnected and deeply embedded with the physical world. By capitalizing the advantages and opportunities of these technologies, Industrial-IoT has been fueling smart industrial processes. The execution and application of these processes generate huge amount of data, which leads the distributed computing systems to carefully consider information and data management reliably and securely; also facilitating the necessary automation as well as ensuring timely information exchange. But the current internet doesn't guarantee the network performance and secure transportation; in addition the physical systems are becoming more insecure when interconnected to the cyber systems. These bottlenecks are leading to the necessity of improving performance and security in the cyber-physical communication. Considering those pervasive requirements, this paper has modeled network performance as well as system security with a view to improve these components which could heel the reliable cyber-communication challenges.Publication Embargo Operational Performance and Security Improvement Approach for Integrated BigData and Industrial IoT in Cyber-Physical Communication Systems(IEEE, 2019-05-09) Jayawardena, C; Sen, SWell-performed secure computing and communication are at the forefront for Internet of Things (IoT) and Cyber-Physical Systems (CPS). By using these innovative technologies, Industrial-IoT (IIoT) has revolutionized the smart industrial processes while this evolution imposes mandatory requirements of reliable, cybersecure and well performed network. This implants adopting effective approaches of improving performance and cybersecurity in IIoT networks towards building a trusted cyber-physical communication. IIoT generates huge data of which some are real-time and rest are big data which needs assurance of delivery without loss. This report has modeled the performance and security issues of intelligent physical systems. While demonstrating the performance and security strategies of improving them, this paper addresses issues for consideration to overcome the security and performance improvement bottlenecks.Publication Embargo Reliability and Cybersecurity Improvement Strategies in Wireless Sensor Networks for IoT-enabled Smart Infrastructures(IEEE, 2019-10-18) Sen, S; Jayawardena, CIoT-enabled smart applications and infrastructures use low power wireless sensor networks widely. But due to low energy and lack of computing capabilities, the comprehensive use of such devices result in reliability and security vulnerabilities. Therefore, the lower capability of sensor devices need to operate wisely with careful technical considerations to maximize their capabilities. This paper proposes a new technique to improve reliability and cybersecurity by balanced use of sensor energy while maintaining the quality of communication. The simulation result shows that the strategy proposed is effective. A hacking strategy has also been detailed so that the security experts can consider those while designing a security suite for IoT-enabled infrastructures.
