Research Publications Authored by SLIIT Staff

Permanent URI for this communityhttps://rda.sliit.lk/handle/123456789/4195

This collection includes all SLIIT staff publications presented at external conferences and published in external journals. The materials are organized by faculty to facilitate easy retrieval.

Browse

Search Results

Now showing 1 - 2 of 2
  • Thumbnail Image
    PublicationEmbargo
    Analysis of network techniques and cybersecurity for improving performance of big data IoT and cyber-physical communication internetwork
    (IEEE, 2019-02-13) Sen, S; Jayawardena, C
    The Internet of Things (IoT) and Cyber-Physical Systems (CPS), are generating wide spread data. The success of these trio depends on a well performed cyber-communication infrastructure. This necessitates improving the performance of the cyber-communication internetwork; this performance improvement includes optimization of network techniques as well as the security of the cyber-network. Internet infrastructure has been upgraded to higher level ever than before, where we are enjoying technologies like fibre, 10-gig ethernet and even 100-gig ethernet, but there is no guarantee of communication in the cyber space, internet still providing packet delivery on "best effort" basis. On the other side, cyber hackers are targeting big physical infrastructures, industrial hardware in addition to the financial institutions. Therefore, it has become vital to address secure and faster data communications, in order to improve the Performance of the Internetwork.
  • Thumbnail Image
    PublicationEmbargo
    Analysis of Cyber-Attack in Big Data IoT and Cyber-Physical Systems-A Technical Approach to Cybersecurity Modeling
    (IEEE, 2019-03-29) Sen, S; Jayawardena, C
    The Internet of Things (IoT) and Cyber-Physical Systems (CPS) are generating widespread data. Their success depends on a well secured infrastructure, which necessitates providing a robust infrastructure by securing the CPS and IoT system setup against the possibility of cyberattacks. With an increased utilization of CPS as well as widespread implementation of IoT with low power wireless sensors, the security vulnerability is growing, and increasing the possibility of cyberattacks. This paper has discussed models of how different categories of CPS can be stabilized in the event of a disaster, and analyzed how possible cyberattacks can be mitigated by taking a technical approach to model the cybersecurity.