Testbeds and Research Infrastructure: Development of Networks and Communities. 9th International ICST Conference, TridentCom 2014, Guangzhou, China, May 5-7, 2014, Revised Selected Papers

Research Article

Researches Based on Subject-Oriented Security in the Cyber-Physical System

Download
393 downloads
  • @INPROCEEDINGS{10.1007/978-3-319-13326-3_33,
        author={Caixia Zhang and Hua Li and Yuanjia Ma and Xiaoyu Wang and Xiangdong Wang},
        title={Researches Based on Subject-Oriented Security in the Cyber-Physical System},
        proceedings={Testbeds and Research Infrastructure: Development of Networks and Communities. 9th International ICST Conference, TridentCom 2014, Guangzhou, China, May 5-7, 2014, Revised Selected Papers},
        proceedings_a={TRIDENTCOM},
        year={2014},
        month={11},
        keywords={Cyber Physical System (CPS) Security researches Subject-oriented The WPDRRC security model},
        doi={10.1007/978-3-319-13326-3_33}
    }
    
  • Caixia Zhang
    Hua Li
    Yuanjia Ma
    Xiaoyu Wang
    Xiangdong Wang
    Year: 2014
    Researches Based on Subject-Oriented Security in the Cyber-Physical System
    TRIDENTCOM
    Springer
    DOI: 10.1007/978-3-319-13326-3_33
Caixia Zhang1,*, Hua Li1, Yuanjia Ma2, Xiaoyu Wang3, Xiangdong Wang2
  • 1: Foshan University
  • 2: Guangdong Provincial Key Lab of Petrochemical Equipment Fault Diagnosis
  • 3: Guangdong University of Technology
*Contact email: zh_caixia@163.com

Abstract

The security research of Cyber-physical system is a dynamic development process. Because no single technique could ensure the absolute safety of CPS, so its safety problem must be considered from the overall and systematic researches. Based on the structure of CPS, CPS is here divided into some subjects, and various subjects are then discussed in face of security threats in the design of subject oriented CPS security model. This model is supplied with the WPDRRC security system model as a protective layer. With the technology oriented CPS system, subject oriented system security will have superiorities such as initiative, systemic, portability and simplified.