首页 > 最新文献

International Journal of Critical Infrastructure Protection最新文献

英文 中文
Vulnerability analysis of urban road networks based on traffic situation 基于交通状况的城市道路网络脆弱性分析
IF 3.6 3区 工程技术 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-07-01 DOI: 10.1016/j.ijcip.2023.100590
Ziqi Wang, Yulong Pei, Jing Liu, Hehang Liu

Traffic congestion is a global issue, which occurs during rush hour but also in situations of emergency causing massive congestion. This paper proposes a method for building a weighted road network by using the real-time traffic situation and the inherent characteristics of Urban Road Networks (URNs). To research the cascading failure vulnerability of URNs three kinds of node importance indexes are constructed from the structure, function, and traffic flow characteristics. Then the feasibility and validity of the proposed model are verified by taking Shanghai road networks (SRNs) as an example. The results indicate that the highest betweenness node-based attack causes the most damage to the SRNS of different types of attacks, and the SRNS cascade fails with the greatest speed and scale. Furthermore, we explore that the correlations between network vulnerability indicators, and suggest significant differences at different times during cascading failures of the weighted road network.

交通拥堵是一个全球性问题,它发生在高峰时段,但也发生在紧急情况下,导致大规模拥堵。本文提出了一种利用实时交通状况和URNs固有特性建立加权路网的方法。为了研究URNs的级联故障脆弱性,从结构、功能和流量特性三个方面构建了三种节点重要性指标。然后以上海市路网为例,验证了该模型的可行性和有效性。结果表明,在不同类型的攻击中,基于最高介数节点的攻击对SRNS造成的伤害最大,SRNS级联失败的速度和规模最大。此外,我们探索了网络脆弱性指标之间的相关性,并表明在加权道路网络级联故障的不同时间存在显著差异。
{"title":"Vulnerability analysis of urban road networks based on traffic situation","authors":"Ziqi Wang,&nbsp;Yulong Pei,&nbsp;Jing Liu,&nbsp;Hehang Liu","doi":"10.1016/j.ijcip.2023.100590","DOIUrl":"https://doi.org/10.1016/j.ijcip.2023.100590","url":null,"abstract":"<div><p><span><span>Traffic congestion is a global issue, which occurs during rush hour but also in situations of emergency causing massive congestion. This paper proposes a method for building a weighted road network by using the real-time traffic situation and the inherent characteristics of Urban Road Networks (URNs). To research the </span>cascading failure vulnerability of URNs three kinds of node importance indexes are constructed from the structure, function, and traffic flow characteristics. Then the feasibility and validity of the proposed model are verified by taking Shanghai road networks (SRNs) as an example. The results indicate that the highest </span>betweenness node-based attack causes the most damage to the SRNS of different types of attacks, and the SRNS cascade fails with the greatest speed and scale. Furthermore, we explore that the correlations between network vulnerability indicators, and suggest significant differences at different times during cascading failures of the weighted road network.</p></div>","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"41 ","pages":"Article 100590"},"PeriodicalIF":3.6,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49903703","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Radio frequency identification and tracking of vehicles and drivers by exploiting keyless entry systems 利用无钥匙进入系统对车辆和驾驶员进行射频识别和跟踪
IF 3.6 3区 工程技术 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-03-01 DOI: 10.1016/j.ijcip.2022.100587
James Ashworth, Jason Staggs, Sujeet Shenoi

Modern commercially-available vehicles have active or passive keyless entry systems. In the case of an active keyless entry system, an individual presses a button on a key fob that transmits a radio frequency signal to its paired vehicle that unlocks the doors. In the case of a passive keyless entry system, a vehicle senses an approaching individual and signals the key fob to respond with a radio frequency signal. If the key fob is paired with the vehicle, then the vehicle unlocks the doors and may even start the engine. For user convenience, most modern vehicles have integrated active–passive keyless entry systems.

A passive keyless entry system in a vehicle uses the four-way handshake protocol to detect a proximal key fob and authenticate the key fob as being paired with the vehicle. Any vehicle or individual that transmits the initial protocol signal forces a key fob to become a passive radio signal transmitter. Exploiting the four-way handshake protocol has privacy and security consequences. This research demonstrates that passive keyless entry key fobs – and by extension, their paired vehicles and drivers – can be identified and tracked in real time using radio frequency signals. Additionally, this research demonstrates that the identification and tracking of key fobs, paired vehicles and drivers can be performed using commercial off-the-shelf hardware costing less than $900.

现代商用车辆具有主动或被动无钥匙进入系统。在主动无钥匙进入系统的情况下,个人按下遥控钥匙上的按钮,遥控钥匙会向配对车辆发送射频信号,从而解锁车门。在被动无钥匙进入系统的情况下,车辆感应到接近的个人,并向遥控钥匙发出信号,以通过射频信号做出响应。如果遥控钥匙与车辆配对,则车辆解锁车门,甚至可能启动发动机。为了方便用户,大多数现代车辆都集成了主动-被动无钥匙进入系统。车辆中的无源无钥匙进入系统使用四向握手协议来检测近端遥控钥匙并将该遥控钥匙认证为与车辆配对。任何发送初始协议信号的车辆或个人都会迫使钥匙扣成为无源无线电信号发射器。利用四向握手协议会带来隐私和安全方面的后果。这项研究表明,可以使用射频信号实时识别和跟踪无源无钥匙进入遥控钥匙,进而识别和跟踪其配对车辆和驾驶员。此外,这项研究表明,可以使用成本低于900美元的商用现成硬件来识别和跟踪遥控钥匙、配对车辆和驾驶员。
{"title":"Radio frequency identification and tracking of vehicles and drivers by exploiting keyless entry systems","authors":"James Ashworth,&nbsp;Jason Staggs,&nbsp;Sujeet Shenoi","doi":"10.1016/j.ijcip.2022.100587","DOIUrl":"https://doi.org/10.1016/j.ijcip.2022.100587","url":null,"abstract":"<div><p><span>Modern commercially-available vehicles have active or passive keyless entry systems. In the case of an active keyless entry system, an individual presses a button on a key fob that transmits a </span>radio frequency signal to its paired vehicle that unlocks the doors. In the case of a passive keyless entry system, a vehicle senses an approaching individual and signals the key fob to respond with a radio frequency signal. If the key fob is paired with the vehicle, then the vehicle unlocks the doors and may even start the engine. For user convenience, most modern vehicles have integrated active–passive keyless entry systems.</p><p>A passive keyless entry system in a vehicle uses the four-way handshake protocol to detect a proximal key fob and authenticate the key fob as being paired with the vehicle. Any vehicle or individual that transmits the initial protocol signal forces a key fob to become a passive radio signal transmitter. Exploiting the four-way handshake protocol has privacy and security consequences. This research demonstrates that passive keyless entry key fobs – and by extension, their paired vehicles and drivers – can be identified and tracked in real time using radio frequency signals. Additionally, this research demonstrates that the identification and tracking of key fobs, paired vehicles and drivers can be performed using commercial off-the-shelf hardware costing less than $900.</p></div>","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"40 ","pages":"Article 100587"},"PeriodicalIF":3.6,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49870413","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A two-stage stochastic multi-objective resilience optimization model for network expansion of interdependent power–water networks under disruption 基于两阶段随机多目标优化模型的相互依赖的水电网络在中断情况下的网络扩展
IF 3.6 3区 工程技术 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-03-01 DOI: 10.1016/j.ijcip.2023.100588
Achara Tiong, Hector A. Vergara

Network expansion of interdependent critical infrastructures under disruption uncertainty is modeled as a mixed-integer two-stage stochastic multi-objective optimization program. In this model, expected total cost and expected post-disaster resilience are considered competing objectives. Network resilience is quantified through network complexity and unmet demand. Functional relationships between critical infrastructures are modeled using a network-based approach with the physical interdependency enforced through demand constraints. Uncertainty is introduced as a set of random parameters corresponding to disruption scenarios. The proposed model is demonstrated in a case study of coupled power–water networks with the power flow in the grid modeled using linear DC power flow approximation equations. The deterministic-equivalent multi-objective model is solved using the augmented ϵ-constraint method. Solutions from stochastic and deterministic models are compared and the value of stochastic optimization is discussed.

将相互依赖的关键基础设施在中断不确定性下的网络扩展建模为混合整数两阶段随机多目标优化程序。在该模型中,预期总成本和预期灾后复原力被视为相互竞争的目标。网络弹性是通过网络复杂性和未满足的需求来量化的。关键基础设施之间的功能关系是使用基于网络的方法建模的,通过需求约束来实现物理相互依赖性。不确定性被引入为一组与中断场景相对应的随机参数。所提出的模型在电力-水耦合网络的案例研究中得到了验证,其中电网中的潮流使用线性直流潮流近似方程建模。使用增广的ε-约束方法求解确定性等价多目标模型。比较了随机模型和确定性模型的解,并讨论了随机优化的价值。
{"title":"A two-stage stochastic multi-objective resilience optimization model for network expansion of interdependent power–water networks under disruption","authors":"Achara Tiong,&nbsp;Hector A. Vergara","doi":"10.1016/j.ijcip.2023.100588","DOIUrl":"https://doi.org/10.1016/j.ijcip.2023.100588","url":null,"abstract":"<div><p><span><span>Network expansion of interdependent critical infrastructures under disruption uncertainty is modeled as a mixed-integer two-stage stochastic multi-objective optimization program. In this model, expected total cost and expected post-disaster resilience are considered competing objectives. Network resilience is quantified through network complexity and unmet demand. Functional relationships between critical infrastructures are modeled using a network-based approach with the physical interdependency enforced through demand constraints. Uncertainty is introduced as a set of random parameters corresponding to disruption scenarios. The proposed model is demonstrated in a case study of coupled power–water networks with the power flow in the grid modeled using linear DC power flow </span>approximation equations. The deterministic-equivalent multi-objective model is solved using the augmented </span><span><math><mi>ϵ</mi></math></span><span>-constraint method. Solutions from stochastic and deterministic models are compared and the value of stochastic optimization is discussed.</span></p></div>","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"40 ","pages":"Article 100588"},"PeriodicalIF":3.6,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49870414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A hybrid deep learning model for discrimination of physical disturbance and cyber-attack detection in smart grid 智能电网物理干扰判别与网络攻击检测的混合深度学习模型
IF 3.6 3区 工程技术 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-03-01 DOI: 10.1016/j.ijcip.2022.100582
Kübra Bitirgen , Ümmühan Başaran Filik

A smart grid (SG) consists of an interconnection of an electrical grid, communication, and information networks. The rapid developments of SG technologies have resulted in complex cyber–physical systems. Due to these complexities, the attack surfaces of SGs broaden, and their vulnerabilities to cyber–physical threats increase. SG security systems focus on the protection of significant units and sub-systems of communication and power networks from malicious threats and external attacks. False data injection attack (FDIA) is known as the most severe threat to SG systems. In this paper, a method of optimizing convolutional neural networks — long short-term memory (CNN-LSTM) with particle swarm optimization (PSO) to detect FDIA in the SG system is proposed. This model uses phasor measurement unit (PMU) measurements to detect an abnormal measurement value and determine the type of this anomaly. The complex hyperparameter space of the CNN-LSTM is optimized by the PSO. A detailed numerical comparison is made using the state-of-the-art deep learning (DL) architectures like LSTM, PSO-LSTM, and CNN-LSTM models to verify the accuracy and effectiveness of the proposed model. The results show that the model outperforms other DL models. In addition, the model has a high accuracy rate that provides decision support for the stable and safe operation of SG systems. In this respect, the proposed detection model is a candidate for building a more robust and powerful detection and protection mechanism.

智能电网(SG)由电网、通信和信息网络的互连组成。SG技术的快速发展导致了复杂的网络-物理系统。由于这些复杂性,SG的攻击面扩大,其对网络物理威胁的脆弱性增加。SG安全系统侧重于保护通信和电力网络的重要单元和子系统免受恶意威胁和外部攻击。虚假数据注入攻击(FDIA)被认为是SG系统面临的最严重威胁。本文提出了一种优化卷积神经网络——长短期记忆(CNN-LSTM)和粒子群优化(PSO)的方法来检测SG系统中的FDIA。该模型使用相量测量单元(PMU)测量来检测异常测量值并确定该异常的类型。利用粒子群算法对CNN-LSTM的复超参数空间进行了优化。使用LSTM、PSO-LSTM和CNN-LSTM模型等最先进的深度学习(DL)架构进行了详细的数值比较,以验证所提出模型的准确性和有效性。结果表明,该模型优于其他DL模型。此外,该模型具有较高的准确率,为SG系统的稳定安全运行提供了决策支持。在这方面,所提出的检测模型是建立更稳健、更强大的检测和保护机制的候选者。
{"title":"A hybrid deep learning model for discrimination of physical disturbance and cyber-attack detection in smart grid","authors":"Kübra Bitirgen ,&nbsp;Ümmühan Başaran Filik","doi":"10.1016/j.ijcip.2022.100582","DOIUrl":"https://doi.org/10.1016/j.ijcip.2022.100582","url":null,"abstract":"<div><p><span><span>A smart grid (SG) consists of an interconnection of an electrical grid, communication, and information networks. The rapid developments of SG technologies<span> have resulted in complex cyber–physical systems. Due to these complexities, the attack surfaces of SGs broaden, and their vulnerabilities to cyber–physical threats increase. SG security systems focus on the protection of significant units and sub-systems of communication and power networks from </span></span>malicious threats<span><span><span> and external attacks. False data injection attack (FDIA) is known as the most severe threat to </span>SG systems. In this paper, a method of optimizing convolutional </span>neural networks — long short-term memory (CNN-LSTM) with </span></span>particle swarm optimization<span> (PSO) to detect FDIA in the SG system is proposed. This model uses phasor measurement unit<span> (PMU) measurements to detect an abnormal measurement value and determine the type of this anomaly. The complex hyperparameter space of the CNN-LSTM is optimized by the PSO. A detailed numerical comparison is made using the state-of-the-art deep learning (DL) architectures like LSTM, PSO-LSTM, and CNN-LSTM models to verify the accuracy and effectiveness of the proposed model. The results show that the model outperforms other DL models. In addition, the model has a high accuracy rate that provides decision support for the stable and safe operation of SG systems. In this respect, the proposed detection model is a candidate for building a more robust and powerful detection and protection mechanism.</span></span></p></div>","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"40 ","pages":"Article 100582"},"PeriodicalIF":3.6,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49870416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Critical link identification algorithm for power communication networks in SDN architecture SDN架构下电力通信网络关键链路识别算法
IF 3.6 3区 工程技术 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-03-01 DOI: 10.1016/j.ijcip.2022.100584
Bing Fan , Hongtao Tan , Yaqun Li

With the maturity of software-defined network (SDN) technology, its application in power communication networks (PCNs) is being introduced. SDN controllers can assign working and backup routes for arriving serve requests and provide one-to-one (1:1) protection, which is crucial for the transmission of power system data with high reliability and delay requirements. For PCNs in SDN architecture, a critical link identification algorithm based on link-related risk (LRR-CLIA), which considers both working and backup routes between nodes, is proposed in this paper. The algorithm calculates link importance to identify critical links by quantifying the impact of links on the network risk on service layer, transport layer, and topology layer. To verify the effectiveness of the LRR-CLIA, we compare the network loss on service layer, transport layer, topology layer, and comprehensive layer with other algorithms after ranking and removing the identified critical links in descending order. In the simulation results, the LRR-CLIA outperforms the other algorithms by an average of 39.5% and 51.77% in the small PCN and medium-scale PCN respectively, which shows that the LRR-CLIA can identify the critical links more effectively and accurately in PCNs whose services have both working and backup paths.

随着软件定义网络(SDN)技术的成熟,介绍了它在电力通信网络(PCN)中的应用。SDN控制器可以为到达的服务请求分配工作和备份路由,并提供一对一(1:1)保护,这对于具有高可靠性和延迟要求的电力系统数据传输至关重要。针对SDN体系结构中的PCN,本文提出了一种基于链路相关风险的关键链路识别算法(LRR-CLIA),该算法同时考虑了节点之间的工作和备份路由。该算法通过量化链路对服务层、传输层和拓扑层网络风险的影响来计算链路重要性,以识别关键链路。为了验证LRR-CLIA的有效性,我们将已识别的关键链路按降序排序和删除后,在服务层、传输层、拓扑层和综合层上的网络损耗与其他算法进行了比较。在仿真结果中,LRR-CLIA在小型PCN和中型PCN中的平均性能分别比其他算法高39.5%和51.77%,这表明在服务既有工作路径又有备份路径的PCN中,LRR-CLIA可以更有效、准确地识别关键链路。
{"title":"Critical link identification algorithm for power communication networks in SDN architecture","authors":"Bing Fan ,&nbsp;Hongtao Tan ,&nbsp;Yaqun Li","doi":"10.1016/j.ijcip.2022.100584","DOIUrl":"https://doi.org/10.1016/j.ijcip.2022.100584","url":null,"abstract":"<div><p><span>With the maturity of software-defined network (SDN) technology, its application in power communication networks (PCNs) is being introduced. SDN controllers can assign working and backup routes for arriving serve requests and provide one-to-one (1:1) protection, which is crucial for the transmission of power system data with high reliability and delay requirements. For PCNs in SDN architecture, a critical link </span>identification algorithm based on link-related risk (LRR-CLIA), which considers both working and backup routes between nodes, is proposed in this paper. The algorithm calculates link importance to identify critical links by quantifying the impact of links on the network risk on service layer, transport layer, and topology layer. To verify the effectiveness of the LRR-CLIA, we compare the network loss on service layer, transport layer, topology layer, and comprehensive layer with other algorithms after ranking and removing the identified critical links in descending order. In the simulation results, the LRR-CLIA outperforms the other algorithms by an average of 39.5% and 51.77% in the small PCN and medium-scale PCN respectively, which shows that the LRR-CLIA can identify the critical links more effectively and accurately in PCNs whose services have both working and backup paths.</p></div>","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"40 ","pages":"Article 100584"},"PeriodicalIF":3.6,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49870415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Attack-Defense game analysis of critical infrastructure network based on Cournot model with fixed operating nodes 基于固定运行节点古诺模型的关键基础设施网络攻防博弈分析
IF 3.6 3区 工程技术 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-03-01 DOI: 10.1016/j.ijcip.2022.100583
Shuliang Wang, Jingya Sun, Jianhua Zhang, Qiqi Dong, Xifeng Gu, Chen Chen

In recent years, some game models were proposed to protect critical infrastructure networks. But they mainly focused on the protection of key nodes, and there are rarely models to consider the fixed-point use of resources. Hence, in this paper, we propose a non-zero-sum simultaneous game model based on the Cournot model. Meanwhile, we presented a novel method of critical node centrality identification based on the Technique for Order Preference by Similarity to Ideal Solution (TOPSIS). Simulating the game analysis on scale-free networks, small-world networks and random networks, it is found that the fixed operating nodes and the network topology are key factors in payoffs considering the constraints of resources. Besides, robustness analysis of networks on various sensitivity parameters is given and some effective optimal strategies are acquired to provide decision support for policy-makers.

近年来,一些游戏模型被提出来保护关键的基础设施网络。但他们主要关注关键节点的保护,很少有模型考虑资源的定点使用。因此,在本文中,我们提出了一个基于古诺模型的非零和同时博弈模型。同时,我们提出了一种基于TOPSIS的临界节点中心性识别方法。通过对无标度网络、小世界网络和随机网络的博弈分析,发现在考虑资源约束的情况下,固定的操作节点和网络拓扑结构是收益的关键因素。此外,还对网络在各种敏感参数上的鲁棒性进行了分析,获得了一些有效的优化策略,为决策者提供决策支持。
{"title":"Attack-Defense game analysis of critical infrastructure network based on Cournot model with fixed operating nodes","authors":"Shuliang Wang,&nbsp;Jingya Sun,&nbsp;Jianhua Zhang,&nbsp;Qiqi Dong,&nbsp;Xifeng Gu,&nbsp;Chen Chen","doi":"10.1016/j.ijcip.2022.100583","DOIUrl":"https://doi.org/10.1016/j.ijcip.2022.100583","url":null,"abstract":"<div><p>In recent years, some game models were proposed to protect critical infrastructure networks. But they mainly focused on the protection of key nodes, and there are rarely models to consider the fixed-point use of resources. Hence, in this paper, we propose a non-zero-sum simultaneous game model based on the Cournot model. Meanwhile, we presented a novel method of critical node centrality identification based on the Technique for Order Preference by Similarity to Ideal Solution<span> (TOPSIS). Simulating the game analysis on scale-free networks, small-world networks and random networks, it is found that the fixed operating nodes and the network topology<span> are key factors in payoffs considering the constraints of resources. Besides, robustness analysis of networks on various sensitivity parameters is given and some effective optimal strategies are acquired to provide decision support for policy-makers.</span></span></p></div>","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"40 ","pages":"Article 100583"},"PeriodicalIF":3.6,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49870004","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Editorial – Linking science and policy for addressing CI security and resilience challenges by Dr. Georgios Giannopoulos 社论-将科学与政策联系起来,应对网络安全与弹性挑战,作者:Georgios Giannopoulos博士
IF 3.6 3区 工程技术 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-03-01 DOI: 10.1016/S1874-5482(23)00008-2
{"title":"Editorial – Linking science and policy for addressing CI security and resilience challenges by Dr. Georgios Giannopoulos","authors":"","doi":"10.1016/S1874-5482(23)00008-2","DOIUrl":"10.1016/S1874-5482(23)00008-2","url":null,"abstract":"","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"40 ","pages":"Article 100595"},"PeriodicalIF":3.6,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42728734","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Exploring the concept of public-private partnership in building critical infrastructure resilience against unexpected events: A systematic review 探索公私伙伴关系在建设关键基础设施抵御突发事件能力中的概念:系统回顾
IF 3.6 3区 工程技术 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-12-01 DOI: 10.1016/j.ijcip.2022.100556
Godslove Ampratwum, Robert Osei-Kyei, Vivian W.Y. Tam

This study explores the concept of public private partnership (PPP) in building critical infrastructure resilience (CIR) by looking at the attributes and objectives of the key stakeholders in PPP; government and private critical infrastructure (CI) operators. Although extant studies have been conducted on critical infrastructure resilience, the concept of PPP in CIR has not received much attention. This study conducted a systematic review on the objectives of the government and private CI operators in PPP to build CIR. A systematic methodology was used to retrieve 22 relevant publications that were subjected to content analysis to identify the objectives of PPP in CIR. 20 set of objectives were derived from the selected publications. In addition, social capital theory was used to explore the attributes of PPP in CIR. A conceptual framework was developed with the objectives and attributes of PPP in CIR. Some of the objectives included, conducting national risks assessment and vulnerability assessments, national critical infrastructure resilience plan and identifying what constitutes CI. In addition, social capital theory was used to explore the attributes of PPP in CIR. The findings outline the responsibilities of the government and private CI operators in partnership to build the resilience of critical infrastructure.

本研究通过考察公私合作伙伴关系中主要利益相关者的属性和目标,探讨了公私合作伙伴关系(PPP)在建设关键基础设施弹性(CIR)中的概念;政府和私人关键基础设施(CI)运营商。尽管已有关于关键基础设施弹性的研究,但PPP在CIR中的概念并未受到太多关注。本研究对政府和私营企业合作伙伴在PPP中建立CIR的目标进行了系统回顾,并采用系统方法检索了22份相关出版物,对这些出版物进行了内容分析,以确定PPP在CIR中的目标,并从中得出20组目标。此外,运用社会资本理论探讨PPP在CIR中的属性,构建了PPP在CIR中的目标和属性的概念框架,其中包括开展国家风险评估和脆弱性评估、国家关键基础设施弹性计划和确定CI的构成要素。此外,本文还运用社会资本理论探讨了PPP在基础设施重建中的属性,研究结果概述了政府和私营基础设施运营商在合作建设关键基础设施弹性方面的责任。
{"title":"Exploring the concept of public-private partnership in building critical infrastructure resilience against unexpected events: A systematic review","authors":"Godslove Ampratwum,&nbsp;Robert Osei-Kyei,&nbsp;Vivian W.Y. Tam","doi":"10.1016/j.ijcip.2022.100556","DOIUrl":"10.1016/j.ijcip.2022.100556","url":null,"abstract":"<div><p>This study explores the concept of public private partnership (PPP) in building critical infrastructure resilience (CIR) by looking at the attributes and objectives of the key stakeholders in PPP; government and private critical infrastructure (CI) operators. Although extant studies have been conducted on critical infrastructure resilience, the concept of PPP in CIR has not received much attention. This study conducted a systematic review on the objectives of the government and private CI operators in PPP to build CIR. A systematic methodology was used to retrieve 22 relevant publications that were subjected to content analysis to identify the objectives of PPP in CIR. 20 set of objectives were derived from the selected publications. In addition, social capital theory was used to explore the attributes of PPP in CIR. A conceptual framework was developed with the objectives and attributes of PPP in CIR. Some of the objectives included, conducting national risks assessment and vulnerability assessments, national critical infrastructure resilience plan and identifying what constitutes CI. In addition, social capital theory was used to explore the attributes of PPP in CIR. The findings outline the responsibilities of the government and private CI operators in partnership to build the resilience of critical infrastructure.</p></div>","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"39 ","pages":"Article 100556"},"PeriodicalIF":3.6,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124203052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Developments and research directions in maritime cybersecurity: A systematic literature review and bibliometric analysis 海上网络安全的发展与研究方向:系统文献综述与文献计量分析
IF 3.6 3区 工程技术 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-12-01 DOI: 10.1016/j.ijcip.2022.100571
Victor Bolbot , Ketki Kulkarni , Päivi Brunou , Osiris Valdez Banda , Mashrura Musharraf

Ships and maritime infrastructure are becoming increasingly interconnected as the maritime industry is undergoing the industry 4.0 revolution. This development is associated with novel risk types such as the increased potential for successful cyberattacks. Several review studies have investigated the regulatory framework in connection to maritime cybersecurity, the vulnerabilities in maritime systems, potential cyberattack scenarios, and risk assessment techniques. None of them though, has implemented a systematic literature review and bibliometric analysis of the available academic research studies in the discipline of maritime cybersecurity. The aim of this review, therefore, is to offer a succinct description of the progress in academic research on the arising topic of maritime cybersecurity. To that end, we conducted a bibliometric analysis of maritime cybersecurity-related studies based on several metrics and analysis tools, identified the topics of academic research in this field, the employed methodologies and identified the main research challenges and directions in connection to maritime cybersecurity. To achieve the objectives, we employed principles from Preferred Reporting Items for Systematic reviews and Metanalysis (PRISMA) for systematic literature review and tailored keywords during a search in Scopus. The results demonstrated that Norway, the United Kingdom, France and the USA are the leading countries in maritime cybersecurity based on the weighted number of authors. The results also demonstrated that the main research focus in the area was on the development or application of cybersecurity risk assessment techniques and the design of monitoring and intrusion detection tools for cyberattacks in maritime systems. Based on the analysed literature, 53 challenges in various studies were identified and 73 topics for future research were suggested.

随着航运业正在经历工业4.0革命,船舶和海事基础设施之间的联系日益紧密。这种发展与新的风险类型有关,例如成功网络攻击的可能性增加。几项综述研究调查了与海事网络安全相关的监管框架、海事系统的脆弱性、潜在的网络攻击场景和风险评估技术。然而,他们都没有对海上网络安全学科的现有学术研究进行系统的文献综述和文献计量分析。因此,本综述的目的是对海上网络安全这一新兴主题的学术研究进展进行简要描述。为此,我们基于几种指标和分析工具对海事网络安全相关研究进行了文献计量分析,确定了该领域的学术研究主题、采用的方法,并确定了与海事网络安全相关的主要研究挑战和方向。为了实现这一目标,我们采用了系统文献综述的首选报告项目和元分析(PRISMA)的原则,并在Scopus中搜索时定制了关键词。结果表明,挪威、英国、法国和美国是海上网络安全方面的主要国家。研究结果还表明,该领域的主要研究重点是网络安全风险评估技术的开发或应用,以及海事系统网络攻击监测和入侵检测工具的设计。在分析文献的基础上,确定了各种研究中的53个挑战,并提出了73个未来研究的主题。
{"title":"Developments and research directions in maritime cybersecurity: A systematic literature review and bibliometric analysis","authors":"Victor Bolbot ,&nbsp;Ketki Kulkarni ,&nbsp;Päivi Brunou ,&nbsp;Osiris Valdez Banda ,&nbsp;Mashrura Musharraf","doi":"10.1016/j.ijcip.2022.100571","DOIUrl":"10.1016/j.ijcip.2022.100571","url":null,"abstract":"<div><p>Ships and maritime infrastructure are becoming increasingly interconnected as the maritime industry is undergoing the industry 4.0 revolution. This development is associated with novel risk types such as the increased potential for successful cyberattacks. Several review studies have investigated the regulatory framework in connection to maritime cybersecurity, the vulnerabilities in maritime systems, potential cyberattack scenarios, and risk assessment techniques. None of them though, has implemented a systematic literature review and bibliometric analysis of the available academic research studies in the discipline of maritime cybersecurity. The aim of this review, therefore, is to offer a succinct description of the progress in academic research on the arising topic of maritime cybersecurity. To that end, we conducted a bibliometric analysis of maritime cybersecurity-related studies based on several metrics and analysis tools, identified the topics of academic research in this field, the employed methodologies and identified the main research challenges and directions in connection to maritime cybersecurity. To achieve the objectives, we employed principles from Preferred Reporting Items for Systematic reviews and Metanalysis (PRISMA) for systematic literature review and tailored keywords during a search in Scopus. The results demonstrated that Norway, the United Kingdom, France and the USA are the leading countries in maritime cybersecurity based on the weighted number of authors. The results also demonstrated that the main research focus in the area was on the development or application of cybersecurity risk assessment techniques and the design of monitoring and intrusion detection tools for cyberattacks in maritime systems. Based on the analysed literature, 53 challenges in various studies were identified and 73 topics for future research were suggested.</p></div>","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"39 ","pages":"Article 100571"},"PeriodicalIF":3.6,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1874548222000555/pdfft?md5=89bfebece2301ddd663ee603c23fb503&pid=1-s2.0-S1874548222000555-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122508660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Intelligent Intrusion Detection Scheme for Smart Power-Grid Using Optimized Ensemble Learning on Selected Features 基于特征优化集成学习的智能电网入侵检测方案
IF 3.6 3区 工程技术 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-12-01 DOI: 10.1016/j.ijcip.2022.100567
Manikant Panthi , Tanmoy Kanti Das

The smart grid has gained a reputation as the advanced paradigm of the power grid. It is a complicated cyber-physical system that combines information and communication technology (ICT) with a traditional grid that can remotely control operations. It provides the medium for exchanging real-time data between the company and users through the advanced metering infrastructure (AMI) and smart meters. However, smart grids have many security and privacy concerns, such as intruding sensitive data, firmware hijacking, and modifying data due to the high reliance on ICT. To protect the power-grid system from these counteracts and for reliable and efficient power distribution, early and accurate identification of these issues needs to be addressed. The intrusion detection in a smart grid system plays an essential role in providing a secure service and transmitting the high priority alert message to the system admin about the detection of adversary attacks. This paper proposes an intelligent intrusion detection scheme to accurately classify various attacks on smart power grid systems. The proposed scheme used the binary grey wolf optimization-based feature selection. It optimized the ensemble classification approach to learn the non-linear, overlapping, and complex electrical grid features taken from publicly available Mississippi State University and Oak Ridge National Laboratory (MSU-ORNL) dataset. The experimental results using a 10-fold cross-validation setup and selected feature subset for two class and three class problems reveal the proposed method's promising performance. Further, the significantly superior performance compared to the existing benchmark methods justified the robustness of the proposed scheme.

智能电网被誉为电网的先进范例。它是一个复杂的网络物理系统,将信息和通信技术(ICT)与可以远程控制操作的传统网格相结合。它通过高级计量基础设施(AMI)和智能电表为公司和用户之间交换实时数据提供了媒介。然而,由于对信息通信技术的高度依赖,智能电网存在许多安全和隐私问题,例如入侵敏感数据、固件劫持和修改数据。为了保护电网系统不受这些抵消作用的影响,为了可靠和有效地分配电力,需要尽早和准确地查明这些问题。智能电网系统的入侵检测在提供安全服务和向系统管理员发送高优先级的敌方攻击警报信息方面起着至关重要的作用。提出了一种智能入侵检测方案,对智能电网系统的各种攻击进行准确分类。该方案采用基于二元灰狼优化的特征选择。它优化了集成分类方法,以学习从公开可用的密西西比州立大学和橡树岭国家实验室(MSU-ORNL)数据集中获取的非线性、重叠和复杂的电网特征。使用10倍交叉验证设置和选择两类和三类问题的特征子集的实验结果表明,该方法具有良好的性能。此外,与现有的基准方法相比,该方法的性能显著提高,证明了该方案的鲁棒性。
{"title":"Intelligent Intrusion Detection Scheme for Smart Power-Grid Using Optimized Ensemble Learning on Selected Features","authors":"Manikant Panthi ,&nbsp;Tanmoy Kanti Das","doi":"10.1016/j.ijcip.2022.100567","DOIUrl":"10.1016/j.ijcip.2022.100567","url":null,"abstract":"<div><p><span>The smart grid has gained a reputation as the advanced paradigm of the power grid. It is a complicated cyber-physical system that combines information and communication technology (ICT) with a traditional grid that can remotely control operations. It provides the medium for exchanging real-time data between the company and users through the </span>advanced metering infrastructure<span><span><span> (AMI) and smart meters. However, smart grids have many security and privacy concerns, such as intruding sensitive data, firmware hijacking, and modifying data due to the high reliance on ICT. To protect the power-grid system from these counteracts and for reliable and efficient power distribution, early and accurate identification of these issues needs to be addressed. The intrusion detection in a smart </span>grid system plays an essential role in providing a secure service and transmitting the high priority alert message to the system admin about the detection of adversary attacks. This paper proposes an intelligent intrusion detection scheme to accurately classify various attacks on smart power grid systems. The proposed scheme used the binary grey wolf optimization-based feature selection. It optimized the ensemble </span>classification approach to learn the non-linear, overlapping, and complex electrical grid features taken from publicly available Mississippi State University and Oak Ridge National Laboratory (MSU-ORNL) dataset. The experimental results using a 10-fold cross-validation setup and selected feature subset for two class and three class problems reveal the proposed method's promising performance. Further, the significantly superior performance compared to the existing benchmark methods justified the robustness of the proposed scheme.</span></p></div>","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"39 ","pages":"Article 100567"},"PeriodicalIF":3.6,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121783757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
International Journal of Critical Infrastructure Protection
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1