On the Interplay Between Cyber and Physical Spaces for Adaptive Security - 2018


Ubiquitous computing is ensuing in an exceedingly proliferation of cyber-physical systems that host or manage valuable physical and digital assets. These assets will be harmed by malicious agents through both cyber-enabled or physically-enabled attacks, particularly ones that exploit the customarily ignored interplay between the cyber and physical world. The explicit illustration of spatial topology is essential to supporting adaptive security policies. In this Project we tend to explore the utilization of Bigraphical Reactive Systems to model the topology of cyber and physical areas and their dynamics. We have a tendency to utilise such models to perform speculative threat analysis through model checking to reason regarding the consequences of the evolution of topological configurations on the satisfaction of security necessities. We any propose an automatic designing technique to identify an adaptation strategy enacting security policies at runtime to forestall, circumvent, or mitigate doable security needs violations. We tend to evaluate our approach employing a case study involved with countering insider threats in a very building automation system.

Did you like this research project?

To get this research project Guidelines, Training and Code... Click Here

PROJECT TITLE :Constructing Binary Sequences With Good Correlation Properties: An Efficient Analytical-Computational Interplay - 2018ABSTRACT:Binary sequence sets with asymptotically optimal auto/cross correlation peak sidelobe
PROJECT TITLE :Critical communications and public safety networks, part 2: technical issues, security, and applications [Guest Editorial]ABSTRACT:As we tend to mentioned in the Guest Editorial of Part 1 of this Feature Topic,
PROJECT TITLE :Game-Theoretic Methods for Robustness, Security, and Resilience of Cyberphysical Control Systems: Games-in-Games Principle for Optimal Cross-Layer Resilient Control SystemsABSTRACT:Critical infrastructures, such
PROJECT TITLE : Security Analysis of Handover Key Management in 4G LTESAE Networks - 2014 ABSTRACT: The goal of 3GPP Long Term Evolution/System Architecture Evolution (LTE/SAE) is to move mobile cellular wireless technology
PROJECT TITLE : Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Networks - 2014 ABSTRACT: Secure data transmission is a critical issue for wireless sensor networks (WSNs). Clustering is an effective

Ready to Complete Your Academic MTech Project Work In Affordable Price ?

Project Enquiry