Högskolan i Skövde

his.sePublications
Change search
Link to record
Permanent link

Direct link
Publications (10 of 29) Show all publications
Jiang, Y., Jeusfeld, M. A., Ding, J. & Sandahl, E. (2023). Model-Based Cybersecurity Analysis: Extending Enterprise Modeling to Critical Infrastructure Cybersecurity. Business & Information Systems Engineering, 65(6), 643-676
Open this publication in new window or tab >>Model-Based Cybersecurity Analysis: Extending Enterprise Modeling to Critical Infrastructure Cybersecurity
2023 (English)In: Business & Information Systems Engineering, ISSN 2363-7005, E-ISSN 1867-0202, Vol. 65, no 6, p. 643-676Article in journal (Refereed) Published
Abstract [en]

Critical infrastructure (CIs) such as power grids link a plethora of physical components from many different vendors to the software systems that control them. These systems are constantly threatened by sophisticated cyber attacks. The need to improve the cybersecurity of such CIs, through holistic system modeling and vulnerability analysis, cannot be overstated. This is challenging since a CI incorporates complex data from multiple interconnected physical and computation systems. Meanwhile, exploiting vulnerabilities in different information technology (IT) and operational technology (OT) systems leads to various cascading effects due to interconnections between systems. The paper investigates the use of a comprehensive taxonomy to model such interconnections and the implied dependencies within complex CIs, bridging the knowledge gap between IT security and OT security. The complexity of CI dependence analysis is harnessed by partitioning complicated dependencies into cyber and cyber-physical functional dependencies. These defined functional dependencies further support cascade modeling for vulnerability severity assessment and identification of critical components in a complex system. On top of the proposed taxonomy, the paper further suggests power-grid reference models that enhance the reproducibility and applicability of the proposed method. The methodology followed was design science research (DSR) to support the designing and validation of the proposed artifacts. More specifically, the structural, functional adequacy, compatibility, and coverage characteristics of the proposed artifacts are evaluated through a three-fold validation (two case studies and expert interviews). The first study uses two instantiated power-grid models extracted from existing architectures and frameworks like the IEC 62351 series. The second study involves a real-world municipal power grid.

Place, publisher, year, edition, pages
Springer Nature Switzerland AG, 2023
Keywords
critical infrastructure, domain-specific language, cybersecurity, power grids
National Category
Information Systems
Research subject
Distributed Real-Time Systems; Information Systems
Identifiers
urn:nbn:se:his:diva-22495 (URN)10.1007/s12599-023-00811-0 (DOI)000982391100001 ()2-s2.0-85158156411 (Scopus ID)
Funder
University of Skövde
Note

CC BY 4.0

© 2023 Springer Nature Switzerland AG. Part of Springer Nature.

Paper is partly based on the results of the EU ISF project ELVIRA, his.se/elvira

We thank the colleagues from the ELVIRA project for their contributions to earlier versions of the taxonomy. We are in particular grateful to Yacine Atif for his support and encouragement. Many thanks also to the interview partners for helping to validate the usefulness of our approach. Finally, we thank the anonymous reviewers for their diligent and constructive evaluations

Open access funding provided by University of Skövde.

Available from: 2023-05-07 Created: 2023-05-07 Last updated: 2023-12-13Bibliographically approved
Ding, J. & Naserinia, V. (2022). Blockchain for future renewable energy. In: Mohsen Parsa Moghaddam; Reza Zamani; Hassan Haes Alhelou; Pierluigi Siano (Ed.), Decentralized Frameworks for Future Power Systems: Operation, Planning and Control Perspectives (pp. 129-146). Academic Press
Open this publication in new window or tab >>Blockchain for future renewable energy
2022 (English)In: Decentralized Frameworks for Future Power Systems: Operation, Planning and Control Perspectives / [ed] Mohsen Parsa Moghaddam; Reza Zamani; Hassan Haes Alhelou; Pierluigi Siano, Academic Press, 2022, p. 129-146Chapter in book (Refereed)
Abstract [en]

To better optimize and control the renewable energy system and its integration with traditional grid systems and other energy systems, corresponding technologies are needed to meet its growing practical application requirements: decentralized management and control, support for decentralized decision-making, fine-grained and timely data sharing, maintain data and business privacy, support fast and low-cost electricity market transactions, maintain the security and reliability of system operation data, and prevent malicious cyberattacks. Blockchain is based on core technologies such as distributed ledgers, asymmetric encryption, consensus mechanisms, and smart contracts and has some excellent features such as decentralization, openness, independence, security, and anonymity. These characteristics seem to meet the technical requirements of future renewable energy systems partially. This chapter will systematically review how blockchain technology can potentially solve the challenges with decentralized solutions for future renewable energy systems and show a guideline to implement blockchain-based corresponding applications for future renewable energy. 

Place, publisher, year, edition, pages
Academic Press, 2022
Keywords
Blockchain, Decentralized framework, Decentralized management, Renewable energy
National Category
Energy Systems Computer Systems
Research subject
Distributed Real-Time Systems
Identifiers
urn:nbn:se:his:diva-21974 (URN)10.1016/B978-0-323-91698-1.00011-X (DOI)2-s2.0-85139682133 (Scopus ID)978-0-323-91698-1 (ISBN)978-0-323-98562-8 (ISBN)
Note

Imprint: Academic Press

© 2022 Elsevier Inc. All rights reserved.

Available from: 2022-10-20 Created: 2022-10-20 Last updated: 2023-01-16Bibliographically approved
Ding, J. & Tadesse Aklilu, Y. (2022). Blockchain for Smart Grid Operations, Control and Management. Energiforsk AB
Open this publication in new window or tab >>Blockchain for Smart Grid Operations, Control and Management
2022 (English)Report (Other academic)
Abstract [en]

A comprehensive overview of blockchain-based smart grid management, control, and operation solutions. The report compares with related reviews and highlights the challenges in management, control, and operation for a blockchain-based smart grid, as well as future research directions in five categories: collaboration between actors, data analytics and management, control of network imbalances, decentralization of network management and operation, security and privacy.

The report reviews how blockchain technology can potentially solve the challenges of decentralized solutions for future renewable energy systems. As a result, several applications of blockchain for renewable energy are discussed, such as electric vehicles, decentralized P2P energy transactions, carbon certification and trading, physical information security, energy transfer, Energy-to-X, and the Internet of Energy.

A guideline for the implementation of blockchain to corresponding applications for future renewable energy is also presented in this report. This includes the different blockchain system architectures, the data flow from the power grid processed and recorded, the choice of the appropriate consensus, and the different blockchain frameworks.

Abstract [en]

Power generation, distribution, transmission, and consumption face ongoing challenges such as smart grid management, control, and operation, resulting from high energy demand, diversity of energy sources, and environmental or regulatory issues. To better optimize and control the renewable energy system and its integration with traditional grid systems and other energy systems, corresponding technologies are needed to meet its growing practical application requirements: decentralized management and control, support for decentralized decision-making, fine-grained and timely data sharing, maintain data and business privacy, support fast and low-cost electricity market transactions, and maintain the security and reliability of system operation data, and prevent malicious cyberattacks. Blockchain is based on core technologies such as distributed ledgers, asymmetric encryption, consensus mechanisms, and smart contracts and has some excellent features such as decentralization, openness, independence, security, and anonymity. These characteristics partially meet the technical requirements of future renewable energy systems.

This report provides a comprehensive overview of blockchain-based smart grid management, control, and operation solutions. The report compares with related reviews and highlights the challenges in management, control, and operation for a blockchain-based smart grid, as well as future research directions in five categories: collaboration between actors, data analytics and management, control of network imbalances, decentralization of network management and operation, security and privacy.

The report reviews how blockchain technology can potentially solve the challenges of decentralized solutions for future renewable energy systems. As a result, several applications of blockchain for renewable energy are discussed, such as electric vehicles, decentralized P2P energy transactions, carbon certification and trading, physical information security, energy transfer, Energy-to-X, and the Internet of Energy.

A guideline for the implementation of blockchain to corresponding applications for future renewable energy is also presented in this report. This includes the different blockchain system architectures, the data flow from the power grid processed and recorded, the choice of the appropriate consensus, and the different blockchain frameworks.These are the results and conclusions of a project, which is part of a research programme run by Energiforsk. The author/authors are responsible for the content.

Abstract [sv]

Elproduktion, -distribution, -överföring och -förbrukning står inför pågående utmaningar som smart näthantering, kontroll och drift, som är ett resultat av hög energiefterfrågan, mångfald av energikällor och miljö- eller regelfrågor. För att bättre optimera och kontrollera det förnybara energisystemet och dess integration med traditionella nätsystem och andra energisystem, behövs motsvarande teknik för att möta dess växande praktiska tillämpningskrav: decentraliserad förvaltning och kontroll, stöd för decentraliserat beslutsfattande, finkornigt och aktuellt datadelning, upprätthålla data och affärsintegritet, stödja snabba och billiga elmarknadstransaktioner och upprätthålla säkerheten och tillförlitligheten för systemdriftsdata och förhindra skadliga cyberattacker. Blockkedja är baserad på kärnteknologier som distribuerade reskontra, asymmetrisk kryptering, konsensusmekanismer och smarta kontrakt och har några utmärkta funktioner som decentralisering, öppenhet, oberoende, säkerhet och anonymitet. Dessa egenskaper ska delvis uppfylla de tekniska kraven för framtida förnybara energisystem.

Den här rapporten ger en omfattande översikt över blockkedjebaserade lösningar för smart näthantering, kontroll och drift. Rapporten jämför med relaterade recensioner och belyser utmaningarna inom förvaltning, kontroll och drift för ett blockkedjebaserat smart nät, såväl som framtida forskningsriktningar inom fem kategorier: samarbete mellan aktörer, dataanalys och hantering, kontroll av nätobalanser, decentralisering av nätförvaltning och drift, säkerhet och integritet.

Rapporten går igenom hur blockkedjeteknik potentiellt kan lösa utmaningarna med decentraliserade lösningar för framtida förnybara energisystem. Som ett resultat diskuteras flera tillämpningar av blockkedja för förnybar energi såsom elektriska fordon, decentraliserade P2P-energitransaktioner, certifiering och handel med koldioxidutsläpp, fysisk informationssäkerhet, energiöverföring, Energi-to-X och Internet för Energi.

En riktlinje för implementering av blockkedja till motsvarande tillämpningar för framtida förnybar energi presenteras också i denna rapport. Detta inkluderar olika blockkedja -systemarkitektur, dataflöde från elnätet bearbetas och registreras, val av lämplig konsensus samt de olika blockkedja -ramverken

Place, publisher, year, edition, pages
Energiforsk AB, 2022. p. 72
Series
Elnätens digitalisering och IT-säkerhet ; 2022:888
Keywords
Smart grid, blockchain, smart grid management, smart grid control and operation, renewable energy, decentralized framework, decentralized management
National Category
Energy Systems
Identifiers
urn:nbn:se:his:diva-22286 (URN)978-91-7673-888-7 (ISBN)
Available from: 2023-02-17 Created: 2023-02-17 Last updated: 2023-02-17Bibliographically approved
Tadesse, Y. & Ding, J. (2022). Survey on blockchain for smart grid management, control, and operation. Energies, 15(1), Article ID 193.
Open this publication in new window or tab >>Survey on blockchain for smart grid management, control, and operation
2022 (English)In: Energies, E-ISSN 1996-1073, Vol. 15, no 1, article id 193Article, review/survey (Refereed) Published
Abstract [en]

Power generation, distribution, transmission, and consumption face ongoing challenges such as smart grid management, control, and operation, resulting from high energy demand, the diversity of energy sources, and environmental or regulatory issues. This paper provides a comprehensive overview of blockchain-based solutions for smart grid management, control, and operations. We systematically summarize existing work on the use and implementation of blockchain technology in various smart grid domains. The paper compares related reviews and highlights the challenges in the management, control, and operation for a blockchain-based smart grid as well as future research directions in the five categories: collaboration among stakeholders; data analysis and data manage-ment; control of grid imbalances; decentralization of grid management and operations; and security and privacy. All these aspects have not been covered in previous reviews. 

Place, publisher, year, edition, pages
MDPI, 2022
Keywords
Blockchain, Smart grid, Smart grid control and operation, Smart grid management, Electric power system control, Electric power transmission networks, Information management, Smart power grids, Block-chain, Grid control, Grid management, Grid operation, Management control, Management operation, Power- generations
National Category
Other Electrical Engineering, Electronic Engineering, Information Engineering
Identifiers
urn:nbn:se:his:diva-20856 (URN)10.3390/en15010193 (DOI)000742967800001 ()2-s2.0-85121999857 (Scopus ID)
Note

CC BY 4.0

© 2021 by the authors. Licensee MDPI, Basel, Switzerland.

Available from: 2022-01-13 Created: 2022-01-13 Last updated: 2023-08-28Bibliographically approved
Jiang, Y., Jeusfeld, M. A. & Ding, J. (2021). Evaluating the Data Inconsistency of Open-Source Vulnerability Repositories. In: ARES 2021: The 16th International Conference on Availability, Reliability and Security. Paper presented at 4th International Workshop on Cyber Threat Intelligence Management (CyberTIM 2021), August 17 – August 20, 2021, held in conjunction with ARES 2021: The 16th International Conference on Availability, Reliability and Security, Vienna, Austria, August 17 - 20, 2021 (pp. 1-10). Association for Computing Machinery (ACM), Article ID 86.
Open this publication in new window or tab >>Evaluating the Data Inconsistency of Open-Source Vulnerability Repositories
2021 (English)In: ARES 2021: The 16th International Conference on Availability, Reliability and Security, Association for Computing Machinery (ACM), 2021, p. 1-10, article id 86Conference paper, Published paper (Refereed)
Abstract [en]

Modern security practices promote quantitative methods to provide prioritisation insights and support predictive analysis, which is supported by open-source cybersecurity databases such as the Common Vulnerabilities and Exposures (CVE), the National Vulnerability Database (NVD), CERT, and vendor websites. These public repositories provide a way to standardise and share up-to-date vulnerability information, with the purpose to enhance cybersecurity awareness. However, data quality issues of these vulnerability repositories may lead to incorrect prioritisation and misemployment of resources. In this paper, we aim to empirically analyse the data quality impact of vulnerability repositories for actual information technology (IT) and operating technology (OT) systems, especially on data inconsistency. Our case study shows that data inconsistency may misdirect investment of cybersecurity resources. Instead, correlated vulnerability repositories and trustworthiness data verification bring substantial benefits for vulnerability management. 

Place, publisher, year, edition, pages
Association for Computing Machinery (ACM), 2021
Keywords
Cybersecurity, Data Inconsistency, Vulnerability Analysis
National Category
Computer Systems Information Systems
Research subject
Distributed Real-Time Systems; Information Systems
Identifiers
urn:nbn:se:his:diva-19849 (URN)10.1145/3465481.3470093 (DOI)000749539200136 ()2-s2.0-85113197148 (Scopus ID)978-1-4503-9051-4 (ISBN)
Conference
4th International Workshop on Cyber Threat Intelligence Management (CyberTIM 2021), August 17 – August 20, 2021, held in conjunction with ARES 2021: The 16th International Conference on Availability, Reliability and Security, Vienna, Austria, August 17 - 20, 2021
Note

©2021 Copyright held by the owner/author(s). Publication rights licensed to ACM.

Available from: 2021-06-24 Created: 2021-06-24 Last updated: 2022-02-22Bibliographically approved
Ye, X., Ning, H., Backlund, P. & Ding, J. (2021). Flow Experience Detection and Analysis for Game Users by Wearable-Devices-Based Physiological Responses Capture. IEEE Internet of Things Journal, 8(3), 1373-1387
Open this publication in new window or tab >>Flow Experience Detection and Analysis for Game Users by Wearable-Devices-Based Physiological Responses Capture
2021 (English)In: IEEE Internet of Things Journal, ISSN 2327-4662, Vol. 8, no 3, p. 1373-1387Article in journal (Refereed) Published
Abstract [en]

Relevant research has shown the potential to understand the game user experience (GUX) more accurately and reliably by measuring the user’s psychophysiological responses. However, the current studies are still very scarce and limited in scope and depth. Besides, the low-detection accuracy and the common use of the professional physiological signal apparatus make it difficult to be applied in practice. This article analyzes the GUX, particularly flow experience, based on users’ physiological responses, including the galvanic skin response (GSR) and heart rate (HR) signals, captured by low-cost wearable devices. Based on the collected data sets regarding two test games and the mixed data set, several classification models were constructed to detect the flow state automatically. Hereinto, two strategies were proposed and applied to improve classification performance. The results demonstrated that the flow experience of game users could be effectively classified from other experiences. The best accuracies of two-way classification and three-way classification under the support of the proposed strategies were over 90% and 80%, respectively. Specifically, the comparison test with the existing results showed that Strategy1 could significantly reduce the negative interference of individual differences in physiological signals and improve the classification accuracy. In addition, the results of the mixed data set identified the potential of a general classification model of flow experience.

Place, publisher, year, edition, pages
IEEE, 2021
Keywords
Games, Physiology, Electrocardiography; Heart rate, Human computer interaction, Task analysis, Stress, Flow, game user experience (GUX), games, physiological responses, wearable devices
National Category
Computer and Information Sciences
Research subject
Interaction Lab (ILAB); Distributed Real-Time Systems
Identifiers
urn:nbn:se:his:diva-19426 (URN)10.1109/JIOT.2020.3010853 (DOI)000612146000010 ()2-s2.0-85100243722 (Scopus ID)
Note

© 2020 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.

ISSN: CD: 2372-2541

Funding Agency:10.13039/501100001809-National Natural Science Foundation of China; Scientific and Technological Innovation Foundation of Shunde Graduate School, USTB;

Available from: 2021-01-24 Created: 2021-01-24 Last updated: 2021-04-26Bibliographically approved
Jiang, Y., Atif, Y., Ding, J. & Wang, W. (2020). A Semantic Framework With Humans in the Loop for Vulnerability-Assessment in Cyber-Physical Production Systems. In: Slim Kallel, Frédéric Cuppens, Nora Cuppens-Boulahia, Ahmed Hadj Kacem (Ed.), Risks and Security of Internet and Systems: 14th International Conference, CRiSIS 2019, Hammamet, Tunisia, October 29–31, 2019, Proceedings. Paper presented at The 14th International Conference on Risks and Security of Internet and Systems, Hammamet, Tunisia, October 29-31, 2019 (pp. 128-143). Springer, 12026
Open this publication in new window or tab >>A Semantic Framework With Humans in the Loop for Vulnerability-Assessment in Cyber-Physical Production Systems
2020 (English)In: Risks and Security of Internet and Systems: 14th International Conference, CRiSIS 2019, Hammamet, Tunisia, October 29–31, 2019, Proceedings / [ed] Slim Kallel, Frédéric Cuppens, Nora Cuppens-Boulahia, Ahmed Hadj Kacem, Springer, 2020, Vol. 12026, p. 128-143Conference paper, Published paper (Refereed)
Abstract [en]

Criticalmanufacturingprocessesinsmartnetworkedsystems such as Cyber-Physical Production Systems (CPPSs) typically require guaranteed quality-of-service performances, which is supported by cyber- security management. Currently, most existing vulnerability-assessment techniques mostly rely on only the security department due to limited communication between di↵erent working groups. This poses a limitation to the security management of CPPSs, as malicious operations may use new exploits that occur between successive analysis milestones or across departmental managerial boundaries. Thus, it is important to study and analyse CPPS networks’ security, in terms of vulnerability analysis that accounts for humans in the production process loop, to prevent potential threats to infiltrate through cross-layer gaps and to reduce the magnitude of their impact. We propose a semantic framework that supports the col- laboration between di↵erent actors in the production process, to improve situation awareness for cyberthreats prevention. Stakeholders with dif- ferent expertise are contributing to vulnerability assessment, which can be further combined with attack-scenario analysis to provide more prac- tical analysis. In doing so, we show through a case study evaluation how our proposed framework leverages crucial relationships between vulner- abilities, threats and attacks, in order to narrow further the risk-window induced by discoverable vulnerabilities.

Place, publisher, year, edition, pages
Springer, 2020
Series
Lecture Notes in Computer Science, ISSN 0302-9743, E-ISSN 1611-3349 ; 12026
Keywords
Cyber-Physical Production System Security, Human-in-the-Loop, Vulnerability Assessment, Semantic Model, Reference Model
National Category
Embedded Systems Other Electrical Engineering, Electronic Engineering, Information Engineering Information Systems Human Computer Interaction
Research subject
Distributed Real-Time Systems; Production and Automation Engineering
Identifiers
urn:nbn:se:his:diva-17754 (URN)10.1007/978-3-030-41568-6_9 (DOI)2-s2.0-85082136847 (Scopus ID)978-3-030-41567-9 (ISBN)978-3-030-41568-6 (ISBN)
Conference
The 14th International Conference on Risks and Security of Internet and Systems, Hammamet, Tunisia, October 29-31, 2019
Projects
ELVIRA
Note

Also part of the Information Systems and Applications, incl. Internet/Web, and HCI book sub series (LNISA, volume 12026)

EU ISF Project A431.678/2016 ELVIRA

Available from: 2019-10-03 Created: 2019-10-03 Last updated: 2021-06-24Bibliographically approved
Ye, X., Backlund, P., Ding, J. & Ning, H. (2020). Fidelity in Simulation-based Serious Games. IEEE Transactions on Learning Technologies, 13(2), 340-353
Open this publication in new window or tab >>Fidelity in Simulation-based Serious Games
2020 (English)In: IEEE Transactions on Learning Technologies, ISSN 1939-1382, E-ISSN 1939-1382, Vol. 13, no 2, p. 340-353Article in journal (Refereed) Published
Abstract [en]

The extensive use of Simulation-based Serious Games (SSGs) has made a revolution in educational techniques. As a potentially significant feature for SSG design and evaluation, the term fidelity (the similarity between an SSG and its real reference) emerges and attracts increasing attention. The study of fidelity not only benefits the design, development, and analysis of an SSG with the consideration of improving the learning effect but also contributes to the investment reduction of an SSG. However, the term fidelity is used inconsistently in current literature. The introduction of new technologies (e.g. virtual reality) and the blend of multiform SSGs also facilitate the extension of fidelity with new connotations. All lead to confusing concepts and vague measure metrics. Besides, the relationship between fidelity and learning effect is still uncertain. A new vision and a comprehensive conceptual framework of fidelity for more general applications are in need. In this paper, further exploration and discussion of these issues in relation to fidelity of SSGs are presented through a systematic review. A general conceptual framework considering both aspects of the SSG system itself and the learners is developed and applied to analyze fidelity in SSGs. Based on that, a discussion on fidelity related issues of SSG design and development is presented.

Place, publisher, year, edition, pages
IEEE, 2020
Keywords
fidelity, simulation, serious games, learning, educational games, virtual reality
National Category
Computer and Information Sciences
Research subject
Interaction Lab (ILAB); Distributed Real-Time Systems
Identifiers
urn:nbn:se:his:diva-17735 (URN)10.1109/TLT.2019.2913408 (DOI)000545023500009 ()2-s2.0-85083726688 (Scopus ID)
Funder
Interreg Öresund-Kattegat-Skagerrak, NYPS 20200428
Available from: 2019-09-27 Created: 2019-09-27 Last updated: 2020-07-20Bibliographically approved
Atif, Y., Kharrazi, S., Ding, J. & Andler, S. F. (2020). Internet of Things data analytics for parking availability prediction and guidance. European transactions on telecommunications, 31, Article ID e3862.
Open this publication in new window or tab >>Internet of Things data analytics for parking availability prediction and guidance
2020 (English)In: European transactions on telecommunications, ISSN 1124-318X, E-ISSN 2161-3915, Vol. 31, article id e3862Article in journal (Refereed) Published
Abstract [en]

Cutting-edge sensors and devices are increasingly deployed within urban areas to make-up the fabric of transmission control protocol/internet protocol con- nectivity driven by Internet of Things (IoT). This immersion into physical urban environments creates new data streams, which could be exploited to deliver novel cloud-based services. Connected vehicles and road-infrastructure data are leveraged in this article to build applications that alleviate notorious parking and induced traffic-congestion issues. To optimize the utility of parking lots, our proposed SmartPark algorithm employs a discrete Markov-chain model to demystify the future state of a parking lot, by the time a vehicle is expected to reach it. The algorithm features three modular sections. First, a search pro- cess is triggered to identify the expected arrival-time periods to all parking lots in the targeted central business district (CBD) area. This process utilizes smart-pole data streams reporting congestion rates across parking area junc- tions. Then, a predictive analytics phase uses consolidated historical data about past parking dynamics to infer a state-transition matrix, showing the transfor- mation of available spots in a parking lot over short periods of time. Finally, this matrix is projected against similar future seasonal periods to figure out the actual vacancy-expectation of a lot. The performance evaluation over an actual busy CBD area in Stockholm (Sweden) shows increased scalability capa- bilities, when further parking resources are made available, compared to a baseline case algorithm. Using standard urban-mobility simulation packages, the traffic-congestion-aware SmartPark is also shown to minimize the journey duration to the selected parking lot while maximizing the chances to find an available spot at the selected lot.

Place, publisher, year, edition, pages
Wiley-Blackwell Publishing Inc., 2020
Keywords
smart parking, stochastic model, markov chain, internet of things, sumo, data analytics, autonomous cars
National Category
Transport Systems and Logistics Computer and Information Sciences
Research subject
Distributed Real-Time Systems
Identifiers
urn:nbn:se:his:diva-18081 (URN)10.1002/ett.3862 (DOI)000506093200001 ()2-s2.0-85078033422 (Scopus ID)
Projects
SmartPark
Funder
Vinnova, 2017-03028
Available from: 2020-01-10 Created: 2020-01-10 Last updated: 2020-05-20Bibliographically approved
Jiang, Y., Atif, Y. & Ding, J. (2019). Cyber-Physical Systems Security Based on A Cross-Linked and Correlated Vulnerability Database. In: Simin Nadjm-Tehrani (Ed.), Simin Nadjm-Tehrani (Ed.), Critical Information Infrastructures Security: 14th International Conference, CRITIS 2019, Linköping, Sweden, September 23–25, 2019, Revised Selected Papers. Paper presented at the 14th International Conference on Critical Information Infrastructures Security, Linköping, Sweden, 23-25 September 2019 (pp. 71-82). Paper presented at the 14th International Conference on Critical Information Infrastructures Security, Linköping, Sweden, 23-25 September 2019. Springer, 11777
Open this publication in new window or tab >>Cyber-Physical Systems Security Based on A Cross-Linked and Correlated Vulnerability Database
2019 (English)In: Critical Information Infrastructures Security: 14th International Conference, CRITIS 2019, Linköping, Sweden, September 23–25, 2019, Revised Selected Papers / [ed] Simin Nadjm-Tehrani, Springer, 2019, Vol. 11777, p. 71-82Chapter in book (Refereed)
Abstract [en]

Recent advances in data analytics prompt dynamic datadriven vulnerability assessments whereby data contained from vulnerabilityalert repositories as well as from Cyber-physical System (CPS) layer networks and standardised enumerations. Yet, current vulnerability assessment processes are mostly conducted manually. However, the huge volume of scanned data requires substantial information processing and analytical reasoning, which could not be satisfied considering the imprecision of manual vulnerability analysis. In this paper, we propose to employ a cross-linked and correlated database to collect, extract, filter and visualise vulnerability data across multiple existing repositories, whereby CPS vulnerability information is inferred. Based on our locally-updated database, we provide an in-depth case study on gathered CPS vulnerability data, to explore the trends of CPS vulnerability. In doing so, we aim to support a higher level of automation in vulnerability awareness and back risk-analysis exercises in critical infrastructures (CIs) protection.

Place, publisher, year, edition, pages
Springer, 2019
Series
Lecture Notes in Computer Science, ISSN 0302-9743, E-ISSN 1611-3349 ; 11777
Keywords
Cyber-Physical System Security, Vulnerability Analysis, Correlated Database Management, SCADA
National Category
Other Electrical Engineering, Electronic Engineering, Information Engineering Computer Sciences
Research subject
Distributed Real-Time Systems
Identifiers
urn:nbn:se:his:diva-17753 (URN)10.1007/978-3-030-37670-3_6 (DOI)000612959400006 ()2-s2.0-85077502760 (Scopus ID)978-3-030-37669-7 (ISBN)978-3-030-37670-3 (ISBN)
Conference
the 14th International Conference on Critical Information Infrastructures Security, Linköping, Sweden, 23-25 September 2019
Projects
EU ISF Project A431.678/2016 ELVIRA
Note

Also part of the Security and Cryptology book sub series (LNSC, volume 11777)

Funded by EU Internal Security Funds

Available from: 2019-10-03 Created: 2019-10-03 Last updated: 2022-04-12Bibliographically approved
Projects
CPS-based resilience for critical infrastructure protection [2019-05020_Vinnova]; University of Skövde; Publications
Jiang, Y., Jeusfeld, M. A., Ding, J. & Sandahl, E. (2023). Model-Based Cybersecurity Analysis: Extending Enterprise Modeling to Critical Infrastructure Cybersecurity. Business & Information Systems Engineering, 65(6), 643-676
Organisations
Identifiers
ORCID iD: ORCID iD iconorcid.org/0000-0002-8927-0968

Search in DiVA

Show all publications