Hybrid Technique for Cyber-Physical Security in Cloud-Based Smart Industries

New technologies and trends in industries have opened up ways for distributed establishment of Cyber-Physical Systems (CPSs) for smart industries. CPSs are largely based upon Internet of Things (IoT) because of data storage on cloud servers which poses many constraints due to the heterogeneous natur...

Full description

Saved in:
Bibliographic Details
Published in:Sensors (Basel, Switzerland) Vol. 22; no. 12; p. 4630
Main Authors: Garg, Deepak, Rani, Shalli, Herencsar, Norbert, Verma, Sahil, Wozniak, Marcin, Ijaz, Muhammad Fazal
Format: Journal Article
Language:English
Published: Basel MDPI AG 19.06.2022
MDPI
Subjects:
ISSN:1424-8220, 1424-8220
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Abstract New technologies and trends in industries have opened up ways for distributed establishment of Cyber-Physical Systems (CPSs) for smart industries. CPSs are largely based upon Internet of Things (IoT) because of data storage on cloud servers which poses many constraints due to the heterogeneous nature of devices involved in communication. Among other challenges, security is the most daunting challenge that contributes, at least in part, to the impeded momentum of the CPS realization. Designers assume that CPSs are themselves protected as they cannot be accessed from external networks. However, these days, CPSs have combined parts of the cyber world and also the physical layer. Therefore, cyber security problems are large for commercial CPSs because the systems move with one another and conjointly with physical surroundings, i.e., Complex Industrial Applications (CIA). Therefore, in this paper, a novel data security algorithm Dynamic Hybrid Secured Encryption Technique (DHSE) is proposed based on the hybrid encryption scheme of Advanced Encryption Standard (AES), Identity-Based Encryption (IBE) and Attribute-Based Encryption (ABE). The proposed algorithm divides the data into three categories, i.e., less sensitive, mid-sensitive and high sensitive. The data is distributed by forming the named-data packets (NDPs) via labelling the names. One can choose the number of rounds depending on the actual size of a key; it is necessary to perform a minimum of 10 rounds for 128-bit keys in DHSE. The average encryption time taken by AES (Advanced Encryption Standard), IBE (Identity-based encryption) and ABE (Attribute-Based Encryption) is 3.25 ms, 2.18 ms and 2.39 ms, respectively. Whereas the average time taken by the DHSE encryption algorithm is 2.07 ms which is very much less when compared to other algorithms. Similarly, the average decryption times taken by AES, IBE and ABE are 1.77 ms, 1.09 ms and 1.20 ms and the average times taken by the DHSE decryption algorithms are 1.07 ms, which is very much less when compared to other algorithms. The analysis shows that the framework is well designed and provides confidentiality of data with minimum encryption and decryption time. Therefore, the proposed approach is well suited for CPS-IoT.
AbstractList New technologies and trends in industries have opened up ways for distributed establishment of Cyber-Physical Systems (CPSs) for smart industries. CPSs are largely based upon Internet of Things (IoT) because of data storage on cloud servers which poses many constraints due to the heterogeneous nature of devices involved in communication. Among other challenges, security is the most daunting challenge that contributes, at least in part, to the impeded momentum of the CPS realization. Designers assume that CPSs are themselves protected as they cannot be accessed from external networks. However, these days, CPSs have combined parts of the cyber world and also the physical layer. Therefore, cyber security problems are large for commercial CPSs because the systems move with one another and conjointly with physical surroundings, i.e., Complex Industrial Applications (CIA). Therefore, in this paper, a novel data security algorithm Dynamic Hybrid Secured Encryption Technique (DHSE) is proposed based on the hybrid encryption scheme of Advanced Encryption Standard (AES), Identity-Based Encryption (IBE) and Attribute-Based Encryption (ABE). The proposed algorithm divides the data into three categories, i.e., less sensitive, mid-sensitive and high sensitive. The data is distributed by forming the named-data packets (NDPs) via labelling the names. One can choose the number of rounds depending on the actual size of a key; it is necessary to perform a minimum of 10 rounds for 128-bit keys in DHSE. The average encryption time taken by AES (Advanced Encryption Standard), IBE (Identity-based encryption) and ABE (Attribute-Based Encryption) is 3.25 ms, 2.18 ms and 2.39 ms, respectively. Whereas the average time taken by the DHSE encryption algorithm is 2.07 ms which is very much less when compared to other algorithms. Similarly, the average decryption times taken by AES, IBE and ABE are 1.77 ms, 1.09 ms and 1.20 ms and the average times taken by the DHSE decryption algorithms are 1.07 ms, which is very much less when compared to other algorithms. The analysis shows that the framework is well designed and provides confidentiality of data with minimum encryption and decryption time. Therefore, the proposed approach is well suited for CPS-IoT.
New technologies and trends in industries have opened up ways for distributed establishment of Cyber-Physical Systems (CPSs) for smart industries. CPSs are largely based upon Internet of Things (IoT) because of data storage on cloud servers which poses many constraints due to the heterogeneous nature of devices involved in communication. Among other challenges, security is the most daunting challenge that contributes, at least in part, to the impeded momentum of the CPS realization. Designers assume that CPSs are themselves protected as they cannot be accessed from external networks. However, these days, CPSs have combined parts of the cyber world and also the physical layer. Therefore, cyber security problems are large for commercial CPSs because the systems move with one another and conjointly with physical surroundings, i.e., Complex Industrial Applications (CIA). Therefore, in this paper, a novel data security algorithm Dynamic Hybrid Secured Encryption Technique (DHSE) is proposed based on the hybrid encryption scheme of Advanced Encryption Standard (AES), Identity-Based Encryption (IBE) and Attribute-Based Encryption (ABE). The proposed algorithm divides the data into three categories, i.e., less sensitive, mid-sensitive and high sensitive. The data is distributed by forming the named-data packets (NDPs) via labelling the names. One can choose the number of rounds depending on the actual size of a key; it is necessary to perform a minimum of 10 rounds for 128-bit keys in DHSE. The average encryption time taken by AES (Advanced Encryption Standard), IBE (Identity-based encryption) and ABE (Attribute-Based Encryption) is 3.25 ms, 2.18 ms and 2.39 ms, respectively. Whereas the average time taken by the DHSE encryption algorithm is 2.07 ms which is very much less when compared to other algorithms. Similarly, the average decryption times taken by AES, IBE and ABE are 1.77 ms, 1.09 ms and 1.20 ms and the average times taken by the DHSE decryption algorithms are 1.07 ms, which is very much less when compared to other algorithms. The analysis shows that the framework is well designed and provides confidentiality of data with minimum encryption and decryption time. Therefore, the proposed approach is well suited for CPS-IoT.New technologies and trends in industries have opened up ways for distributed establishment of Cyber-Physical Systems (CPSs) for smart industries. CPSs are largely based upon Internet of Things (IoT) because of data storage on cloud servers which poses many constraints due to the heterogeneous nature of devices involved in communication. Among other challenges, security is the most daunting challenge that contributes, at least in part, to the impeded momentum of the CPS realization. Designers assume that CPSs are themselves protected as they cannot be accessed from external networks. However, these days, CPSs have combined parts of the cyber world and also the physical layer. Therefore, cyber security problems are large for commercial CPSs because the systems move with one another and conjointly with physical surroundings, i.e., Complex Industrial Applications (CIA). Therefore, in this paper, a novel data security algorithm Dynamic Hybrid Secured Encryption Technique (DHSE) is proposed based on the hybrid encryption scheme of Advanced Encryption Standard (AES), Identity-Based Encryption (IBE) and Attribute-Based Encryption (ABE). The proposed algorithm divides the data into three categories, i.e., less sensitive, mid-sensitive and high sensitive. The data is distributed by forming the named-data packets (NDPs) via labelling the names. One can choose the number of rounds depending on the actual size of a key; it is necessary to perform a minimum of 10 rounds for 128-bit keys in DHSE. The average encryption time taken by AES (Advanced Encryption Standard), IBE (Identity-based encryption) and ABE (Attribute-Based Encryption) is 3.25 ms, 2.18 ms and 2.39 ms, respectively. Whereas the average time taken by the DHSE encryption algorithm is 2.07 ms which is very much less when compared to other algorithms. Similarly, the average decryption times taken by AES, IBE and ABE are 1.77 ms, 1.09 ms and 1.20 ms and the average times taken by the DHSE decryption algorithms are 1.07 ms, which is very much less when compared to other algorithms. The analysis shows that the framework is well designed and provides confidentiality of data with minimum encryption and decryption time. Therefore, the proposed approach is well suited for CPS-IoT.
Audience Academic
Author Rani, Shalli
Ijaz, Muhammad Fazal
Herencsar, Norbert
Garg, Deepak
Verma, Sahil
Wozniak, Marcin
AuthorAffiliation 4 Faculty of Applied Mathematics, Silesian University of Technology, 44-100 Gliwice, Poland
3 Department of Computer Science and Engineering, Chandigarh University, Mohali 140055, Punjab, India; sahilverma@ieee.org
2 Department of Telecommunications, Faculty of Electrical Engineering and Communication, Brno University of Technology, Technicka 12, 616 00 Brno, Czech Republic; herencsn@ieee.org
5 Department of Intelligent Mechatronics Engineering, Sejong University, Seoul 05006, Korea
1 Chitkara University Institute of Engineering and Technology, Chitkara University, Rajpura 140401, Punjab, India; deepak.garg@chitkara.edu.in (D.G.); shalli.rani@chitkara.edu.in (S.R.)
AuthorAffiliation_xml – name: 3 Department of Computer Science and Engineering, Chandigarh University, Mohali 140055, Punjab, India; sahilverma@ieee.org
– name: 5 Department of Intelligent Mechatronics Engineering, Sejong University, Seoul 05006, Korea
– name: 2 Department of Telecommunications, Faculty of Electrical Engineering and Communication, Brno University of Technology, Technicka 12, 616 00 Brno, Czech Republic; herencsn@ieee.org
– name: 4 Faculty of Applied Mathematics, Silesian University of Technology, 44-100 Gliwice, Poland
– name: 1 Chitkara University Institute of Engineering and Technology, Chitkara University, Rajpura 140401, Punjab, India; deepak.garg@chitkara.edu.in (D.G.); shalli.rani@chitkara.edu.in (S.R.)
Author_xml – sequence: 1
  givenname: Deepak
  surname: Garg
  fullname: Garg, Deepak
– sequence: 2
  givenname: Shalli
  orcidid: 0000-0002-8474-9435
  surname: Rani
  fullname: Rani, Shalli
– sequence: 3
  givenname: Norbert
  orcidid: 0000-0002-9504-2275
  surname: Herencsar
  fullname: Herencsar, Norbert
– sequence: 4
  givenname: Sahil
  orcidid: 0000-0003-3136-4029
  surname: Verma
  fullname: Verma, Sahil
– sequence: 5
  givenname: Marcin
  orcidid: 0000-0002-9073-5347
  surname: Wozniak
  fullname: Wozniak, Marcin
– sequence: 6
  givenname: Muhammad Fazal
  orcidid: 0000-0001-5206-272X
  surname: Ijaz
  fullname: Ijaz, Muhammad Fazal
BookMark eNptUstqGzEUFSWlSdwu-gcD3bSLSfQaPTaFxLSNwdBC0rXQ444tMx6l0kzBf1-lDqEJ5S4krs45Ovdxjk7GNAJC7wm-YEzjy0IpoVww_AqdEU55qyjFJ__cT9F5KTuMKWNMvUGnrJNccELO0Prm4HIMzR347Rh_zdD0KTfLg4Pc_tgeSvR2aG7BzzlOhyaOzXJIc2ivbYHQ3O5tnprVGOYy5QjlLXrd26HAu8dzgX5-_XK3vGnX37-tllfr1nPVTa0UjmAPrg-gHLe4w55qTQVR4IOQQUmsLNOBKt0FwapZZb0DSXoKXvSKLdDqqBuS3Zn7HKuPg0k2mr-JlDemGot-AGOVE04TxYmknGGnQdboaQfCeuJx1fp81Lqf3R6Ch3HKdngm-vxljFuzSb-NplQJ2lWBj48COdX-lcnsY_EwDHaENBdDhSKYSaZZhX54Ad2lOY-1VRUlteJcV5MLdHFEbWwtII59qv_6GgH20dfJ97Hmr2QdOsOqk5Xw6UjwOZWSoX9yT7B5WBDztCAVe_kC6-Nkp5geiovDfxh_AAMtu-Q
CitedBy_id crossref_primary_10_1016_j_comcom_2022_09_014
crossref_primary_10_32604_cmc_2024_046516
crossref_primary_10_1007_s11042_024_20368_8
crossref_primary_10_1109_JSYST_2023_3275996
crossref_primary_10_1016_j_eswa_2023_121180
crossref_primary_10_1109_TCE_2023_3332454
crossref_primary_10_1109_JSYST_2023_3294612
crossref_primary_10_32604_csse_2024_042690
crossref_primary_10_1016_j_eswa_2023_121461
Cites_doi 10.1109/ACCESS.2016.2549047
10.24846/v26i3y201711
10.1007/978-3-662-44733-8_11
10.1109/TIFS.2016.2523941
10.1109/TAC.2014.2351672
10.1007/978-981-10-3892-1_3
10.1007/s10489-017-1067-0
10.1109/TAC.2014.2351632
10.1109/MCOM.2014.6871677
10.1109/WD.2013.6686528
10.1109/JPROC.2011.2165689
10.1016/j.future.2012.07.010
10.1016/j.asoc.2014.01.003
10.1007/s11036-014-0499-6
10.1109/JPROC.2011.2165269
10.1109/TPDS.2010.203
10.1109/TC.2013.83
10.1109/TPDS.2013.282
10.1016/0305-0548(74)90064-1
10.1155/2015/431047
10.1016/j.comnet.2021.107937
10.1109/ACCESS.2017.2651904
10.1109/MNET.2015.7064900
10.1016/j.asoc.2016.09.021
10.1016/j.asoc.2014.09.019
10.1007/978-3-540-24676-3_30
10.1109/JPROC.2011.2160929
ContentType Journal Article
Copyright COPYRIGHT 2022 MDPI AG
2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
2022 by the authors. 2022
Copyright_xml – notice: COPYRIGHT 2022 MDPI AG
– notice: 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
– notice: 2022 by the authors. 2022
DBID AAYXX
CITATION
3V.
7X7
7XB
88E
8FI
8FJ
8FK
ABUWG
AFKRA
AZQEC
BENPR
CCPQU
DWQXO
FYUFA
GHDGH
K9.
M0S
M1P
PHGZM
PHGZT
PIMPY
PJZUB
PKEHL
PPXIY
PQEST
PQQKQ
PQUKI
PRINS
7X8
5PM
DOA
DOI 10.3390/s22124630
DatabaseName CrossRef
ProQuest Central (Corporate)
Health & Medical Collection
ProQuest Central (purchase pre-March 2016)
Medical Database (Alumni Edition)
Hospital Premium Collection
Hospital Premium Collection (Alumni Edition)
ProQuest Central (Alumni) (purchase pre-March 2016)
ProQuest Central (Alumni)
ProQuest Central UK/Ireland
ProQuest Central Essentials
ProQuest Central
ProQuest One Community College
ProQuest Central
Health Research Premium Collection
Health Research Premium Collection (Alumni)
ProQuest Health & Medical Complete (Alumni)
Health & Medical Collection (Alumni Edition)
PML(ProQuest Medical Library)
ProQuest Central Premium
ProQuest One Academic (New)
Publicly Available Content Database
ProQuest Health & Medical Research Collection
ProQuest One Academic Middle East (New)
ProQuest One Health & Nursing
ProQuest One Academic Eastern Edition (DO NOT USE)
ProQuest One Academic (retired)
ProQuest One Academic UKI Edition
ProQuest Central China
MEDLINE - Academic
PubMed Central (Full Participant titles)
Directory of Open Access Journals
DatabaseTitle CrossRef
Publicly Available Content Database
ProQuest One Academic Middle East (New)
ProQuest Central Essentials
ProQuest Health & Medical Complete (Alumni)
ProQuest Central (Alumni Edition)
ProQuest One Community College
ProQuest One Health & Nursing
ProQuest Central China
ProQuest Central
ProQuest Health & Medical Research Collection
Health Research Premium Collection
Health and Medicine Complete (Alumni Edition)
ProQuest Central Korea
Health & Medical Research Collection
ProQuest Central (New)
ProQuest Medical Library (Alumni)
ProQuest One Academic Eastern Edition
ProQuest Hospital Collection
Health Research Premium Collection (Alumni)
ProQuest Hospital Collection (Alumni)
ProQuest Health & Medical Complete
ProQuest Medical Library
ProQuest One Academic UKI Edition
ProQuest One Academic
ProQuest One Academic (New)
ProQuest Central (Alumni)
MEDLINE - Academic
DatabaseTitleList CrossRef

MEDLINE - Academic
Publicly Available Content Database


Database_xml – sequence: 1
  dbid: DOA
  name: DOAJ Directory of Open Access Journals - NZ
  url: https://www.doaj.org/
  sourceTypes: Open Website
– sequence: 2
  dbid: PIMPY
  name: Publicly Available Content Database
  url: http://search.proquest.com/publiccontent
  sourceTypes: Aggregation Database
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 1424-8220
ExternalDocumentID oai_doaj_org_article_a8b6b9184172430b9e7e7ef25e6ac1c0
PMC9228625
A722130857
10_3390_s22124630
GeographicLocations India
GeographicLocations_xml – name: India
GrantInformation_xml – fundername: Rector of the Silesian University of Technology, Gliwice, Poland
  grantid: 09/010/RGJ22/0068
GroupedDBID ---
123
2WC
53G
5VS
7X7
88E
8FE
8FG
8FI
8FJ
AADQD
AAHBH
AAYXX
ABDBF
ABUWG
ACUHS
ADBBV
ADMLS
AENEX
AFFHD
AFKRA
AFZYC
ALMA_UNASSIGNED_HOLDINGS
BENPR
BPHCQ
BVXVI
CCPQU
CITATION
CS3
D1I
DU5
E3Z
EBD
ESX
F5P
FYUFA
GROUPED_DOAJ
GX1
HH5
HMCUK
HYE
IAO
ITC
KQ8
L6V
M1P
M48
MODMG
M~E
OK1
OVT
P2P
P62
PHGZM
PHGZT
PIMPY
PJZUB
PPXIY
PQQKQ
PROAC
PSQYO
RNS
RPM
TUS
UKHRP
XSB
~8M
3V.
7XB
8FK
AZQEC
DWQXO
K9.
PKEHL
PQEST
PQUKI
PRINS
7X8
5PM
ID FETCH-LOGICAL-c485t-76b10cebfde8b4a050c2992618ecd67d8708a39d2895d633578acbe71f2ec6f83
IEDL.DBID PIMPY
ISICitedReferencesCount 9
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000816403300001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 1424-8220
IngestDate Tue Oct 14 19:03:56 EDT 2025
Tue Nov 04 01:53:04 EST 2025
Sun Nov 09 11:09:41 EST 2025
Tue Oct 07 07:15:53 EDT 2025
Tue Nov 04 18:41:40 EST 2025
Sat Nov 29 07:10:19 EST 2025
Tue Nov 18 21:51:34 EST 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 12
Language English
License Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c485t-76b10cebfde8b4a050c2992618ecd67d8708a39d2895d633578acbe71f2ec6f83
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
content type line 23
These authors contributed equally to this work.
ORCID 0000-0003-3136-4029
0000-0002-9073-5347
0000-0002-8474-9435
0000-0002-9504-2275
0000-0001-5206-272X
OpenAccessLink https://www.proquest.com/publiccontent/docview/2679844924?pq-origsite=%requestingapplication%
PMID 35746411
PQID 2679844924
PQPubID 2032333
ParticipantIDs doaj_primary_oai_doaj_org_article_a8b6b9184172430b9e7e7ef25e6ac1c0
pubmedcentral_primary_oai_pubmedcentral_nih_gov_9228625
proquest_miscellaneous_2681037393
proquest_journals_2679844924
gale_infotracacademiconefile_A722130857
crossref_primary_10_3390_s22124630
crossref_citationtrail_10_3390_s22124630
PublicationCentury 2000
PublicationDate 20220619
PublicationDateYYYYMMDD 2022-06-19
PublicationDate_xml – month: 6
  year: 2022
  text: 20220619
  day: 19
PublicationDecade 2020
PublicationPlace Basel
PublicationPlace_xml – name: Basel
PublicationTitle Sensors (Basel, Switzerland)
PublicationYear 2022
Publisher MDPI AG
MDPI
Publisher_xml – name: MDPI AG
– name: MDPI
References Wang (ref_23) 2016; 11
Wan (ref_2) 2014; 52
ref_14
Taylan (ref_28) 2014; 17
ref_12
Li (ref_25) 2017; 5
Cheng (ref_17) 2012; 21
Rajhans (ref_18) 2013; 29
ref_19
ref_16
Kumar (ref_31) 2018; 48
Liu (ref_20) 2014; 16
Sajid (ref_11) 2016; 4
Aouadni (ref_30) 2017; 26
Zelany (ref_33) 1974; 1
Fernandez (ref_13) 2005; 20
Rajhans (ref_5) 2014; 59
Chen (ref_7) 2015; 2015
ref_21
Wang (ref_1) 2015; 2015
Shang (ref_15) 2021; 189
Caliskan (ref_8) 2014; 59
Fan (ref_22) 2014; 63
Sun (ref_26) 2014; 25
ref_29
Wan (ref_9) 2014; 19
ref_27
Kangi (ref_32) 2017; 52
Banerjee (ref_4) 2012; 100
Hur (ref_24) 2011; 22
Sridhar (ref_3) 2012; 100
Chen (ref_10) 2015; 29
Zavadskas (ref_34) 2015; 26
Derler (ref_6) 2012; 100
References_xml – volume: 4
  start-page: 1375
  year: 2016
  ident: ref_11
  article-title: Cloud-Assisted IoT-Based SCADA Systems Security: A Review of the State of the Art and Future Challenges
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2016.2549047
– volume: 26
  start-page: 353
  year: 2017
  ident: ref_30
  article-title: The Meaningful Mixed Data TOPSIS (TOPSIS-MMD) Method and its Application in Supplier Selection
  publication-title: Stud. Inform. Control
  doi: 10.24846/v26i3y201711
– ident: ref_12
  doi: 10.1007/978-3-662-44733-8_11
– volume: 11
  start-page: 1265
  year: 2016
  ident: ref_23
  article-title: An efficient file hierarchy attributebased encryption scheme in cloud computing
  publication-title: IEEE Trans. Inf. Forensics Secur.
  doi: 10.1109/TIFS.2016.2523941
– volume: 59
  start-page: 3178
  year: 2014
  ident: ref_5
  article-title: Supporting Heterogeneity in Cyber-Physical Systems Architectures
  publication-title: IEEE Trans. Autom. Control
  doi: 10.1109/TAC.2014.2351672
– ident: ref_29
  doi: 10.1007/978-981-10-3892-1_3
– volume: 48
  start-page: 2112
  year: 2018
  ident: ref_31
  article-title: Connection number of set pair analysis based TOPSIS method on intuitionistic fuzzy sets and their application to decision making
  publication-title: Appl. Intell.
  doi: 10.1007/s10489-017-1067-0
– volume: 59
  start-page: 3151
  year: 2014
  ident: ref_8
  article-title: Towards robustness for cyber-physical systems
  publication-title: IEEE Trans. Autom. Control
  doi: 10.1109/TAC.2014.2351632
– volume: 21
  start-page: 254
  year: 2012
  ident: ref_17
  article-title: Identity based encryption and biometric authentication scheme for secure data access in cloud computing
  publication-title: Chin. J. Electron.
– volume: 52
  start-page: 106
  year: 2014
  ident: ref_2
  article-title: Context-aware vehicular cyber-physical systems with cloud support: Architecture, challenges and solutions
  publication-title: IEEE Commun. Mag.
  doi: 10.1109/MCOM.2014.6871677
– volume: 20
  start-page: 160
  year: 2005
  ident: ref_13
  article-title: SCADA systems: Vulnerabilities and remediation
  publication-title: J. Comput. Sci. Coll. Arch.
– volume: 16
  start-page: 437
  year: 2014
  ident: ref_20
  article-title: Ciphertext-policy hierarchical attribute-based encryption for fine-grained access control of encryption data
  publication-title: Int. J. Netw. Secur.
– ident: ref_14
– ident: ref_16
  doi: 10.1109/WD.2013.6686528
– ident: ref_21
– volume: 100
  start-page: 283
  year: 2012
  ident: ref_4
  article-title: Ensuring safety, security, and sustainability of mission-critical cyber-physical systems
  publication-title: Proc. IEEE
  doi: 10.1109/JPROC.2011.2165689
– volume: 29
  start-page: 673
  year: 2013
  ident: ref_18
  article-title: Identity-based data storage in cloud computing
  publication-title: Future Gener. Comput. Syst.
  doi: 10.1016/j.future.2012.07.010
– volume: 17
  start-page: 105
  year: 2014
  ident: ref_28
  article-title: Construction projects selection and risk assessment by fuzzy AHP and fuzzy TOPSIS methodologies
  publication-title: Appl. Soft Comput.
  doi: 10.1016/j.asoc.2014.01.003
– volume: 19
  start-page: 153
  year: 2014
  ident: ref_9
  article-title: VCMIA: A novel architecture for integrating vehicular cyber-physical systems and mobile cloud computing
  publication-title: Mob. Netw. Appl.
  doi: 10.1007/s11036-014-0499-6
– volume: 2015
  start-page: 10
  year: 2015
  ident: ref_1
  article-title: Implementing smartfactory of industrie 4.0: An outlook
  publication-title: Int. J. Distrib. Sens. Netw.
– ident: ref_27
– volume: 100
  start-page: 210
  year: 2012
  ident: ref_3
  article-title: Cyber-physical system security for the electric power grid
  publication-title: Proc. IEEE
  doi: 10.1109/JPROC.2011.2165269
– volume: 22
  start-page: 1214
  year: 2011
  ident: ref_24
  article-title: Attribute-based access control with efficient revocation in data outsourcing systems
  publication-title: IEEE Trans. Parallel Distrib. Syst.
  doi: 10.1109/TPDS.2010.203
– volume: 63
  start-page: 1951
  year: 2014
  ident: ref_22
  article-title: Arbitrary-state attribute-based encryption with dynamic membership
  publication-title: IEEE Trans. Comput.
  doi: 10.1109/TC.2013.83
– volume: 25
  start-page: 3025
  year: 2014
  ident: ref_26
  article-title: Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking
  publication-title: IEEE Trans. Parallel Distrib. Syst.
  doi: 10.1109/TPDS.2013.282
– volume: 1
  start-page: 479
  year: 1974
  ident: ref_33
  article-title: A concept of compromise solutions and the method of the displaced ideal
  publication-title: Comput. Oper. Res.
  doi: 10.1016/0305-0548(74)90064-1
– volume: 2015
  start-page: 431047
  year: 2015
  ident: ref_7
  article-title: Data Mining for the Internet of Things: Literature Review and Challenges
  publication-title: Int. J. Distrib. Sens. Netw.
  doi: 10.1155/2015/431047
– volume: 189
  start-page: 107937
  year: 2021
  ident: ref_15
  article-title: Discovering unknown advanced persistent threat using shared features mined by neural networks
  publication-title: Comput. Netw.
  doi: 10.1016/j.comnet.2021.107937
– volume: 5
  start-page: 1137
  year: 2017
  ident: ref_25
  article-title: A ciphertext-policy attributebased encryption based on an ordered binary decision diagram
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2017.2651904
– volume: 29
  start-page: 32
  year: 2015
  ident: ref_10
  article-title: EMC: Emotionaware mobile cloud computing in 5G
  publication-title: IEEE Netw.
  doi: 10.1109/MNET.2015.7064900
– volume: 52
  start-page: 1084
  year: 2017
  ident: ref_32
  article-title: An extension of fuzzy TOPSIS for a group decision making with an Application to Tehran stock exchange
  publication-title: Appl. Soft Comput.
  doi: 10.1016/j.asoc.2016.09.021
– volume: 26
  start-page: 180
  year: 2015
  ident: ref_34
  article-title: Multi-criteria selection of a deep-water port in the Eastern Baltic Sea
  publication-title: Appl. Soft Comput.
  doi: 10.1016/j.asoc.2014.09.019
– ident: ref_19
  doi: 10.1007/978-3-540-24676-3_30
– volume: 100
  start-page: 13
  year: 2012
  ident: ref_6
  article-title: Modeling cyber-physical systems
  publication-title: Proc. IEEE
  doi: 10.1109/JPROC.2011.2160929
SSID ssj0023338
Score 2.4578156
Snippet New technologies and trends in industries have opened up ways for distributed establishment of Cyber-Physical Systems (CPSs) for smart industries. CPSs are...
SourceID doaj
pubmedcentral
proquest
gale
crossref
SourceType Open Website
Open Access Repository
Aggregation Database
Enrichment Source
Index Database
StartPage 4630
SubjectTerms Algorithms
Automation
Cloud computing
Communication
Computer industry
confidentiality
Cyber-Physical System (CPS)
Data integrity
Data security
decryption
encryption
Management
Safety and security measures
security
smart industrial environment
SummonAdditionalLinks – databaseName: Directory of Open Access Journals
  dbid: DOA
  link: http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV3Ni9UwEB9k8aAH8ROrq0QR9FK2TdIkPe4-XPawLAu7yt5CvooP1j55H8L-98606eM9FbxIb-1Ak5lMZn4k8xuAD1FxqXUKJQ8cAUrNVWlkMGXkLmJAU103MN58PdcXF-bmpr3cafVFd8JGeuBRcUfOeOVbxCEYaaWofJs0Ph1vknKhDgNar3Q7gakMtQQir5FHSCCoP1px3KGloqvOO9FnIOn_cyv-_XrkTrw5fQyPcqLIjscBPoF7qX8KD3foA5_B-dkd1Vux64mHlWEGymZ3Pi3Ly6x_dpUb1LF5z2a3i00sTzBwRXb1HefOps4dafUcvpx-vp6dlbk7QhmkadalVr6uQvJdTMZLVzVVwNCCgMikEJWO6IjGiTYiomqiEsRq44JPuu54Cqoz4gUc9Is-vQSmjGwiihnlpdRV7WKDWYCvax0i5h-ugE-T1mzI1OHUweLWIoQgBdutggt4vxX9MfJl_E3ohFS_FSCK6-EFGt5mw9t_Gb6Aj2Q4S46Igwku1xPglIjSyh5r_J0gAv8CDifb2uyhK8vp-ElKhJ8FvNt-Rt-iAxPXp8WGZAyVUYpWFKD31sTe0Pe_9PNvA0t3yzmixebV_5jra3jAqeyCeia1h3CwXm7SG7gffq7nq-XbYen_AiJuCR0
  priority: 102
  providerName: Directory of Open Access Journals
Title Hybrid Technique for Cyber-Physical Security in Cloud-Based Smart Industries
URI https://www.proquest.com/docview/2679844924
https://www.proquest.com/docview/2681037393
https://pubmed.ncbi.nlm.nih.gov/PMC9228625
https://doaj.org/article/a8b6b9184172430b9e7e7ef25e6ac1c0
Volume 22
WOSCitedRecordID wos000816403300001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVAON
  databaseName: DOAJ Directory of Open Access Journals - NZ
  customDbUrl:
  eissn: 1424-8220
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0023338
  issn: 1424-8220
  databaseCode: DOA
  dateStart: 20010101
  isFulltext: true
  titleUrlDefault: https://www.doaj.org/
  providerName: Directory of Open Access Journals
– providerCode: PRVHPJ
  databaseName: ROAD: Directory of Open Access Scholarly Resources
  customDbUrl:
  eissn: 1424-8220
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0023338
  issn: 1424-8220
  databaseCode: M~E
  dateStart: 20010101
  isFulltext: true
  titleUrlDefault: https://road.issn.org
  providerName: ISSN International Centre
– providerCode: PRVPQU
  databaseName: Health & Medical Collection
  customDbUrl:
  eissn: 1424-8220
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0023338
  issn: 1424-8220
  databaseCode: 7X7
  dateStart: 20010101
  isFulltext: true
  titleUrlDefault: https://search.proquest.com/healthcomplete
  providerName: ProQuest
– providerCode: PRVPQU
  databaseName: ProQuest Central
  customDbUrl:
  eissn: 1424-8220
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0023338
  issn: 1424-8220
  databaseCode: BENPR
  dateStart: 20010101
  isFulltext: true
  titleUrlDefault: https://www.proquest.com/central
  providerName: ProQuest
– providerCode: PRVPQU
  databaseName: Publicly Available Content Database
  customDbUrl:
  eissn: 1424-8220
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0023338
  issn: 1424-8220
  databaseCode: PIMPY
  dateStart: 20010101
  isFulltext: true
  titleUrlDefault: http://search.proquest.com/publiccontent
  providerName: ProQuest
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1Lj9MwEB6xLQc48EYEliogJLhETRzHdk5oW3W1SLtVxS6onCLHdqDSkix9IO2F385M6pYWECcUKYdklDgaz-OLPd8AvLKCcSmdiZhhCFASJiLFjYos0xYDmqiqlvHm46kcj9V0mk98efTCb6vc-MTWUa_ZnmnfNjrhvm0M_THvM1o84BzBw9urbxH1kKK1Vt9Q4wC6RLwVd6A7eXc2-bQFYCnisTW7UIpQv79g6Le5oA3QOzGppe7_00H_vmlyJwod3_2_478Hd3w2Gh6tp899uOHqB3B7h6PwIZyeXFNRV3ixIXsNMc0Nh9elm0cTr-Tw3HfBC2d1OLxsVjYaYHS04flXnJnhpj2IWzyCD8eji-FJ5FswRIarbBlJUSaxcWVlnSq5jrPYYPxC1KWcsUJatHal09wibMusSIk6R5vSyaRizohKpY-hUze1ewKhUDyzKKZEybmME20zTDXKJJHGYpKjA3izUUJhPD85tcm4LBCnkL6Krb4CeLkVvVqTcvxNaECa3AoQj3Z7oZl_LrxZFlqVoswR5WIex9O4zJ3Eo2KZE9okBh_ymuZBQdaOgzHaFy3gJxFvVnEk8XUpdQkI4HCj98K7gUXxS80BvNjeRgOmVRldu2ZFMopqNdM8DUDuTbG9oe_fqWdfWirwnDGEpNnTf7_8GdxiVLVBLZfyQ-gs5yv3HG6a78vZYt6DAzmV7Vn1oDsYjSfve-2vCTyf_Rj1vBX9BHLdKbc
linkProvider ProQuest
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1Lb9NAEB6VFAk48EYECiwIBBer9nq9uz4g1AaqRE2jSA2oPRl7dw2Ril3yAOVP8RuZSWyTAOLWA_LNHvn57cx83p1vAJ5byYVSznjccCQoAZeeFkZ7lqcWA5rM86XizYe-Ggz0yUk83IIfdS0MLausfeLSUdvS0D_yXU7TBUIgXXhz_tWjrlE0u1q30FjB4tAtviNlm77uvcXv-4Lzg3ejTterugp4Ruho5imZBb5xWW6dzkTqR75Bl4xEQjtjpbIIYJ2GsUUmElkZkhpMajKngpw7I3Md4nkvwbZAsPst2B72joanDcULkfGt9IvCMPZ3pxwjg5C0xHot6i2bA_wZAn5flrkW5w5u_G9v6CZcrzJqtrcaArdgyxW34dqazuId6HcXVJjGRrVgLcNUnXUWmZt4wwqo7Ljq5MfGBeuclXPr7WOEt-z4C44uVrc4cdO78P5CHucetIqycPeBSS0ii2ZaZkIoP0hthOlSFgTKWEzU0ja8qj9zYiqNdWr1cZYg1yJEJA0i2vCsMT1fCYv8zWifsNIYkBb4ckc5-ZRUriVJdSazGJk65qIi9LPYKdxyHjmZmsDgSV4S0hLyWHgzJq0KL_CRSPsr2VN4uZA6HbRhp0ZWUrmyafILVm142hxGJ0QzS2nhyjnZaKo3DeOwDWoDxBu3vnmkGH9eypnHnCOtjh78--JP4Ep3dNRP-r3B4UO4yqkKhVpIxTvQmk3m7hFcNt9m4-nkcTUmGXy8aJD_BBaKdjo
linkToPdf http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1Lb9NAEB6VFCE48EYECiwIRC9W7N317vqAUJM2atUoimhBvRl7dw2RilPyAOWv8euYSeyQAOLWA_LNHvn57cx83p1vAF46xaXW3gbcciQoEVeBkdYEjmcOA5oqioXizYee7vfN2Vky2IIfdS0MLausfeLCUbuRpX_kLU7TBVIiXWgV1bKIwX737cXXgDpI0Uxr3U5jCZFjP_-O9G3y5mgfv_UrzrsHp53DoOowEFhp4mmgVR6F1ueF8yaXWRiHFt0zkgrjrVPaIZhNJhKHrCR2SpAyTGZzr6OCe6sKI_C8V2BbCyQ9DdhuH_QH71Z0TyD7W2oZCZGErQnHKCEVLbdei4CLRgF_hoPfl2iuxbzurf_5bd2Gm1WmzfaWQ-MObPnyLtxY01-8B73DORWssdNayJZhCs8689yPg0EFYHZSdfhjw5J1zkczF7Qx8jt28gVHHatbn_jJfXh_KY_zABrlqPQPgSkjY4dmRuVS6jDKXIxpVB5F2jpM4LIm7NafPLWV9jq1ADlPkYMROtIVOprwYmV6sRQc-ZtRm3CzMiCN8MWO0fhTWrmcNDO5yhNk8JijShHmide4FTz2KrORxZO8JtSl5MnwZmxWFWTgI5EmWLqn8XKCOiA0YadGWVq5uEn6C2JNeL46jM6JZpyy0o9mZGOoDlUkogl6A9Abt755pBx-XsicJ5wj3Y4f_fviz-AaIjvtHfWPH8N1TsUp1Fkq2YHGdDzzT-Cq_TYdTsZPq-HJ4ONlY_wnTPR-1A
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Hybrid+Technique+for+Cyber-Physical+Security+in+Cloud-Based+Smart+Industries&rft.jtitle=Sensors+%28Basel%2C+Switzerland%29&rft.au=Garg%2C+Deepak&rft.au=Rani%2C+Shalli&rft.au=Herencsar%2C+Norbert&rft.au=Verma%2C+Sahil&rft.date=2022-06-19&rft.issn=1424-8220&rft.eissn=1424-8220&rft.volume=22&rft.issue=12&rft_id=info:doi/10.3390%2Fs22124630&rft.externalDBID=NO_FULL_TEXT
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1424-8220&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1424-8220&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1424-8220&client=summon