Affiliation:
1. Vellalar College for Women, India
2. Sri Vasavi College, India
Abstract
Technological advancement in the recent decades enhanced the calibre of human life. Contemporary research in machine learning (ML) exhibits a mock-up to make decisions on its own and is applied in various fields including medical diagnosis, email filtering, banking, computer vision, financial marketing, image processing, cyber security. The systems inter-connected across the world via internet are attacked by hackers, and it is prevented by cyber security. The optimum solution for cyber-attacks is attained by collaborating ML techniques with cyber security and envisioned issues are designed by cyber machine learning models. In this chapter, an algorithm is proposed to defend data by encoding the text to an unintelligent text and decoding it to original text by applying graph labelling in cryptography. Symmetric key is designed based on the edge label of an odd-even congruence graph to achieve secured communication in CPS. In addition, a program is suggested using Python programming to attain cipher text and its converse.
Reference40 articles.
1. Anand, M. (2006). Security challenges in next generation cyber physical systems. Beyond SCADA: Networked Embedded Control for Cyber Physical Systems.
2. Ashibani & Mahmoud. (2017). Cyber physical systems security: Analysis, challenges and solutions. In Computers & Security. Elsevier.
3. Ayushi. (2010). A Symmetric Key Cryptographic Algorithm. International Journal of Computer Applications.
4. Graph Theory
5. Cardenas, A. (2009). Challenges for securing cyber physical systems. Workshop Future Directions Cyber-Physical Syst. Secur.