We can see in Fig. 1, that the embedded computing interacts with their physical environment which can early predict the health problem, secure the sensitive data and enable the uninterrupted operation.Here the paper defines [2], in Figure 1, the computing unit characterizes the quantitative property set C and it is time-varying. Similarly, the physical unit in CPS characterizes the physical property set P and it varies over time and space. For instance, in members of C it includes server utilization, the duty-cycle and control- algorithm during communication. Physical properties which include physiological and environmental signals such as temperature, humidity, and amount of sunlight. The interaction parameter associated with both the computing and …show more content…
The temperature may vary from place to place in DC and hence the mapping of physical properties H: P × t × {x, y, z} → I, where {x, y, z} represents a point in the coordinate space. Mapping in G can be determined by the result of the algorithm whereas mapping in H determined by the physical process or through signal processing. The traditional goals of integrity, availability and confidentiality are interpreted for CPS. The lack of integrity leads to deception where the authorized user receives false data and accepts that as true. When the system results in DoS, it refers to the lack of availability and not compromise their services [3].Let y indicate the sensor measurement and u the control command sent to the actuator. The controller divides into two components: estimation algorithm which tracks the physical state and control algorithm which deals with the given current estimate. According to Figure 2, A1 and A3 are deception attacks where it sends false data which includes incorrect time, incorrect measurement or incorrect sender id. The adversary can send the data through a secret key or by compromising