ABSTRACT
In this paper, we propose a technique that attempts to control energy consumption in distributed cyber-physical systems (CPS) in order to improve the level of security of the system. This is in contrast to most existing methods, where the system is set to use a certain level of authentication at design time, such as basic authentication, certificate-based authentication, or no authentication at all. To this end, we propose a notion of authenticatable task graph, which encodes standard task dependencies and allows for authentication tasks to be intermittently inserted into the computation task graph. The optimization objective here is to maximize the number of authentication tasks as well as peer-authentication, while remaining in the system energy bounds. We propose three offline optimization techniques and one online algorithm, where the system can dynamically manage the tradeoff between energy consumption and the level of security in the presence of uncertainties imposed by the physical environment. Our optimization algorithms are validated by a rich set of simulations as well as a real-world case study on a group of unmanned aerial vehicles (UAVs) that are assigned area search tasks and are required to perform peer-authentication within their battery limits.
- Alvaro Cardenas, Saurabh Amin, Bruno Sinopoli, Annarita Giani, Adrian Perrig, Shankar Sastry, et al. 2009. Challenges for securing cyber physical systems. In Workshop on future directions in cyber-physical systems security, Vol. 5.Google Scholar
- Thomas H Cormen, Charles E Leiserson, Ronald L Rivest, and Clifford Stein. 2009. Introduction to algorithms. MIT press. Google ScholarDigital Library
- R Escherich, I Ledendecker, C Schmal, B Kuhls, C Grothe, and F Scharberth. 2009. SHE: Secure Hardware Extension-Functional Specification, Version 1.1. Hersteller-Initiative Software (HIS) AK Security (2009).Google Scholar
- Igor Nai Fovino, Andrea Carcano, Marcelo Masera, and Alberto Trombetta. 2009. Design and implementation of a secure modbus protocol. In International conference on critical infrastructure protection. Springer, 83--96.Google ScholarCross Ref
- Abdulmalik Humayed, Jingqiang Lin, Fengjun Li, and Bo Luo. 2017. Cyber-physical systems security - A survey. IEEE Internet of Things Journal 4, 6 (2017), 1802--1831.Google ScholarCross Ref
- Arthur B Kahn. 1962. Topological sorting of large networks. Commun. ACM 5, 11 (1962), 558--562. Google ScholarDigital Library
- Vuk Lesi, Ilija Jovanov, and Miroslav Pajic. 2017. Security-Aware Scheduling of Embedded Control Tasks. ACM Trans. Embed. Comput. Syst. 16, 5s, Article 188 (Sept. 2017), 21 pages. Google ScholarDigital Library
- Robert Mitchell and Ing-Ray Chen. 2014. A survey of intrusion detection techniques for cyber-physical systems. ACM Computing Surveys (CSUR) 46, 4 (2014), 55. Google ScholarDigital Library
- Michael Rushanan, Aviel D Rubin, Denis Foo Kune, and Colleen M Swanson. 2014. Sok: Security and privacy in implantable medical devices and body area networks. In 2014 IEEE Symposium on Security and Privacy (SP). IEEE, 524--539. Google ScholarDigital Library
- Lui Sha, Sathish Gopalakrishnan, Xue Liu, and Qixin Wang. 2008. Cyber-physical systems: A new frontier. In Sensor Networks, Ubiquitous and Trustworthy Computing, 2008. SUTC'08. IEEE International Conference on. IEEE, 1--9. Google ScholarDigital Library
- Marko Wolf and Timo Gendrullis. 2011. Design, implementation, and evaluation of a vehicular hardware security module. In International Conference on Information Security and Cryptology. Springer, 302--318. Google ScholarDigital Library
- Feng Xia, Longhua Ma, Jinxiang Dong, and Youxian Sun. 2008. Network QoS management in cyber-physical systems. In Embedded Software and Systems Symposia, 2008. ICESS Symposia'08. International Conference on. IEEE, 302--307. Google ScholarDigital Library
Index Terms
- Managing the security-energy tradeoff in distributed cyber-physical systems
Recommendations
Energy-aware environments for the development of green applications for cyber–physical systems
AbstractCyber–physical Systems are usually composed by a myriad of battery-powered devices. Therefore, developers should pay attention to the energy consumption of the global system so as not to compromise the system lifetime. ...
Highlights- Energy is a critical resource in Cyber Physical System devices.
- We provide a ...
A Certificateless Signature Scheme for Mobile Wireless Cyber-Physical Systems
ICDCSW '08: Proceedings of the 2008 The 28th International Conference on Distributed Computing Systems WorkshopsDue to the unique characteristics of Cyber-Physical Systems (CPS) such as interaction with the physical world, many new research challenges arise. Many CPS applications will be implemented on computing devices using mobile ad hoc networks (MANETs). ...
The security of a strong proxy signature scheme with proxy signer privacy protection
In 1996, Mambo et al. first introduced the concept of a proxy signature scheme, and discussed the delegation of the signing capability to a proxy signer. In 2001, Lee et al. constructed a strong non-designated proxy signature scheme. In 2002, Shum and ...
Comments