skip to main content
10.1145/3302509.3311051acmconferencesArticle/Chapter ViewAbstractPublication PagesiccpsConference Proceedingsconference-collections
research-article
Open Access

Managing the security-energy tradeoff in distributed cyber-physical systems

Published:16 April 2019Publication History

ABSTRACT

In this paper, we propose a technique that attempts to control energy consumption in distributed cyber-physical systems (CPS) in order to improve the level of security of the system. This is in contrast to most existing methods, where the system is set to use a certain level of authentication at design time, such as basic authentication, certificate-based authentication, or no authentication at all. To this end, we propose a notion of authenticatable task graph, which encodes standard task dependencies and allows for authentication tasks to be intermittently inserted into the computation task graph. The optimization objective here is to maximize the number of authentication tasks as well as peer-authentication, while remaining in the system energy bounds. We propose three offline optimization techniques and one online algorithm, where the system can dynamically manage the tradeoff between energy consumption and the level of security in the presence of uncertainties imposed by the physical environment. Our optimization algorithms are validated by a rich set of simulations as well as a real-world case study on a group of unmanned aerial vehicles (UAVs) that are assigned area search tasks and are required to perform peer-authentication within their battery limits.

References

  1. Alvaro Cardenas, Saurabh Amin, Bruno Sinopoli, Annarita Giani, Adrian Perrig, Shankar Sastry, et al. 2009. Challenges for securing cyber physical systems. In Workshop on future directions in cyber-physical systems security, Vol. 5.Google ScholarGoogle Scholar
  2. Thomas H Cormen, Charles E Leiserson, Ronald L Rivest, and Clifford Stein. 2009. Introduction to algorithms. MIT press. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. R Escherich, I Ledendecker, C Schmal, B Kuhls, C Grothe, and F Scharberth. 2009. SHE: Secure Hardware Extension-Functional Specification, Version 1.1. Hersteller-Initiative Software (HIS) AK Security (2009).Google ScholarGoogle Scholar
  4. Igor Nai Fovino, Andrea Carcano, Marcelo Masera, and Alberto Trombetta. 2009. Design and implementation of a secure modbus protocol. In International conference on critical infrastructure protection. Springer, 83--96.Google ScholarGoogle ScholarCross RefCross Ref
  5. Abdulmalik Humayed, Jingqiang Lin, Fengjun Li, and Bo Luo. 2017. Cyber-physical systems security - A survey. IEEE Internet of Things Journal 4, 6 (2017), 1802--1831.Google ScholarGoogle ScholarCross RefCross Ref
  6. Arthur B Kahn. 1962. Topological sorting of large networks. Commun. ACM 5, 11 (1962), 558--562. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Vuk Lesi, Ilija Jovanov, and Miroslav Pajic. 2017. Security-Aware Scheduling of Embedded Control Tasks. ACM Trans. Embed. Comput. Syst. 16, 5s, Article 188 (Sept. 2017), 21 pages. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Robert Mitchell and Ing-Ray Chen. 2014. A survey of intrusion detection techniques for cyber-physical systems. ACM Computing Surveys (CSUR) 46, 4 (2014), 55. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Michael Rushanan, Aviel D Rubin, Denis Foo Kune, and Colleen M Swanson. 2014. Sok: Security and privacy in implantable medical devices and body area networks. In 2014 IEEE Symposium on Security and Privacy (SP). IEEE, 524--539. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Lui Sha, Sathish Gopalakrishnan, Xue Liu, and Qixin Wang. 2008. Cyber-physical systems: A new frontier. In Sensor Networks, Ubiquitous and Trustworthy Computing, 2008. SUTC'08. IEEE International Conference on. IEEE, 1--9. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Marko Wolf and Timo Gendrullis. 2011. Design, implementation, and evaluation of a vehicular hardware security module. In International Conference on Information Security and Cryptology. Springer, 302--318. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Feng Xia, Longhua Ma, Jinxiang Dong, and Youxian Sun. 2008. Network QoS management in cyber-physical systems. In Embedded Software and Systems Symposia, 2008. ICESS Symposia'08. International Conference on. IEEE, 302--307. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Managing the security-energy tradeoff in distributed cyber-physical systems

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          ICCPS '19: Proceedings of the 10th ACM/IEEE International Conference on Cyber-Physical Systems
          April 2019
          367 pages
          ISBN:9781450362856
          DOI:10.1145/3302509

          Copyright © 2019 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 16 April 2019

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article

          Acceptance Rates

          Overall Acceptance Rate25of91submissions,27%

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader