Abstract
In recent years, the Cyber-Physical System (CPS) is ubiquitous and the core of modern critical infrastructure and industrial applications. Moreover, CPS is used for securing digital transactions and records with a high confidentiality rate. The main issues in CPS are harmful, malicious attacks it will break the application security. This paper proposed a novel Elapid Crypto (EC) mechanism for securing CPS from malicious activity. Furthermore, a mapped interface is created in the CPU to access the instruction set of the developed technique. Also, design an elapid core accelerator in the Instruction set for separating data and providing security using private keys. It will convert the plain text into Ciphertext during Encryption. Thus the developed technique is implemented in MATLAB, and the developed EC mechanism encrypts plain text into ciphertext. Additionally, the achieved performance metrics of the proposed EC mechanism are compared with other techniques in terms of execution time, energy, power, number of cycles, and latency.
Similar content being viewed by others
Data availability
Data sharing not applicable to this article as no datasets were generated or analysed during the current study.
References
Abbas H, Suguri H, Yan Z, Allen W, Hei XS (2020) IEEE Access Special Section: Security Analytics and Intelligence for Cyber Physical Systems. IEEE Access 8:208195–208198. https://doi.org/10.1109/ACCESS.2020.3036713
Ashibani Y, Mahmoud QH (2017) Cyber physical systems security: Analysis, challenges and solutions. Comput Secur 68:81–97. https://doi.org/10.1016/j.cose.2017.04.005
Barkalov A, Titarenko L, Mazurkiewicz M (2019) Foundations of embedded systems. Springer International Publishing, Cham, Switzerland, Vol. 195. https://doi.org/10.1007/978-3-030-11961-4
Bodkhe U, Mehta D, Tanwar S et al (2020) A survey on decentralized consensus mechanisms for cyber physical systems. IEEE Access 8:54371–54401. https://doi.org/10.1109/ACCESS.2020.2981415
Choi Y, Sim J, Kim LS (2020) CREMON: Cryptography Embedded on the Convolutional Neural Network Accelerator. IEEE Trans Circuits Syst II Express Briefs 67(12):3337–3341. https://doi.org/10.1109/TCSII.2020.2971580
Choudhary G, Astillo PV, You I et al (2020) Lightweight misbehavior detection management of embedded IoT devices in medical cyber physical systems. IEEE Trans Netw Serv Manag 17(4):2496–2510. https://doi.org/10.1109/TNSM.2020.3007535
Feng W, Qin Y, Zhao S, Feng D (2018) AAoT: Lightweight attestation and authentication of low-resource things in IoT and CPS. Comput Netw 134:167–182. https://doi.org/10.1016/j.comnet.2018.01.039
Huang J, Kong L, Dai HN, Ding W et al (2020) Blockchain-based mobile crowdsensing in industrial systems. IEEE Trans Industr Inform 16(10):6553–6563. https://doi.org/10.1109/TII.2019.2963728
Hussien HM, Yasin SM, Udzir SNI et al (2019) A systematic review for enabling of develop a blockchain technology in healthcare application: taxonomy, substantially analysis, motivations, challenges, recommendations and future direction. J Med Syst 43(10):1–35. https://doi.org/10.1007/s10916-019-1445-8
Janakiraman S, Thenmozhi K, Rayappan JBB et al (2018) Lightweight chaotic image encryption algorithm for real-time embedded system: Implementation and analysis on 32-bit microcontroller. Microprocess Microsyst 56:1–12. https://doi.org/10.1016/j.micpro.2017.10.013
Jiang W, Wen L, Zhan J, Jiang K (2020) Design optimization of confidentiality-critical cyber physical systems with fault detection. J Syst Archit 107:101739. https://doi.org/10.1016/j.sysarc.2020.101739
Jin X, Jing P, Wu J, Xu J, Su Y (2021) Visual Sentiment Classification via Low-rank Regularization and Label Relaxation. IEEE Trans Cogn Dev Syst. https://doi.org/10.1109/TCDS.2021.3135948
Jin X, He Z, Xu J, Wang Y, Su Y (2022) Video splicing detection and localization based on multi-level deep feature fusion and reinforcement learning. Multimed Tools Appl 81:40993–41011. https://doi.org/10.1007/s11042-022-13001-z
Jin X, Yi K, Xu J (2022) MoADNet: Mobile Asymmetric Dual-Stream Networks for Real-Time and Lightweight RGB-D Salient Object Detection. IEEE Trans Circuits Syst Video Technol 32(11):7632–7645. https://doi.org/10.1109/TCSVT.2022.3180274
Jin X, He Z, Wang Y, Yu J, Xu J (2022) Towards general object-based video forgery detection via dual-stream networks and depth information embedding. Multimed Tools Appl 81(25):35733–35749. https://doi.org/10.1007/s11042-021-11126-1
Jin X, Guo C, He Z, Xu J, Wang Y, Su Y (2022) FCMNet: Frequency-aware cross-modality attention networks for RGB-D salient object detection. Neurocomputing 491:414–425. https://doi.org/10.1016/j.neucom.2022.04.015
Ko D, Lee S, Park J (2020) A study on manufacturing facility safety system using multimedia tools for cyber physical systems. Multimed Tools Appl. https://doi.org/10.1007/s11042-020-09925-z
Kumar AR, Sivagami A (2020) Fuzzy based malicious node detection and security-aware multipath routing for wireless multimedia sensor network. Multimed Tools Appl 79:14031–14051. https://doi.org/10.1007/s11042-020-08631-0
Li X, Shen GQ, Wu P, Xue F, Chi H, Li CZ (2019) Developing a conceptual framework of smart work packaging for constraints management in prefabrication housing production. Adv Eng Inform 42:100938. https://doi.org/10.1016/j.aei.2019.100938
Liang W, Long J, Weng TH et al (2019) TBRS: A trust based recommendation scheme for vehicular CPS network. Future Gener Comput Syst 92:383–398. https://doi.org/10.1016/j.future.2018.09.002
Lingfeng Q, hongjie H, fan C (2020) Security analysis of multiple permutation encryption adopt in reversible data hiding. Multimed Tools Appl 79:29451–29471. https://doi.org/10.1007/s11042-020-09379-3
Mahdavifar S, Ghorbani AA (2020) DeNNeS: deep embedded neural network expert system for detecting cyber attacks. Neural Comput Appl 32(18):14753–14780. https://doi.org/10.1007/s00521-020-04830-w
Nambiar VP, Khalil-Hani M, Zabidi MM (2009) Accelerating the AES encryption function in OpenSSL for embedded systems. Int J Inf Commun Technol 2(1–2):83–93. https://doi.org/10.1504/IJICT.2009.026432
Niu X, Yuan X, Zhou Y, Fan H (2020) UAV track planning based on evolution algorithm in embedded system. Microprocess Microsyst 75:103068. https://doi.org/10.1016/j.micpro.2020.103068
Ordinez L, Eggly G, Micheletto M et al (2020) Using UML for learning how to design and model cyber-physical systems. IEEE Revista Iberoamericana de Tecnologias del Aprendizaje 15(1):50–60. https://doi.org/10.1109/RITA.2020.2978416
Palumbo F, Fanni T, Sau C et al (2019) Hardware/software self-adaptation in CPS: the CERBERO project approach. Int Conf Embed Comput Syst Springer, Cham. https://doi.org/10.1007/978-3-030-27562-4_30
Poudel B, Munir A (2018) Design and evaluation of a reconfigurable ecu architecture for secure and dependable automotive cps. IEEE Trans Depend Secure Comput 18(1):235–252. https://doi.org/10.1109/TDSC.2018.2883057
Sharma D, Selwal A (2021) An intelligent approach for fingerprint presentation attack detection using ensemble learning with improved local image features. Multimed Tools Appl. https://doi.org/10.1007/s11042-021-11254-8
Ulas D (2019) Digital transformation process and SMEs. Procedia Comput Sci 158:662–671. https://doi.org/10.1016/j.procs.2019.09.101
Acknowledgements
None
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Ethical Approval
All applicable institutional and/or national guidelines for the care and use of animals were followed.
Informed Consent
For this type of study formal consent is not required.
Conflict of Interest
The authors declare that they have no potential conflict of interest.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Chaitanya, S.M.K., Choppakatla, N. A novel embedded system for cyber-physical system using crypto mechanism. Multimed Tools Appl 82, 40085–40103 (2023). https://doi.org/10.1007/s11042-023-15172-9
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-023-15172-9