Skip to main content
Log in

A novel embedded system for cyber-physical system using crypto mechanism

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

In recent years, the Cyber-Physical System (CPS) is ubiquitous and the core of modern critical infrastructure and industrial applications. Moreover, CPS is used for securing digital transactions and records with a high confidentiality rate. The main issues in CPS are harmful, malicious attacks it will break the application security. This paper proposed a novel Elapid Crypto (EC) mechanism for securing CPS from malicious activity. Furthermore, a mapped interface is created in the CPU to access the instruction set of the developed technique. Also, design an elapid core accelerator in the Instruction set for separating data and providing security using private keys. It will convert the plain text into Ciphertext during Encryption. Thus the developed technique is implemented in MATLAB, and the developed EC mechanism encrypts plain text into ciphertext. Additionally, the achieved performance metrics of the proposed EC mechanism are compared with other techniques in terms of execution time, energy, power, number of cycles, and latency.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14

Similar content being viewed by others

Data availability

Data sharing not applicable to this article as no datasets were generated or analysed during the current study.

References

  1. Abbas H, Suguri H, Yan Z, Allen W, Hei XS (2020) IEEE Access Special Section: Security Analytics and Intelligence for Cyber Physical Systems. IEEE Access 8:208195–208198. https://doi.org/10.1109/ACCESS.2020.3036713

    Article  Google Scholar 

  2. Ashibani Y, Mahmoud QH (2017) Cyber physical systems security: Analysis, challenges and solutions. Comput Secur 68:81–97. https://doi.org/10.1016/j.cose.2017.04.005

    Article  Google Scholar 

  3. Barkalov A, Titarenko L, Mazurkiewicz M (2019) Foundations of embedded systems. Springer International Publishing, Cham, Switzerland, Vol. 195. https://doi.org/10.1007/978-3-030-11961-4

  4. Bodkhe U, Mehta D, Tanwar S et al (2020) A survey on decentralized consensus mechanisms for cyber physical systems. IEEE Access 8:54371–54401. https://doi.org/10.1109/ACCESS.2020.2981415

    Article  Google Scholar 

  5. Choi Y, Sim J, Kim LS (2020) CREMON: Cryptography Embedded on the Convolutional Neural Network Accelerator. IEEE Trans Circuits Syst II Express Briefs 67(12):3337–3341. https://doi.org/10.1109/TCSII.2020.2971580

    Article  Google Scholar 

  6. Choudhary G, Astillo PV, You I et al (2020) Lightweight misbehavior detection management of embedded IoT devices in medical cyber physical systems. IEEE Trans Netw Serv Manag 17(4):2496–2510. https://doi.org/10.1109/TNSM.2020.3007535

    Article  Google Scholar 

  7. Feng W, Qin Y, Zhao S, Feng D (2018) AAoT: Lightweight attestation and authentication of low-resource things in IoT and CPS. Comput Netw 134:167–182. https://doi.org/10.1016/j.comnet.2018.01.039

    Article  Google Scholar 

  8. Huang J, Kong L, Dai HN, Ding W et al (2020) Blockchain-based mobile crowdsensing in industrial systems. IEEE Trans Industr Inform 16(10):6553–6563. https://doi.org/10.1109/TII.2019.2963728

    Article  Google Scholar 

  9. Hussien HM, Yasin SM, Udzir SNI et al (2019) A systematic review for enabling of develop a blockchain technology in healthcare application: taxonomy, substantially analysis, motivations, challenges, recommendations and future direction. J Med Syst 43(10):1–35. https://doi.org/10.1007/s10916-019-1445-8

    Article  Google Scholar 

  10. Janakiraman S, Thenmozhi K, Rayappan JBB et al (2018) Lightweight chaotic image encryption algorithm for real-time embedded system: Implementation and analysis on 32-bit microcontroller. Microprocess Microsyst 56:1–12. https://doi.org/10.1016/j.micpro.2017.10.013

    Article  Google Scholar 

  11. Jiang W, Wen L, Zhan J, Jiang K (2020) Design optimization of confidentiality-critical cyber physical systems with fault detection. J Syst Archit 107:101739. https://doi.org/10.1016/j.sysarc.2020.101739

    Article  Google Scholar 

  12. Jin X, Jing P, Wu J, Xu J, Su Y (2021) Visual Sentiment Classification via Low-rank Regularization and Label Relaxation. IEEE Trans Cogn Dev Syst. https://doi.org/10.1109/TCDS.2021.3135948

    Article  Google Scholar 

  13. Jin X, He Z, Xu J, Wang Y, Su Y (2022) Video splicing detection and localization based on multi-level deep feature fusion and reinforcement learning. Multimed Tools Appl 81:40993–41011. https://doi.org/10.1007/s11042-022-13001-z

    Article  Google Scholar 

  14. Jin X, Yi K, Xu J (2022) MoADNet: Mobile Asymmetric Dual-Stream Networks for Real-Time and Lightweight RGB-D Salient Object Detection. IEEE Trans Circuits Syst Video Technol 32(11):7632–7645. https://doi.org/10.1109/TCSVT.2022.3180274

    Article  Google Scholar 

  15. Jin X, He Z, Wang Y, Yu J, Xu J (2022) Towards general object-based video forgery detection via dual-stream networks and depth information embedding. Multimed Tools Appl 81(25):35733–35749. https://doi.org/10.1007/s11042-021-11126-1

    Article  Google Scholar 

  16. Jin X, Guo C, He Z, Xu J, Wang Y, Su Y (2022) FCMNet: Frequency-aware cross-modality attention networks for RGB-D salient object detection. Neurocomputing 491:414–425. https://doi.org/10.1016/j.neucom.2022.04.015

    Article  Google Scholar 

  17. Ko D, Lee S, Park J (2020) A study on manufacturing facility safety system using multimedia tools for cyber physical systems. Multimed Tools Appl. https://doi.org/10.1007/s11042-020-09925-z

    Article  Google Scholar 

  18. Kumar AR, Sivagami A (2020) Fuzzy based malicious node detection and security-aware multipath routing for wireless multimedia sensor network. Multimed Tools Appl 79:14031–14051. https://doi.org/10.1007/s11042-020-08631-0

    Article  Google Scholar 

  19. Li X, Shen GQ, Wu P, Xue F, Chi H, Li CZ (2019) Developing a conceptual framework of smart work packaging for constraints management in prefabrication housing production. Adv Eng Inform 42:100938. https://doi.org/10.1016/j.aei.2019.100938

    Article  Google Scholar 

  20. Liang W, Long J, Weng TH et al (2019) TBRS: A trust based recommendation scheme for vehicular CPS network. Future Gener Comput Syst 92:383–398. https://doi.org/10.1016/j.future.2018.09.002

    Article  Google Scholar 

  21. Lingfeng Q, hongjie H, fan C (2020) Security analysis of multiple permutation encryption adopt in reversible data hiding. Multimed Tools Appl 79:29451–29471. https://doi.org/10.1007/s11042-020-09379-3

    Article  Google Scholar 

  22. Mahdavifar S, Ghorbani AA (2020) DeNNeS: deep embedded neural network expert system for detecting cyber attacks. Neural Comput Appl 32(18):14753–14780. https://doi.org/10.1007/s00521-020-04830-w

    Article  Google Scholar 

  23. Nambiar VP, Khalil-Hani M, Zabidi MM (2009) Accelerating the AES encryption function in OpenSSL for embedded systems. Int J Inf Commun Technol 2(1–2):83–93. https://doi.org/10.1504/IJICT.2009.026432

    Article  MATH  Google Scholar 

  24. Niu X, Yuan X, Zhou Y, Fan H (2020) UAV track planning based on evolution algorithm in embedded system. Microprocess Microsyst 75:103068. https://doi.org/10.1016/j.micpro.2020.103068

    Article  Google Scholar 

  25. Ordinez L, Eggly G, Micheletto M et al (2020) Using UML for learning how to design and model cyber-physical systems. IEEE Revista Iberoamericana de Tecnologias del Aprendizaje 15(1):50–60. https://doi.org/10.1109/RITA.2020.2978416

    Article  Google Scholar 

  26. Palumbo F, Fanni T, Sau C et al (2019) Hardware/software self-adaptation in CPS: the CERBERO project approach. Int Conf Embed Comput Syst Springer, Cham. https://doi.org/10.1007/978-3-030-27562-4_30

    Article  Google Scholar 

  27. Poudel B, Munir A (2018) Design and evaluation of a reconfigurable ecu architecture for secure and dependable automotive cps. IEEE Trans Depend Secure Comput 18(1):235–252. https://doi.org/10.1109/TDSC.2018.2883057

    Article  Google Scholar 

  28. Sharma D, Selwal A (2021) An intelligent approach for fingerprint presentation attack detection using ensemble learning with improved local image features. Multimed Tools Appl. https://doi.org/10.1007/s11042-021-11254-8

    Article  Google Scholar 

  29. Ulas D (2019) Digital transformation process and SMEs. Procedia Comput Sci 158:662–671. https://doi.org/10.1016/j.procs.2019.09.101

    Article  Google Scholar 

Download references

Acknowledgements

None

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to S. M. K. Chaitanya.

Ethics declarations

Ethical Approval

All applicable institutional and/or national guidelines for the care and use of animals were followed.

Informed Consent

For this type of study formal consent is not required.

Conflict of Interest

The authors declare that they have no potential conflict of interest. 

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Chaitanya, S.M.K., Choppakatla, N. A novel embedded system for cyber-physical system using crypto mechanism. Multimed Tools Appl 82, 40085–40103 (2023). https://doi.org/10.1007/s11042-023-15172-9

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-023-15172-9

Keywords

Navigation