Skip to main content

Advertisement

Log in

An integrated approach of designing functionality with security for distributed cyber-physical systems

  • Published:
The Journal of Supercomputing Aims and scope Submit manuscript

Abstract

In this work, we propose a multi-tier architectural model to separate functionality and security concerns for distributed cyber-physical systems. On the line of distributed computing, such systems require the identification of leaders for distribution of work, aggregation of results, etc. Further, we propose a fault-tolerant leader election algorithm that can independently elect the functionality and security leaders. The proposed election algorithm identifies a list of potential leader capable nodes to reduce the leader election overhead. It keeps identifying the highest potential node as the leader, whenever needed, including the situation when one has failed. We also explain the proposed architecture and its management method through a case study. Further, we perform several experiments to evaluate the system performance. The experimental results show that the proposed architectural model improves the system performance in terms of latency, average response time, and the number of real-time tasks completed within the deadline.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

  1. Albright D, Brannan P, Walrond C (2010) Did Stuxnet take out 1,000 centrifuges at the Natanz enrichment plant? Institute for science and international security

  2. Bai B, Li G, Wang S, Wu Z, Yan W (2021) Time series classification based on multi-feature dictionary representation and ensemble learning. Expert Syst Appl 169:114162

    Article  Google Scholar 

  3. Balta EC, Tilbury DM, Barton K (2018) A centralized framework for system-level control and management of additive manufacturing fleets. In: 2018 IEEE 14th International Conference on Automation Science and Engineering (CASE), IEEE, 1071–1078

  4. Biswas A, Dutta A (2016) A timer based leader election algorithm. In: 2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People, and Smart World Congress (UIC/ATC/ScalCom/CBDCom/IoP/SmartWorld), IEEE, 432–439

  5. Biswas A, Tripathi AK (2021) Preselection based leader election in distributed systems. In: Proceedings. 14th international symposium on intelligent distributed computing, (accepted), Springer

  6. Biswas A, Maurya AK, Tripathi AK, Aknine S (2021) Frlle: a failure rate and load-based leader election algorithm for a bidirectional ring in distributed systems. J Supercomput 77(1):751–779

    Article  Google Scholar 

  7. Biswas A, Tripathi AK, Aknine S (2021b) Lea-tn: leader election algorithm considering node and link failures in a torus network. J Supercomput, 1–38

  8. Bordel B, Alcarria R, de Rivera DS, Robles T (2018) Process execution in cyber-physical systems using cloud and cyber-physical internet services. J Supercomput 74(8):4127–4169

    Article  Google Scholar 

  9. Camacho CR, Marczak S, Cruzes DS (2016) Agile team members perceptions on non-functional testing: influencing factors from an empirical study. In: 2016 11th International Conference on Availability, Reliability and Security (ARES), IEEE, pp 582–589

  10. Castiglione J, Pavlovic D (2019) Dynamic distributed secure storage against ransomware. IEEE Transactions on computational social systems

  11. Ciotti M, Ciccozzi M, Terrinoni A, Jiang WC, Wang CB, Bernardini S (2020) The covid-19 pandemic. Crit Rev Clin Lab Sci 57(6):365–388

    Article  Google Scholar 

  12. Feng Y, Hu B, Hao H, Gao Y, Li Z, Tan J (2018) Design of distributed cyber-physical systems for connected and automated vehicles with implementing methodologies. IEEE Trans Ind Inform 14(9):4200–4211

    Article  Google Scholar 

  13. Garofalo G, Giordano A, Piro P, Spezzano G, Vinci A (2017) A distributed real-time approach for mitigating cso and flooding in urban drainage systems. J Net Computer Appl 78:30–42

    Article  Google Scholar 

  14. Gaur A, Scotney B, Parr G, McClean S (2015) Smart city architecture and its applications based on iot. Procedia Computer Sci 52:1089–1094

    Article  Google Scholar 

  15. Gibbs S (2018) Triton: hackers take out safety systems in’watershed’attack on energy plant. The Guardian

  16. Goodloe AE, Pike L (2010) Monitoring distributed real-time systems: a survey and future directions. National Aeronautics and Space Administration, Langley Research Center

    Google Scholar 

  17. Gouda MG, McGuire TM (1998) Accelerated heartbeat protocols. In: Proceedings. 18th International Conference on Distributed Computing Systems (Cat. No. 98CB36183), IEEE, pp 202–209

  18. Hanusz Z, Tarasińska J (2015) Normalization of the kolmogorov-smirnov and shapiro-wilk tests of normality. Biom Lett 52(2):85–93

    Article  Google Scholar 

  19. Islam MJ, Mahin M, Roy S, Debnath BC, Khatun A (2019) Distblacknet: a distributed secure black sdn-iot architecture with nfv implementation for smart cities. 2019 International Conference on Electrical. Computer and Communication Engineering (ECCE), IEEE, 1–6

  20. Jalali R, El-Khatib K, McGregor C (2015) Smart city architecture for community level services through the internet of things. In: 2015 18th International Conference on Intelligence in Next Generation Networks, IEEE, 108–113

  21. Jiang JR (2018) An improved cyber-physical systems architecture for industry 4.0 smart factories. Adv Mech Eng 10(6):1687814018784192

    Article  Google Scholar 

  22. Kargl F, Klenk A, Schlott S, Weber M (2004) Advanced detection of selfish or malicious nodes in ad hoc networks. In: European workshop on security in Ad-hoc and sensor networks, Springer, 152–165

  23. Keshtkarjahromi Y (2021) Method and system that determine malicious nodes in a distributed computation network. US Patent App. 17/069,077

  24. Kiczales G, Lamping J, Mendhekar A, Maeda C, Lopes C, Loingtier JM, Irwin J (1997) Aspect-oriented programming. In: European Conference on Object-Oriented Programming, Springer, 220–242

  25. Lawal BH, Nuray A (2018) Real-time detection and mitigation of distributed denial of service (ddos) attacks in software defined networking (sdn). In: 2018 26th Signal Processing and Communications Applications Conference (SIU), IEEE, 1–4

  26. Lee J, Bagheri B, Kao HA (2015) A cyber-physical systems architecture for industry 4.0-based manufacturing systems. Manuf Lett 3:18–23

    Article  Google Scholar 

  27. Lee J, Azamfar M, Singh J (2019) A blockchain enabled cyber-physical system architecture for industry 4.0 manufacturing systems. Manuf Lett 20:34–39

    Article  Google Scholar 

  28. Lee JY, Woo JS, Rhee SW (1998) A transformed quantile-quantile plot for normal and bimodal distributions. J Inf Opti Sci 19(3):305–318

    MATH  Google Scholar 

  29. Leitão P, Colombo AW, Karnouskos S (2016) Industrial automation based on cyber-physical systems technologies: prototype implementations and challenges. Comput Ind 81:11–25

    Article  Google Scholar 

  30. Lin CL, Chen JK, Ho HH (2021) Bim for smart hospital management during covid-19 using mcdm. Sustainability 13(11):6181

    Article  Google Scholar 

  31. Liu J, Li Y, Chen M, Dong W, Jin D (2015) Software-defined internet of things for smart urban sensing. IEEE Commun Mag 53(9):55–63

    Article  Google Scholar 

  32. Liu J, Zhang W, Ma T, Tang Z, Xie Y, Gui W, Niyoyita JP (2020) Toward security monitoring of industrial cyber-physical systems via hierarchically distributed intrusion detection. Expert Syst Appl 158:113578

    Article  Google Scholar 

  33. Liu Y, Kuang Y, Xiao Y, Xu G (2017) Sdn-based data transfer security for internet of things. IEEE Internet Things J 5(1):257–268

    Article  Google Scholar 

  34. Maurya AK, Tripathi D, Biswas A, Tripathi AK (2018) Design issues in distributed software. 2018 Fifth International Conference on Parallel. Distributed and grid Computing (PDGC), IEEE, 563–567

  35. Moraitis G, Nikolopoulos D, Bouziotas D, Lykou A, Karavokiros G, Makropoulos C (2020) Quantifying failure for critical water infrastructures under cyber-physical threats. J Environ Eng 146(9):04020108

    Article  Google Scholar 

  36. Mozafari SH, Meyer BH (2016) Efficient performance evaluation of multi-core simt processors with hot redundancy. IEEE Trans Emerg Top Comput 6(4):498–510

    Article  Google Scholar 

  37. Pari SMA, Noormohammadpour M, Salehi MJ, Khalaj BH, Bagheri H, Katz M (2013) A self-organizing approach to malicious detection in leader-based mobile ad-hoc networks. In: 2013 IFIP wireless days (WD), IEEE, 1–3

  38. Parsamehr R, Esfahani A, Mantas G, Radwan A, Mumtaz S, Rodriguez J, Martínez-Ortega JF (2019) A novel intrusion detection and prevention scheme for network coding-enabled mobile small cells. IEEE Trans Comput Soc Syst 6(6):1467–1477

    Article  Google Scholar 

  39. Rahman MU (2019) Leader election in the internet of things: challenges and opportunities. arXiv preprint arXiv:191100759

  40. Rrushi J, Farhangi H, Howey C, Carmichael K, Dabell J (2015) A quantitative evaluation of the target selection of havex ics malware plugin. In: Industrial control system security (ICSS) workshop

  41. Şahin S, Gedik B (2018) C-stream: a co-routine-based elastic stream processing engine. ACM Trans Parallel Comput (TOPC) 4(3):1–27

    Article  Google Scholar 

  42. Satam S, Satam P, Pacheco J, Hariri S (2021) Security framework for smart cyber infrastructure. Cluster Comput, 1–12

  43. Sengan S, Subramaniyaswamy V, Nair SK, Indragandhi V, Manikandan J, Ravi L (2020) Enhancing cyber-physical systems with hybrid smart city cyber security architecture for secure public data-smart network. Future Gener Comput Syst 112:724–737

    Article  Google Scholar 

  44. Singh P, Tripathi AK (2012) Exploring problems and solutions in estimating testing effort for non functional requirement. Int J Comput Technol 3(2b):284–290

    Article  Google Scholar 

  45. Stroustrup B, Shopiro JE (1984) A set of C++ classes for co-routine style programming. AT & T bell laboratories

  46. Tao M, Zuo J, Liu Z, Castiglione A, Palmieri F (2018) Multi-layer cloud architectural model and ontology-based security service framework for iot-based smart homes. Future Gener Comput Syst 78:1040–1051

    Article  Google Scholar 

  47. Tripathi D, Maurya AK, Chaturvedi A, Tripathi AK (2019) A study of security modeling techniques for smart systems. 2019 International Conference on Machine Learning. Big Data, Cloud and Parallel Computing (COMITCon), IEEE, 87–92

  48. Tripathi D, Singh LK, Tripathi AK, Chaturvedi A (2021) Model based security verification of cyber-physical system based on petrinet: a case study of nuclear power plant. Annals Nucl Energy 159:108306

    Article  Google Scholar 

  49. Tripathi D, Tripathi AK, Singh LK, Chaturvedi A (2021b) Towards analyzing the impact of intrusion prevention and response on cyber-physical system availability: a case study of npp. Annals of Nucl Energy p 108863

  50. Vandana C (2016) Security improvement in iot based on software defined networking (sdn). Int J Sci, Eng Technol Res (IJSETR) 5(1):2327–4662

  51. Walker-Roberts S, Hammoudeh M, Aldabbas O, Aydin M, Dehghantanha A (2020) Threats on the horizon: understanding security threats in the era of cyber-physical systems. J Supercomput 76(4):2643–2664

    Article  Google Scholar 

  52. Wu Z, Li R, Zhou Z, Guo J, Jiang J, Su X (2020) A user sensitive subject protection approach for book search service. J Assoc Inf Sci Technol 71(2):183–195

    Article  Google Scholar 

  53. Wu Z, Shen S, Lian X, Su X, Chen E (2020) A dummy-based user privacy protection approach for text information retrieval. Knowl-Based Syst 195:105679

    Article  Google Scholar 

  54. Wu Z, Li G, Shen S, Lian X, Chen E, Xu G (2021) Constructing dummy query sequences to protect location privacy and query privacy in location-based services. World Wide Web 24(1):25–49

    Article  Google Scholar 

  55. Yaacoub JPA, Salman O, Noura HN, Kaaniche N, Chehab A, Malli M (2020) Cyber-physical systems security: limitations, issues and future trends. Microprocess Microsyst 77:103201

    Article  Google Scholar 

  56. Zhang Y, Wang L, Sun W, Green RC II, Alam M (2011) Distributed intrusion detection system in a multi-layer network architecture of smart grids. IEEE Trans Smart Grid 2(4):796–808

    Article  Google Scholar 

  57. Zhu Q, Rieger C, Başar T (2011) A hierarchical security architecture for cyber-physical systems. In: 2011 4th international symposium on resilient control systems, IEEE, 15–20

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Amit Biswas.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Tripathi, D., Biswas, A., Tripathi, A.K. et al. An integrated approach of designing functionality with security for distributed cyber-physical systems. J Supercomput 78, 14813–14845 (2022). https://doi.org/10.1007/s11227-022-04481-9

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11227-022-04481-9

Keywords