Abstract
In this work, we propose a multi-tier architectural model to separate functionality and security concerns for distributed cyber-physical systems. On the line of distributed computing, such systems require the identification of leaders for distribution of work, aggregation of results, etc. Further, we propose a fault-tolerant leader election algorithm that can independently elect the functionality and security leaders. The proposed election algorithm identifies a list of potential leader capable nodes to reduce the leader election overhead. It keeps identifying the highest potential node as the leader, whenever needed, including the situation when one has failed. We also explain the proposed architecture and its management method through a case study. Further, we perform several experiments to evaluate the system performance. The experimental results show that the proposed architectural model improves the system performance in terms of latency, average response time, and the number of real-time tasks completed within the deadline.










Similar content being viewed by others
References
Albright D, Brannan P, Walrond C (2010) Did Stuxnet take out 1,000 centrifuges at the Natanz enrichment plant? Institute for science and international security
Bai B, Li G, Wang S, Wu Z, Yan W (2021) Time series classification based on multi-feature dictionary representation and ensemble learning. Expert Syst Appl 169:114162
Balta EC, Tilbury DM, Barton K (2018) A centralized framework for system-level control and management of additive manufacturing fleets. In: 2018 IEEE 14th International Conference on Automation Science and Engineering (CASE), IEEE, 1071–1078
Biswas A, Dutta A (2016) A timer based leader election algorithm. In: 2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People, and Smart World Congress (UIC/ATC/ScalCom/CBDCom/IoP/SmartWorld), IEEE, 432–439
Biswas A, Tripathi AK (2021) Preselection based leader election in distributed systems. In: Proceedings. 14th international symposium on intelligent distributed computing, (accepted), Springer
Biswas A, Maurya AK, Tripathi AK, Aknine S (2021) Frlle: a failure rate and load-based leader election algorithm for a bidirectional ring in distributed systems. J Supercomput 77(1):751–779
Biswas A, Tripathi AK, Aknine S (2021b) Lea-tn: leader election algorithm considering node and link failures in a torus network. J Supercomput, 1–38
Bordel B, Alcarria R, de Rivera DS, Robles T (2018) Process execution in cyber-physical systems using cloud and cyber-physical internet services. J Supercomput 74(8):4127–4169
Camacho CR, Marczak S, Cruzes DS (2016) Agile team members perceptions on non-functional testing: influencing factors from an empirical study. In: 2016 11th International Conference on Availability, Reliability and Security (ARES), IEEE, pp 582–589
Castiglione J, Pavlovic D (2019) Dynamic distributed secure storage against ransomware. IEEE Transactions on computational social systems
Ciotti M, Ciccozzi M, Terrinoni A, Jiang WC, Wang CB, Bernardini S (2020) The covid-19 pandemic. Crit Rev Clin Lab Sci 57(6):365–388
Feng Y, Hu B, Hao H, Gao Y, Li Z, Tan J (2018) Design of distributed cyber-physical systems for connected and automated vehicles with implementing methodologies. IEEE Trans Ind Inform 14(9):4200–4211
Garofalo G, Giordano A, Piro P, Spezzano G, Vinci A (2017) A distributed real-time approach for mitigating cso and flooding in urban drainage systems. J Net Computer Appl 78:30–42
Gaur A, Scotney B, Parr G, McClean S (2015) Smart city architecture and its applications based on iot. Procedia Computer Sci 52:1089–1094
Gibbs S (2018) Triton: hackers take out safety systems in’watershed’attack on energy plant. The Guardian
Goodloe AE, Pike L (2010) Monitoring distributed real-time systems: a survey and future directions. National Aeronautics and Space Administration, Langley Research Center
Gouda MG, McGuire TM (1998) Accelerated heartbeat protocols. In: Proceedings. 18th International Conference on Distributed Computing Systems (Cat. No. 98CB36183), IEEE, pp 202–209
Hanusz Z, Tarasińska J (2015) Normalization of the kolmogorov-smirnov and shapiro-wilk tests of normality. Biom Lett 52(2):85–93
Islam MJ, Mahin M, Roy S, Debnath BC, Khatun A (2019) Distblacknet: a distributed secure black sdn-iot architecture with nfv implementation for smart cities. 2019 International Conference on Electrical. Computer and Communication Engineering (ECCE), IEEE, 1–6
Jalali R, El-Khatib K, McGregor C (2015) Smart city architecture for community level services through the internet of things. In: 2015 18th International Conference on Intelligence in Next Generation Networks, IEEE, 108–113
Jiang JR (2018) An improved cyber-physical systems architecture for industry 4.0 smart factories. Adv Mech Eng 10(6):1687814018784192
Kargl F, Klenk A, Schlott S, Weber M (2004) Advanced detection of selfish or malicious nodes in ad hoc networks. In: European workshop on security in Ad-hoc and sensor networks, Springer, 152–165
Keshtkarjahromi Y (2021) Method and system that determine malicious nodes in a distributed computation network. US Patent App. 17/069,077
Kiczales G, Lamping J, Mendhekar A, Maeda C, Lopes C, Loingtier JM, Irwin J (1997) Aspect-oriented programming. In: European Conference on Object-Oriented Programming, Springer, 220–242
Lawal BH, Nuray A (2018) Real-time detection and mitigation of distributed denial of service (ddos) attacks in software defined networking (sdn). In: 2018 26th Signal Processing and Communications Applications Conference (SIU), IEEE, 1–4
Lee J, Bagheri B, Kao HA (2015) A cyber-physical systems architecture for industry 4.0-based manufacturing systems. Manuf Lett 3:18–23
Lee J, Azamfar M, Singh J (2019) A blockchain enabled cyber-physical system architecture for industry 4.0 manufacturing systems. Manuf Lett 20:34–39
Lee JY, Woo JS, Rhee SW (1998) A transformed quantile-quantile plot for normal and bimodal distributions. J Inf Opti Sci 19(3):305–318
Leitão P, Colombo AW, Karnouskos S (2016) Industrial automation based on cyber-physical systems technologies: prototype implementations and challenges. Comput Ind 81:11–25
Lin CL, Chen JK, Ho HH (2021) Bim for smart hospital management during covid-19 using mcdm. Sustainability 13(11):6181
Liu J, Li Y, Chen M, Dong W, Jin D (2015) Software-defined internet of things for smart urban sensing. IEEE Commun Mag 53(9):55–63
Liu J, Zhang W, Ma T, Tang Z, Xie Y, Gui W, Niyoyita JP (2020) Toward security monitoring of industrial cyber-physical systems via hierarchically distributed intrusion detection. Expert Syst Appl 158:113578
Liu Y, Kuang Y, Xiao Y, Xu G (2017) Sdn-based data transfer security for internet of things. IEEE Internet Things J 5(1):257–268
Maurya AK, Tripathi D, Biswas A, Tripathi AK (2018) Design issues in distributed software. 2018 Fifth International Conference on Parallel. Distributed and grid Computing (PDGC), IEEE, 563–567
Moraitis G, Nikolopoulos D, Bouziotas D, Lykou A, Karavokiros G, Makropoulos C (2020) Quantifying failure for critical water infrastructures under cyber-physical threats. J Environ Eng 146(9):04020108
Mozafari SH, Meyer BH (2016) Efficient performance evaluation of multi-core simt processors with hot redundancy. IEEE Trans Emerg Top Comput 6(4):498–510
Pari SMA, Noormohammadpour M, Salehi MJ, Khalaj BH, Bagheri H, Katz M (2013) A self-organizing approach to malicious detection in leader-based mobile ad-hoc networks. In: 2013 IFIP wireless days (WD), IEEE, 1–3
Parsamehr R, Esfahani A, Mantas G, Radwan A, Mumtaz S, Rodriguez J, Martínez-Ortega JF (2019) A novel intrusion detection and prevention scheme for network coding-enabled mobile small cells. IEEE Trans Comput Soc Syst 6(6):1467–1477
Rahman MU (2019) Leader election in the internet of things: challenges and opportunities. arXiv preprint arXiv:191100759
Rrushi J, Farhangi H, Howey C, Carmichael K, Dabell J (2015) A quantitative evaluation of the target selection of havex ics malware plugin. In: Industrial control system security (ICSS) workshop
Şahin S, Gedik B (2018) C-stream: a co-routine-based elastic stream processing engine. ACM Trans Parallel Comput (TOPC) 4(3):1–27
Satam S, Satam P, Pacheco J, Hariri S (2021) Security framework for smart cyber infrastructure. Cluster Comput, 1–12
Sengan S, Subramaniyaswamy V, Nair SK, Indragandhi V, Manikandan J, Ravi L (2020) Enhancing cyber-physical systems with hybrid smart city cyber security architecture for secure public data-smart network. Future Gener Comput Syst 112:724–737
Singh P, Tripathi AK (2012) Exploring problems and solutions in estimating testing effort for non functional requirement. Int J Comput Technol 3(2b):284–290
Stroustrup B, Shopiro JE (1984) A set of C++ classes for co-routine style programming. AT & T bell laboratories
Tao M, Zuo J, Liu Z, Castiglione A, Palmieri F (2018) Multi-layer cloud architectural model and ontology-based security service framework for iot-based smart homes. Future Gener Comput Syst 78:1040–1051
Tripathi D, Maurya AK, Chaturvedi A, Tripathi AK (2019) A study of security modeling techniques for smart systems. 2019 International Conference on Machine Learning. Big Data, Cloud and Parallel Computing (COMITCon), IEEE, 87–92
Tripathi D, Singh LK, Tripathi AK, Chaturvedi A (2021) Model based security verification of cyber-physical system based on petrinet: a case study of nuclear power plant. Annals Nucl Energy 159:108306
Tripathi D, Tripathi AK, Singh LK, Chaturvedi A (2021b) Towards analyzing the impact of intrusion prevention and response on cyber-physical system availability: a case study of npp. Annals of Nucl Energy p 108863
Vandana C (2016) Security improvement in iot based on software defined networking (sdn). Int J Sci, Eng Technol Res (IJSETR) 5(1):2327–4662
Walker-Roberts S, Hammoudeh M, Aldabbas O, Aydin M, Dehghantanha A (2020) Threats on the horizon: understanding security threats in the era of cyber-physical systems. J Supercomput 76(4):2643–2664
Wu Z, Li R, Zhou Z, Guo J, Jiang J, Su X (2020) A user sensitive subject protection approach for book search service. J Assoc Inf Sci Technol 71(2):183–195
Wu Z, Shen S, Lian X, Su X, Chen E (2020) A dummy-based user privacy protection approach for text information retrieval. Knowl-Based Syst 195:105679
Wu Z, Li G, Shen S, Lian X, Chen E, Xu G (2021) Constructing dummy query sequences to protect location privacy and query privacy in location-based services. World Wide Web 24(1):25–49
Yaacoub JPA, Salman O, Noura HN, Kaaniche N, Chehab A, Malli M (2020) Cyber-physical systems security: limitations, issues and future trends. Microprocess Microsyst 77:103201
Zhang Y, Wang L, Sun W, Green RC II, Alam M (2011) Distributed intrusion detection system in a multi-layer network architecture of smart grids. IEEE Trans Smart Grid 2(4):796–808
Zhu Q, Rieger C, Başar T (2011) A hierarchical security architecture for cyber-physical systems. In: 2011 4th international symposium on resilient control systems, IEEE, 15–20
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Tripathi, D., Biswas, A., Tripathi, A.K. et al. An integrated approach of designing functionality with security for distributed cyber-physical systems. J Supercomput 78, 14813–14845 (2022). https://doi.org/10.1007/s11227-022-04481-9
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11227-022-04481-9