Skip to main content

Advertisement

Log in

A Decision-centric approach for secure and energy-efficient cyber-physical systems

  • Original Research
  • Published:
Journal of Ambient Intelligence and Humanized Computing Aims and scope Submit manuscript

Abstract

Cyber-Physical Systems (CPSs) integrate the interdisciplinary fields of computing, networking and control to perform tasks in the real world. CPSs have recently found applications in many battery-powered devices with stringent energy consumption requirements. To ensure secure operation, CPS necessitates sufficient security mechanisms to be incorporated against cyber attacks. However, maximizing energy efficiency and improving security are desirable but contrasting requirements. Towards reducing energy consumption, the optimal strategy for CPS is to initialize the security mechanism dynamically, at the onset of cyberattacks. In the absence of attacks, CPS can deactivate the security mechanism to minimize energy consumption. In the case of CPS, this approach is novel and contrary to the traditional approach of long-term, continual operation of the security mechanism. Towards this goal, we use a decision-centric approach based on Markov Decision Process (MDP) to estimate a threshold upon which the system initiates its security mechanism. We evaluate our proposed mechanism using MATLAB based TrueTime simulator. Evaluation shows that our proposed MDP-based approach achieves maximum energy-savings of 8.26 and \(11.05\%\) in defending against Denial-of-Service and Deception attacks, respectively. Further, our approach can be used to develop sustainable CPS designs that balance the trade-off between energy-efficiency and security.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17

Similar content being viewed by others

References

  • Ahmed N, Casbeer D, Cao Y, Kingston D (2015) Bayesian Hidden Markov models for UAV-enabled target localization on road networks with soft-hard data. In: Ground/air multisensor interoperability, integration, and networking for persistent ISR VI, vol 9464. International Society for Optics and Photonics, p 94640Q

  • Akhtar F, Rehmani MH (2017) Energy harvesting for self-sustainable wireless body area networks. IT Prof 19(2):32–40

    Google Scholar 

  • Al-Sabban WH, Gonzalez LF, Smith RN, Wyeth GF (2012) Wind-energy based path planning for electric unmanned aerial vehicles using markov decision processes. In: Proceedings of the IEEE/RSJ International Conference on intelligent robots and systems, IEEE

  • Alippi C, Ntalampiras S, Roveri M (2017) Model-free fault detection and isolation in large-scale cyber-physical systems. IEEE Trans Emerg Topics Comput Intell 1(1):61–71

    Google Scholar 

  • Alsheikh MA, Hoang DT, Niyato D, Tan HP, Lin S (2015) Markov decision processes with applications in wireless sensor networks: a survey. IEEE Commun Surv Tutor 17(3):1239–1267

    Google Scholar 

  • Anvari-Moghaddam A, Monsef H, Rahimi-Kian A (2015) Optimal smart home energy management considering energy saving and a comfortable lifestyle. IEEE Trans Smart Grid 6(1):324–332

    Google Scholar 

  • Aprem A, Murthy CR, Mehta NB (2013) Transmit power control policies for energy harvesting sensors with retransmissions. IEEE J Select Top Signal Process 7(5):895–906

    Google Scholar 

  • Bajracharya A, Khan MRA, Michael S, Tonkoski R (2018) Forecasting data center load using hidden markov model. In: 2018 North American Power Symposium (NAPS), IEEE, pp 1–5

  • Banerjee A, Venkatasubramanian KK, Mukherjee T, Gupta SKS (2012) Ensuring safety, security, and sustainability of mission-critical cyber-physical systems. Proc IEEE 100(1):283–299

    Google Scholar 

  • Barnes AK, Balda JC, Escobar-Mejía A (2015) A semi-markov model for control of energy storage in utility grids and microgrids with pv generation. IEEE Trans Sustain Energy 6(2):546–556

    Google Scholar 

  • Bethke B, How J, Vian J (2009) Multi-uav persistent surveillance with communication constraints and health mangement. In: AIAA Guidance, Navigation, and Control Conference, p 5654

  • Boulekrouche B, Jabeur N, Alimazighi Z (2016) Toward integrating grid and cloud-based concepts for an enhanced deployment of spatial data warehouses in cyber-physical system applications. J Ambient Intell Hum Comput 7(4):475–487

    Google Scholar 

  • Bu S, Yu FR, Liu PX, Zhang P (2011) Distributed scheduling in smart grid communications with dynamic power demands and intermittent renewable energy resources. In: 2011 IEEE International Conference on Communications Workshops (ICC), IEEE, pp 1–5

  • Chakrabarty A, Langelaan J (2010) Flight path planning for uav atmospheric energy harvesting using heuristic search. In: AIAA Guidance, Navigation, and Control Conference, p 8033

  • Daniel K, Dusza B, Lewandowski A, Wietfeld C (2009) Airshield: A system-of-systems muav remote sensing architecture for disaster response. In: 2009 3rd Annual IEEE systems conference, IEEE, pp 196–200

  • Darwish A, Hassanien AE (2017) Cyber physical systems design, methodology, and integration: the current status and future outlook. J Ambient Intell Hum Comput 9(5):1541–1556

    Google Scholar 

  • Deng Z, Xie L, Rong Y, Li W, Jin L (2016) Data security transmission mechanism in industrial networked control systems against deception attack. Int J Secur Appl 10(4):391–404

    Google Scholar 

  • Dorf RC, Bishop RH (2011) Modern control systems. Pearson Prentice Hall, London

    MATH  Google Scholar 

  • Effatparvar M, Dehghan M, Rahmani AM (2016) A comprehensive survey of energy-aware routing protocols in wireless body area sensor networks. J Med Syst 40(9):201

    Google Scholar 

  • Elhoseny M, Hosny A, Hassanien AE, Muhammad K, Sangaiah AK (2017) Secure automated forensic investigation for sustainable critical infrastructures compliant with green computing requirements. IEEE Trans Sustain Comput. https://doi.org/10.1109/TSUSC.2017.2782737

    Article  Google Scholar 

  • Erol-Kantarci M, Mouftah HT (2011) Wireless sensor networks for cost-efficient residential energy management in the smart grid. IEEE Trans Smart Grid 2(2):314–325

    Google Scholar 

  • Erol-Kantarci M, Mouftah HT (2015) Energy-efficient information and communication infrastructures in the smart grid: a survey on interactions and open issues. IEEE Commun Surv Tutor 17(1):179–197

    Google Scholar 

  • Fawzi H, Tabuada P, Diggavi S (2014) Secure estimation and control for cyber-physical systems under adversarial attacks. IEEE Trans Autom Control 59(6):1454–1467

    MathSciNet  MATH  Google Scholar 

  • Garg R, Son SW, Kandemir M, Raghavan P, Prabhakar R (2009) Markov model based disk power management for data intensive workloads. In: 2009 9th IEEE/ACM International Symposium on cluster computing and the grid, IEEE, pp 76–83

  • Gellings CW (2009) The smart grid: enabling energy efficiency and demand response. Fairmont Press, Lilrburn

    Google Scholar 

  • Guenter B, Jain N, Williams C (2011) Managing cost, performance, and reliability tradeoffs for energy-aware server provisioning. In: 2011 Proceedings IEEE INFOCOM, IEEE, pp 1332–1340

  • Guo Y, Hu X, Hu B, Cheng J, Zhou M, Kwok RY (2018) Mobile cyber physical systems: current challenges and future networking applications. IEEE Access 6:12360–12368

    Google Scholar 

  • Han Z, Tan H, Chen G, Wang R, Chen Y, Lau FC (2016) Dynamic virtual machine management via approximate markov decision process. In: IEEE INFOCOM 2016-The 35th Annual IEEE International Conference on computer communications, IEEE, pp 1–9

  • He M, Zhang J (2010) Fault detection and localization in smart grid: A probabilistic dependence graph approach. In: 2010 First IEEE International Conference on smart grid communications, IEEE, pp 43–48

  • He M, Murugesan S, Zhang J (2011) Multiple timescale dispatch and scheduling for stochastic reliability in smart grids with wind generation integration. In: 2011 Proceedings IEEE INFOCOM, IEEE, pp 461–465

  • Higuera-Toledano MT, Risco-Martín JL, Arroba P, Ayala JL (2017) Green adaptation of real-time web services for industrial cps within a cloud environment. IEEE Trans Ind Inf 13(3):1249–1256

    Google Scholar 

  • Huang JY, Liao IE, Chung YF, Chen KT (2013) Shielding wireless sensor network using markovian intrusion detection system with attack pattern mining. Inf Sci 231:32–44

    MathSciNet  Google Scholar 

  • Jagannath J, Saji A, Kulhandjian H, Sun Y, Demirors E, Melodia T (2013) A hybrid mac protocol with channel-dependent optimized scheduling for clustered underwater acoustic sensor networks. In: Proceedings of the Eighth ACM International Conference on underwater networks and systems, ACM, p 3

  • Jayachitra A, Vinodha R (2014) Genetic algorithm based pid controller tuning approach for continuous stirred tank reactor. Adv Artif Intell. https://doi.org/10.1155/2014/791230

    Article  Google Scholar 

  • Jiang H, Zhang JJ, Gao W, Wu Z (2014) Fault detection, identification, and location in smart grid based on data-driven computational methods. IEEE Trans Smart Grid 5(6):2947–2956

    Google Scholar 

  • Jithish J, Sankaran S (2017) Securing networked control systems: Modeling attacks and defenses. In: 2017 IEEE International Conference on consumer electronics-Asia (ICCE-Asia), IEEE, pp 7–11

  • Jithish J, Sankaran S (2018) Towards a decision-centric approach for securing cyber physical systems. In: 2018 10th International Conference on communication systems & networks (COMSNETS), IEEE, pp 500–502

  • Jung BH, Akbar RU, Sung DK (2012) Throughput, energy consumption, and energy efficiency of ieee 802.15. 6 body area network (ban) mac protocol. In: 2012 IEEE 23rd International Symposium on personal, indoor and mobile radio communications-(PIMRC), IEEE, pp 584–589

  • Karnouskos S (2011) Cyber-physical systems in the smartgrid. In: 2011 9th IEEE International Conference on industrial informatics, IEEE, pp 20–23

  • Krakow LW, Chong EK, Groomn KN, Harrington J, Li Y, Rigdon B (2006) Control of perimeter surveillance wireless sensor networks via partially observable marcov decision process. In: Proceedings 40th Annual 2006 International Carnahan Conference on security technology, IEEE, pp 261–268

  • Lakshminarayana S, Teng TZ, Yau DK, Tan R (2017) Optimal attack against cyber-physical control systems with reactive attack mitigation. In: Proceedings of the Eighth International Conference on future energy systems, ACM, pp 179–190

  • Lee EA (2008) Cyber physical systems: Design challenges. In: 2008 11th IEEE International Symposium on object and component-oriented real-time distributed computing (ISORC), IEEE, pp 363–369

  • Li H, Jaggi N, Sikdar B (2011) Relay scheduling for cooperative communications in sensor networks with energy harvesting. IEEE Trans Wirel Commun 10(9):2918–2928

    Google Scholar 

  • Li H, Jaggi N, Sikdar B (2012) An analytical approach towards cooperative relay scheduling under partial state information. In: 2012 Proceedings IEEE INFOCOM, IEEE, pp 2666–2670

  • Li K, Ni W, Wang X, Liu RP, Kanhere SS, Jha S (2016) Energy-efficient cooperative relaying for unmanned aerial vehicles. IEEE Trans Mob Comput 15(6):1377–1386

    Google Scholar 

  • Li X, He F, Li W (2019) A cloud-terminal-based cyber-physical system architecture for energy efficient machining process optimization. J Ambient Intell Hum Comput 10(3):1049–1064

    Google Scholar 

  • Liu D, Zhang X, Zhan C, Chi KT (2017) Modeling of cascading failures in cyber-coupled power systems. In: 2017 IEEE International Symposium on circuits and systems (ISCAS), IEEE, pp 1–4

  • Liu Y, Liu A, Liu X, Ma M (2019) A trust-based active detection for cyber-physical security in industrial environments. IEEE Trans Ind Inf 15(12):6593–6603

    Google Scholar 

  • Lo B, Yang GZ (2005) Key technical challenges and current implementations of body sensor networks. In: Proc. 2nd International Workshop on Body Sensor Networks (BSN 2005)

  • Luo X, Zhang D, Yang LT, Liu J, Chang X, Ning H (2016) A kernel machine-based secure data sensing and fusion scheme in wireless sensor networks for the cyber-physical systems. Future Gener Comput Syst 61:85–96

    Google Scholar 

  • Luo X, Li Y, Wang W, Ban X, Wang JH, Zhao W (2020) A robust multilayer extreme learning machine using kernel risk-sensitive loss criterion. Int J Mach Learn Cybern 11(1):197–216

    Google Scholar 

  • Marashi K, Sarvestani SS, Hurson AR (2018) Consideration of cyber-physical interdependencies in reliability modeling of smart grids. IEEE Trans Sustain Comput 3(2):73–83

    Google Scholar 

  • Marzband M, Azarinejadian F, Savaghebi M, Guerrero JM (2017) An optimal energy management system for islanded microgrids based on multiperiod artificial bee colony combined with markov chain. IEEE Syst J 11(3):1712–1722

    Google Scholar 

  • Mehta S, Kwak KS (2010) An energy-efficient mac protocol in wireless sensor networks: a game theoretic approach. EURASIP J Wirel Commun Netw 1:926420

    Google Scholar 

  • Meisner D, Gold BT, Wenisch TF (2009) Powernap: eliminating server idle power. ACM Sigplan Not ACM 44:205–216

    Google Scholar 

  • Meisner D, Sadler CM, Barroso LA, Weber WD, Wenisch TF (2011) Power management of online data-intensive services. ACM SIGARCH Comput Arch News ACM 39:319–330

    Google Scholar 

  • Minchala-Avila LI, Palacio-Baus K, Ortiz JP, Valladolid JD, Ortega J (2016) Comparison of the performance and energy consumption index of model-based controllers. In: 2016 IEEE Ecuador Technical Chapters Meeting (ETCM), IEEE, pp 1–6

  • Misra S, Mondal A, Banik S, Khatua M, Bera S, Obaidat MS (2013) Residential energy management in smart grid: a markov decision process-based approach. 2013 IEEE International Conference on green computing and communications and IEEE internet of things and IEEE Cyber. Physical and social computing, IEEE, pp 1152–1157

  • Mitchell R, Chen R (2013) Effect of intrusion detection and response on reliability of cyber physical systems. IEEE Trans Reliab 62(1):199–210

    Google Scholar 

  • Mozaffari M, Saad W, Bennis M, Debbah M (2016) Mobile internet of things: Can uavs provide an energy-efficient mobile architecture. In: 2016 IEEE Global Communications Conference (GLOBECOM), IEEE, pp 1–6

  • Munoz DJ, Montenegro JA, Pinto M, Fuentes L (2019) Energy-aware environments for the development of green applications for cyber-physical systems. Future Gener Comput Syst 91:536–554

    Google Scholar 

  • Nedevschi S, Popa L, Iannaccone G, Ratnasamy S, Wetherall D (2008) Reducing network energy consumption via sleeping and rate-adaptation. NsDI 8:323–336

    Google Scholar 

  • Niyato D, Wang P (2014) Delay-limited communications of mobile node with wireless energy harvesting: performance analysis and optimization. IEEE Trans Veh Technol 63(4):1870–1885

    Google Scholar 

  • Nuckols TK, Bower AG, Paddock SM, Hilborne LH, Wallace P, Rothschild JM, Griffin A, Fairbanks RJ, Carlson B, Panzer RJ et al (2008) Programmable infusion pumps in icus: an analysis of corresponding adverse drug events. J Gen Intern Med 23(1):41–45

    Google Scholar 

  • Pacheco-Sanchez S, Casale G, Scotney B, McClean S, Parr G, Dawson S (2011) Markovian workload characterization for qos prediction in the cloud. In: 2011 IEEE 4th International Conference on Cloud Computing, IEEE, pp 147–154

  • Palensky P, Dietrich D (2011) Demand side management: demand response, intelligent energy systems, and smart loads. IEEE Trans Ind Inf 7(3):381–388

    Google Scholar 

  • Parolini L, Sinopoli B, Krogh BH (2008) Reducing data center energy consumption via coordinated cooling and load management. In: Proceedings of the 2008 conference on power aware computing and systems, HotPower, vol 8, pp 14–14

  • Pasqualetti F, Dörfler F, Bullo F (2011) Cyber-physical attacks in power networks: Models, fundamental limitations and monitor design. In: 2011 50th IEEE Conference on Decision and Control and European Control Conference, IEEE, pp 2195–2201

  • Pejovic V, Musolesi M (2015) Anticipatory mobile computing: a survey of the state of the art and research challenges. ACM Comput Surv (CSUR) 47(3):47

    Google Scholar 

  • Peng H, Huafeng W, Dilin M, Chuanshan G (2006) Elrs: an energy-efficient layered routing scheme for wireless sensor and actor networks. In: 20th International Conference on advanced information networking and applications-Volume 1 (AINA’06), IEEE, vol 2, pp 5–pp

  • Premkumar K, Kumar A (2008) Optimal sleep-wake scheduling for quickest intrusion detection using wireless sensor networks. In: IEEE INFOCOM 2008-The 27th Conference on computer communications, IEEE, pp 1400–1408

  • Ragi S, Chong EKP (2015) UAV guidance algorithms via partially observable markov decision processes. In: Valavanis KP, Vachtsevanos GJ (eds) Handbook of unmanned aerial vehicles. Springer, Dordrecht. https://doi.org/10.1007/978-90-481-9707-1_59

    Chapter  Google Scholar 

  • Roy M, Chowdhury C, Aslam N (2018) Designing transmission strategies for enhancing communications in medical iot using markov decision process. Sensors 18(12):4450

    Google Scholar 

  • Sangaiah AK, Medhane DV, Bian GB, Ghoneim A, Alrashoud M, Hossain MS (2019) Energy-aware green adversary model for cyber physical security in industrial system. IEEE Trans Ind Inf 16(5):3322–3329. https://doi.org/10.1109/TII.2019.2953289

    Article  Google Scholar 

  • Seyedi A, Sikdar B (2008) Modeling and analysis of energy harvesting nodes in wireless sensor networks. In: 2008 46th Annual Allerton Conference on Communication, Control, and Computing, IEEE, pp 67–71

  • Seyedi A, Sikdar B (2010) Energy efficient transmission strategies for body sensor networks with energy harvesting. IEEE Trans Commun 58(7):2116–2126

    Google Scholar 

  • Sharma V, You I, Kumar R (2016) Energy efficient data dissemination in multi-uav coordinated wireless sensor networks. Mob Inf Syst. https://doi.org/10.1155/2016/8475820

    Article  Google Scholar 

  • Sharma A, Rathee G, Kumar R, Saini H, Varadarajan V, Nam Y, Chilamkurti N (2019) A secure, energy-and sla-efficient (sese) e-healthcare framework for quickest data transmission using cyber-physical system. Sensors 19(9):2119

    Google Scholar 

  • Urgaonkar R, Urgaonkar B, Neely MJ, Sivasubramaniam A (2011) Optimal power cost management using stored energy in data centers. In: Proceedings of the ACM SIGMETRICS joint international conference on Measurement and modeling of computer systems, ACM, pp 221–232

  • Venkatasubramanian KK, Banerjee A, Gupta SK (2009) Green and sustainable cyber-physical security solutions for body area networks. In: 2009 Sixth International Workshop on wearable and implantable body sensor networks, IEEE, pp 240–245

  • Ventura J, Chowdhury K (2011) Markov modeling of energy harvesting body sensor networks. 2011 IEEE 22nd International Symposium on personal, indoor and mobile radio communications, IEEE, pp 2168–2172

  • Vu AD, Medhat R, Bonakdarpour B (2019) Managing the security-energy tradeoff in distributed cyber-physical systems. In: Proceedings of the 10th ACM/IEEE International Conference on Cyber-Physical Systems, pp 118–128

  • Wang EK, Ye Y, Xu X, Yiu SM, Hui LCK, Chow KP (2010) Security issues and challenges for cyber physical system. In: 2010 IEEE/ACM Int’l Conference on green computing and communications & Int’l Conference on cyber. physical and social computing, IEEE, pp 733–738

  • Wang H, Zhao H, Zhang J, Ma D, Li J, Wei J (2018) Survey on unmanned aerial vehicle networks: A cyber physical system perspective. arXiv preprint arXiv:181206821

  • Xia F (2008) Qos challenges and opportunities in wireless sensor/actuator networks. Sensors 8(2):1099–1110

    Google Scholar 

  • Xie G, Peng H, Huang J, Li R, Li K (2019) Energy-efficient functional safety design methodology using asil decomposition for automotive cyber-physical systems. IEEE Trans Reliab. https://doi.org/10.1109/TR.2019.2915818

    Article  Google Scholar 

  • Yi J, Shi WR, Tang YJ, Xu L (2010) A dynamic task scheduling for wireless sensor and actuator networks. Dianzi Xuebao (Acta Electronica Sinica) 38(6):1239–1244

    Google Scholar 

  • Zhang L, Xie L, Li W, Wang Z (2013) Security solutions for networked control systems based on des algorithm and improved grey prediction model. Int J Comput Netw Inf Secur 6(1):78

    Google Scholar 

  • Zheng X, Cai Y (2010) Markov model based power management in server clusters. 2010 IEEE/ACM Int’l Conference on green computing and communications & Int’l Conference on cyber, physical and social computing, IEEE, pp 96–102

  • Zhou Y, Li J, Lamont L, Rabbath CA (2012) Modeling of packet dropout for uav wireless communications. 2012 International Conference on computing, networking and communications (ICNC), IEEE, pp 677–682

  • Zhu J, Li J, Gao H (2007) Tasks allocation for real-time applications in heterogeneous sensor networks for energy minimization. In: Eighth ACIS International Conference on software engineering, artificial intelligence, networking, and parallel/distributed computing (SNPD 2007), IEEE, vol 2, pp 20–25

Download references

Acknowledgements

The authors would like to thank the Ministry of Electronics and Information Technology (MeitY), Government of India, for supporting this work under the Visvesvaraya PhD Scheme for Electronics and IT.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to J. Jithish.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Jithish, J., Sankaran, S. & Achuthan, K. A Decision-centric approach for secure and energy-efficient cyber-physical systems. J Ambient Intell Human Comput 12, 417–441 (2021). https://doi.org/10.1007/s12652-020-01995-z

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12652-020-01995-z

Keywords

Navigation