Evaluating Connection Resilience for Self-Organizing Cyber-Physical Systems

Highly distributed self-organizing CPS exhibit coordination schemata and communication requirements which are similar to structured overlay networks. To determine the resilience of such overlays, we analyze the connectivity of Kademlia, which has been successfully deployed in multiple applications with several thousands of nodes, e.g., BitTorrent. We measure the network connectivity within extensive simulations for different network configurations and present selected results.

[1]  Bernhard Sick,et al.  Learning from others: Exchange of classification rules in intelligent distributed systems , 2012, Artif. Intell..

[2]  S. Shankar Sastry,et al.  Secure Control: Towards Survivable Cyber-Physical Systems , 2008, 2008 The 28th International Conference on Distributed Computing Systems Workshops.

[3]  L. Beineke,et al.  Topics in Structural Graph Theory , 2013 .

[4]  Claudia Eckert,et al.  Security Issues of Multi-Core Architectures — The Automotive Case , 2013, it Inf. Technol..

[5]  Ingmar Baumgart,et al.  S/Kademlia: A practicable approach towards secure key-based routing , 2007, 2007 International Conference on Parallel and Distributed Systems.

[6]  Jürgen Becker,et al.  Hardware Support for Authentication in Cyber Physical Systems , 2013, it Inf. Technol..

[7]  Manfred Broy,et al.  Cyber-Physical Systems: Imminent Challenges , 2012, Monterey Workshop.

[8]  Edward A. Lee Cyber-physical Systems -are Computing Foundations Adequate? Position Paper for Nsf Workshop on Cyber-physical Systems: Research Motivation, Techniques and Roadmap , 1998 .

[9]  Ingolf Krüger,et al.  Rich Services — A SOA Pattern for Dynamic Change in Cyber-physical Systems , 2013, it Inf. Technol..

[10]  Ralf Steinmetz,et al.  Towards Benchmarking of Structured Peer-to-Peer Overlays for Network Virtual Environments , 2008, 2008 14th IEEE International Conference on Parallel and Distributed Systems.

[11]  Andrew V. Goldberg,et al.  On Implementing Push-Relabel Method for the Maximum Flow Problem , 1995, IPCO.

[12]  T. C. Hu,et al.  Multi-Terminal Network Flows , 1961 .

[13]  Cristian S. Calude,et al.  Discrete Mathematics and Theoretical Computer Science , 2003, Lecture Notes in Computer Science.

[14]  Xin Yao,et al.  CamSim: A Distributed Smart Camera Network Simulator , 2013, 2013 IEEE 7th International Conference on Self-Adaptation and Self-Organizing Systems Workshops.

[15]  Jörg Hähner,et al.  A Concept for Securing Cyber-Physical Systems with Organic Computing Techniques , 2013, ARCS Workshops.

[16]  Jay Lee,et al.  A Cyber-Physical Systems architecture for Industry 4.0-based manufacturing systems , 2015 .

[17]  Márk Jelasity,et al.  PeerSim: A scalable P2P simulator , 2009, 2009 IEEE Ninth International Conference on Peer-to-Peer Computing.

[18]  Arno Wacker,et al.  Evaluating Connection Resilience for Self-Organized Distributed Cyber-Physical Systems , 2016, ArXiv.

[19]  Tim Moors,et al.  Survey of research towards robust peer-to-peer networks: Search methods , 2006, Comput. Networks.

[20]  David Mazières,et al.  Kademlia: A Peer-to-Peer Information System Based on the XOR Metric , 2002, IPTPS.

[21]  Guillaume Pierre,et al.  A survey of DHT security techniques , 2011, CSUR.

[22]  Dan S. Wallach,et al.  An Analysis of BitTorrent’s Two Kademlia-Based DHTs , 2007 .

[23]  Jörg Hähner,et al.  Observation and Control of Organic Systems , 2011, Organic Computing.

[24]  Martin Roesch,et al.  Snort - Lightweight Intrusion Detection for Networks , 1999 .

[25]  K. Menger Zur allgemeinen Kurventheorie , 1927 .

[26]  Shimon Even,et al.  An Algorithm for Determining Whether the Connectivity of a Graph is at Least k , 1973, SIAM J. Comput..

[27]  Bernhard Sick,et al.  Multi-k-Resilience in Distributed Adaptive Cyber-Physical Systems , 2016 .

[28]  David A. Bader,et al.  Graph Algorithms , 2011, Encyclopedia of Parallel Computing.

[29]  Raúl Jiménez,et al.  Connectivity properties of Mainline BitTorrent DHT nodes , 2009, 2009 IEEE Ninth International Conference on Peer-to-Peer Computing.

[30]  Hani Salah,et al.  Capturing Connectivity Graphs of a Large-Scale P2P Overlay Network , 2013, 2013 IEEE 33rd International Conference on Distributed Computing Systems Workshops.

[31]  Stefanie Roos,et al.  Characterizing graph-theoretic properties of a large-scale DHT: Measurements vs. simulations , 2014, 2014 IEEE Symposium on Computers and Communications (ISCC).