Modeling and Optimizing the Performance-Security Tradeoff on D-NCS Using the Coevolutionary Paradigm

Distributed networked control systems (D-NCS) are vulnerable to various network attacks when the network is not secured; thus, D-NCS must be well protected with security mechanisms (e.g., cryptography), which may adversely affect the dynamic performance of the D-NCS because of limited system resources. This paper addresses the tradeoff between D-NCS security and its real-time performance and uses the Intelligent Space (iSpace) for illustration. A tradeoff model for a system's dynamic performance and its security is presented. This model can be used to allocate system resources to provide sufficient protection and to satisfy the D-NCS's real-time dynamic performance requirements simultaneously. Then, the paper proposes a paradigm of the performance-security tradeoff optimization based on the coevolutionary genetic algorithm (CGA) for D-NCS. A Simulink-based test-bed is implemented to illustrate the effectiveness of this paradigm. The results of the simulation show that the CGA can efficiently find the optimal values in a performance-security tradeoff model for D-NCS.

[1]  Wolfgang Granzer,et al.  Security in Building Automation Systems , 2010, IEEE Transactions on Industrial Electronics.

[2]  Mo-Yuen Chow,et al.  Networked Control System: Overview and Research Trends , 2010, IEEE Transactions on Industrial Electronics.

[3]  S.K.S. Gupta,et al.  A Modeling Framework for Evaluating Effectiveness of Smart-Infrastructure Crises Management Systems , 2008, 2008 IEEE Conference on Technologies for Homeland Security.

[4]  A.A. Creery,et al.  Industrial cybersecurity for a power system and SCADA networks - Be secure , 2007, IEEE Industry Applications Magazine.

[5]  Stephen S. Yau,et al.  An Adaptive Tradeoff Model for Service Performance and Security in Service-Based Systems , 2009, 2009 IEEE International Conference on Web Services.

[6]  Rajarathnam Chandramouli,et al.  Opportunistic Encryption: A Trade-Off between Security and Throughput in Wireless Networks , 2007, IEEE Transactions on Dependable and Secure Computing.

[7]  Meikang Qiu,et al.  Static Security Optimization for Real-Time Systems , 2009, IEEE Transactions on Industrial Informatics.

[8]  Thomas P. von Hoff,et al.  Security for Industrial Communication Systems , 2005, Proceedings of the IEEE.

[9]  Kay Chen Tan,et al.  A Competitive-Cooperative Coevolutionary Paradigm for Dynamic Multiobjective Optimization , 2009, IEEE Transactions on Evolutionary Computation.

[10]  Alfredo Pironti,et al.  Formal Vulnerability Analysis of a Security System for Remote Fieldbus Access , 2011, IEEE Transactions on Industrial Informatics.

[11]  Scott A. Brandt,et al.  Draco: Efficient Resource Management for Resource-Constrained Control Tasks , 2009, IEEE Transactions on Computers.

[12]  Özgür Gürbüz,et al.  Wireless Model-Based Predictive Networked Control System Over Cooperative Wireless Network , 2011, IEEE Transactions on Industrial Informatics.

[13]  Mo-Yuen Chow,et al.  A trade-off model for performance and security in secured Networked Control Systems , 2011, 2011 IEEE International Symposium on Industrial Electronics.

[14]  André Teixeira,et al.  Networked control systems under cyber attacks with applications to power networks , 2010, Proceedings of the 2010 American Control Conference.

[15]  K. Wong,et al.  Analyzing oligopolistic electricity market using coevolutionary computation , 2006, IEEE Transactions on Power Systems.

[16]  Weiming Shen,et al.  Nrc Publications Archive (nparc) Archives Des Publications Du Cnrc (nparc) Distributed Device Networks with Security Constraints Distributed Device Networks with Security Constraints* Distributed Device Networks with Security Constraints , 2022 .

[17]  Hideki Hashimoto,et al.  Path tracking control of mobile robots using a quadratic curve , 1996, Proceedings of Conference on Intelligent Vehicles.

[18]  Kenneth A. De Jong,et al.  Cooperative Coevolution: An Architecture for Evolving Coadapted Subcomponents , 2000, Evolutionary Computation.

[19]  Shreyas Sundaram,et al.  Distributed Function Calculation via Linear Iterative Strategies in the Presence of Malicious Agents , 2011, IEEE Transactions on Automatic Control.

[20]  Kay Chen Tan,et al.  A distributed Cooperative coevolutionary algorithm for multiobjective optimization , 2006, IEEE Transactions on Evolutionary Computation.

[21]  Francisco Maciá Pérez,et al.  Network Intrusion Detection System Embedded on a Smart Sensor , 2011, IEEE Transactions on Industrial Electronics.

[22]  Heejo Lee,et al.  This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination. INVITED PAPER Cyber–Physical Security of a Smart Grid Infrastructure , 2022 .

[23]  Mo-Yuen Chow,et al.  Optimal Tradeoff Between Performance and Security in Networked Control Systems Based on Coevolutionary Algorithms , 2012, IEEE Transactions on Industrial Electronics.

[24]  Antonio Bicchi,et al.  Consensus Computation in Unreliable Networks: A System Theoretic Approach , 2010, IEEE Transactions on Automatic Control.

[25]  J. Friedman A Non-cooperative Equilibrium for Supergames , 1971 .

[26]  S. Shankar Sastry,et al.  Secure Control: Towards Survivable Cyber-Physical Systems , 2008, 2008 The 28th International Conference on Distributed Computing Systems Workshops.

[27]  Radia J. Perlman,et al.  Network security - private communication in a public world , 2002, Prentice Hall series in computer networking and distributed systems.