Energy-Aware Green Adversary Model for Cyberphysical Security in Industrial System

Adversary models have been fundamental to the various cryptographic protocols and methods. However, their use in most of the branches of research in computer science is comparatively restricted, primarily in case of the research in cyberphysical security (e.g., vulnerability studies, position confidentiality). In this article, we propose an energy-aware green adversary model for its use in smart industrial environment through achieving confidentiality. Even though, mutually the hardware and the software parts of cyberphysical systems can be improved to decrease its energy consumption, this article focuses on aspects of conserving position and information confidentiality. On the basis of our findings (assumptions, adversary goals, and capabilities) from the literature, we give some testimonials to help practitioners and researchers working in cyberphysical security. The proposed model that runs on real-time anticipatory position-based query scheduling in order to minimize the communication and computation cost for each query, thus, facilitating energy consumption minimization. Moreover, we calculate the transferring/acceptance slots required for each query to avoid deteriorating slots. The experimental results confirm that the proposed approach can diminish energy consumption up to five times in comparison to existing approaches

[1]  Syed Hassan Ahmed,et al.  KEIDS: Kubernetes-Based Energy and Interference Driven Scheduler for Industrial IoT in Edge-Cloud Ecosystem , 2020, IEEE Internet of Things Journal.

[2]  M. Shamim Hossain,et al.  Enforcing Position-Based Confidentiality With Machine Learning Paradigm Through Mobile Edge Computing in Real-Time Industrial Informatics , 2019, IEEE Transactions on Industrial Informatics.

[3]  Arun Kumar Sangaiah,et al.  Search space-based multi-objective optimization evolutionary algorithm , 2017, Comput. Electr. Eng..

[4]  Albert Y. Zomaya,et al.  A Hybrid Deep Learning-Based Model for Anomaly Detection in Cloud Datacenter Networks , 2019, IEEE Transactions on Network and Service Management.

[5]  Yong Wang,et al.  Privacy Preserving for Continuous Query in Location Based Services , 2012, 2012 IEEE 18th International Conference on Parallel and Distributed Systems.

[6]  Kyoung Dae Kim,et al.  An Overview and Some Challenges in Cyber-Physical Systems , 2013 .

[7]  Arun Kumar Sangaiah,et al.  Source node position confidentiality aspects in wireless networks: an extended review , 2016, Int. J. High Perform. Syst. Archit..

[8]  Arun Kumar Sangaiah,et al.  ESCAPE: Effective Scalable Clustering Approach for Parallel Execution of Continuous Position-Based Queries in Position Monitoring Applications , 2017, IEEE Transactions on Sustainable Computing.

[9]  Young-Koo Lee,et al.  Energy Efficiency Based on Quality of Data for Cyber Physical Systems , 2011, 2011 International Conference on Internet of Things and 4th International Conference on Cyber, Physical and Social Computing.

[10]  Georges Kaddoum,et al.  A Big Data-Enabled Consolidated Framework for Energy Efficient Software Defined Data Centers in IoT Setups , 2020, IEEE Transactions on Industrial Informatics.

[11]  Dushantha Nalin K. Jayakody,et al.  SDN-Based Secure and Privacy-Preserving Scheme for Vehicular Networks: A 5G Perspective , 2019, IEEE Transactions on Vehicular Technology.

[12]  Shiyan Hu,et al.  Design Automation for Interwell Connectivity Estimation in Petroleum Cyber-Physical Systems , 2017, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.

[13]  Stéphane Lafortune,et al.  Synthesis of insertion functions for enforcement of opacity security properties , 2014, Autom..

[14]  Philip S. Yu,et al.  Global privacy and transportation mode homogeneity anonymization in location based mobile systems with continuous queries , 2010, 6th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2010).

[15]  Thomas F. Wenisch,et al.  PowerNap: eliminating server idle power , 2009, ASPLOS.

[16]  Jie Wu,et al.  Dependable Structural Health Monitoring Using Wireless Sensor Networks , 2015, IEEE Transactions on Dependable and Secure Computing.

[17]  Arun Kumar Sangaiah,et al.  PCCA: Position Confidentiality Conserving Algorithm for Content-Protection in e-Governance Services and Applications , 2018, IEEE Transactions on Emerging Topics in Computational Intelligence.

[18]  Arun Kumar Sangaiah,et al.  A quantum-inspired hybrid intelligent position monitoring system in wireless networks , 2017 .

[19]  Yang Xiang,et al.  A CPS framework based perturbation constrained buffer planning approach in VLSI design , 2017, J. Parallel Distributed Comput..

[20]  Abhishek Dubey,et al.  Cyber-Physical Simulation Platform for Security Assessment of Transactive Energy Systems , 2019, 2019 7th Workshop on Modeling and Simulation of Cyber-Physical Energy Systems (MSCPES).

[21]  Edward A. Lee Cyber Physical Systems: Design Challenges , 2008, 2008 11th IEEE International Symposium on Object and Component-Oriented Real-Time Distributed Computing (ISORC).

[22]  Jill Slay,et al.  Lessons Learned from the Maroochy Water Breach , 2007, Critical Infrastructure Protection.