Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

A Trust Computing-based Security Routing Scheme for Cyber Physical Systems

Published: 13 November 2019 Publication History

Abstract

Security is a pivotal issue for the development of Cyber Physical Systems (CPS). The trusted computing of CPS includes the complete protection mechanisms, such as hardware, firmware, and software, the combination of which is responsible for enforcing a system security policy. A Trust Detection-based Secured Routing (TDSR) scheme is proposed to establish security routes from source nodes to the data center under malicious environment to ensure network security. In the TDSR scheme, sensor nodes in the routing path send detection routing to identify relay nodes’ trust. And then, data packets are routed through trustworthy nodes to sink securely. In the TDSR scheme, the detection routing is executed in those nodes that have abundant energy; thus, the network lifetime cannot be affected. Performance evaluation through simulation is carried out for success of routing ratio, compromised node detection ratio, and detection routing overhead. The experiment results show that the performance can be improved in the TDSR scheme compared to previous schemes.

References

[1]
Ghada H. Badawy, Amir A. Sayegh, and Terence D. Todd. 2010. Energy provisioning in solar-powered wireless mesh networks. IEEE Trans. Vehic. Technol. 59, 8 (2010), 3859--3871.
[2]
Juan Cota-Ruiz, Pablo Rivas-Perea, Ernesto Sifuentes, and Rafael Gonzalez-Landaeta. 2016. A recursive shortest path routing algorithm with application for wireless sensor network localization. IEEE Sens. J. 16, 11 (2016), 4631--4637.
[3]
Alcaraz Cristina, Xinyi Huang, and Erich Rome. 2018. Security and privacy in cloud-assisted cyber-physical systems. Computer Networks 138 (2018), 13--14.
[4]
Mianxiong Dong, Kaoru Ota, Laurence T. Yang, Anfeng Liu, and Minyi Guo. 2016. LSCD: A low storage clone detecting protocol for cyber-physical systems. IEEE Trans. Comput.-Aided Design Integr. Circ. Syst. 35, 5 (2016), 712--723.
[5]
Béla Genge, Piroska Haller, and Adrian-Vasile Duka. 2019. Engineering security-aware control applications for data authentication in smart industrial cyber--physical systems. Future Gen. Comput. Syst. 91 (2019), 206--222.
[6]
Wenbo He, Xue Liu, Hoang Nguyen, Klara Nahrstedt, and Tarek Abdelzaher. 2007. PDA: Privacy-preserving data aggregation in wireless sensor networks. In Proceedings of the 26th IEEE International Conference on Computer Communications (INFOCOM’07). 2045--2053.
[7]
Ron Hirschprung, Eran Toch, Hadas Schwartz-Chassidim, Tamir Mendel, and Oded Maimon. 2017. Analyzing and optimizing access control choice architectures in online social networks. ACM Trans. Intell. Syst. Technol. 8, 4 (2017), 57.
[8]
Mingfeng Huang, Anfeng Liu, Nealxue Xiong, Tian Wang, and Athanasios. V. Vasilakos. 2019. A low-latency communication scheme for mobile wireless sensor control systems. IEEE Trans. Syst. Man Cybernet.-Syst. 49, 2 (2019), 317--332.
[9]
Xin Ju, Wei Liu, Chengyuan Zhang, Anfeng Liu, Tian Wang, Neal N. Xiong, and Zhiping Cai. 2018. An energy conserving and transmission radius adaptive scheme to optimize performance of energy harvesting sensor networks. Sensors 18, 9 (2018), 2885.
[10]
Zhetao Li, Yuxin Liu, Anfeng Liu, Shiguo Wang, and Haolin Liu. 2018. Minimizing convergecast time and energy consumption in green internet of things. IEEE Trans. Emerg. Top. Comput. In Press.
[11]
Anfeng Liu, Xiao Liu, and Jun Long. 2016. A trust-based adaptive probability marking and storage traceback scheme for WSNs. Sensors 16, 4 (2016), 451.
[12]
Anfeng Liu, Zhongming Zheng, Chao Zhang, Zhigang Chen, and Xuemin (Sherman) Shen. 2012. Secure and energy-efficient disjoint multi-path routing for WSNs. IEEE Trans. Vehic. Technol. 61, 7 (2012), 3255--3265.
[13]
Xiao Liu, Mianxiong Dong, Kaoru Ota, Laurence T. Yang, and Anfeng Liu. 2018a. Trace malicious source to guarantee cyber security for mass monitor critical infrastructure. J. Comput. Syst. Sci. 98 (2018), 1--26.
[14]
Xiao Liu, Yuxin Liu, Anfeng Liu, and Laurence T. Yang. 2018. Defending on-off attacks using light probing messages in smart sensors for industrial communication systems. IEEE Trans. Industr. Informat. 14, 9 (2018), 3801--3811.
[15]
Xiao Liu, Mianxiong Dong, Kaoru Ota, Patrick Hung, and Anfeng Liu. 2016. Service pricing decision in cyber-physical systems: Insights from game theory. IEEE Trans. Serv. Comput. 9, 2 (2016), 186--198.
[16]
Yuxin Liu, Ming Ma, Xiao Liu, Naixue Xiong, Anfeng Liu, and Ying Zhu. 2018. Design and analysis of probing route to defense sink-hole attacks for internet of things security. IEEE Trans. Netw. Sci. Eng. In Press.
[17]
Yuxin Liu, Mianxiong Dong, Kaoru Ota, and Anfeng Liu. 2016. ActiveTrust: Secure and trustable routing in wireless sensor networks. IEEE Trans. Info. Forens. Secur. 11, 9 (2016), 2013--2027.
[18]
Yuxin Liu, Anfeng Liu, and Sheng He. 2015. A novel joint logging and migrating traceback scheme for achieving low storage requirement and long lifetime in WSNs. AEU-International J. Electron. Commun. 69, 10 (2015), 1434--8411.
[19]
Nikhil Muralidhar, Chen Wang, Nathan Self, Marjan Momtazpour, Kiyoshi Nakayama, Ratnesh Sharma, and Naren Ramakrishnan. 2018. illiad: InteLLigent invariant and anomaly detection in cyber-physical systems. ACM Trans. Intell. Syst. Technol. 9, 3 (2018), 35.
[20]
Hamed Orojloo and Mohammad Abdollahi Azgomi. 2018. A stochastic game model for evaluating the impacts of security attacks against cyber-physical systems. J. Netw. Syst. Manage. 26, 4 (2018), 929--965.
[21]
Zhou Su, Yuntao Wang, Qichao Xu, Minrui Fei, Yu-Chu Tian, and Ning Zhang. 2018. A secure charging scheme for electric vehicles with smart communities in energy blockchain. IEEE Internet Things J.
[22]
Tao Shu, Marwan Krunz, and Sisi Liu. 2010. Secure data collection in wireless sensor networks using randomized dispersive routes. IEEE Trans. Mobile Comput. 9, 7 (2010), 941--954.
[23]
Jiawei Tan, Wei Liu, Mande Xie, Houbing Song, Anfeng Liu, Ming Zhao, and Guoping Zhang. 2019. A low redundancy data collection scheme to maximize lifetime using matrix completion technique. EURASIP J. Wireless Commun. Netw. 5 (2019).
[24]
Jiawei Tang, Anfeng Liu, Jian Zhang, Zhiwen Zeng, Neal N. Xiong, and Tian Wang. 2018. A security routing scheme using traceback approach for energy harvesting sensor networks. Sensors 18, 3 (2018), 751.
[25]
Tian Wang, Yang Li, Yonghong Chen, Hui Tian, Yiqiao Cai, Weijia Jia, and Baowei Wang. 2017. Fog-based evaluation approach for trustworthy communication in sensor-cloud system. IEEE Commun. Lett. 21, 11 (2017), 2532--2535.
[26]
OMNET++ simulator. 2016. Retrieved from http://www.omnetpp.org/.

Cited By

View all
  • (2024)Directional Antenna-Based Routing Protocol With Low Detection Probability in Airborne NetworksIEEE Sensors Journal10.1109/JSEN.2023.334932524:5(6919-6929)Online publication date: 1-Mar-2024
  • (2024)Copycat perceptron: Smashing barriers through collective learningPhysical Review E10.1103/PhysRevE.109.065313109:6Online publication date: 28-Jun-2024
  • (2022)Cybersecurity of Industrial Cyber-Physical Systems: A ReviewACM Computing Surveys10.1145/351041054:11s(1-35)Online publication date: 9-Sep-2022
  • Show More Cited By

Index Terms

  1. A Trust Computing-based Security Routing Scheme for Cyber Physical Systems

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Transactions on Intelligent Systems and Technology
    ACM Transactions on Intelligent Systems and Technology  Volume 10, Issue 6
    Special Section on Intelligent Edge Computing for Cyber Physical and Cloud Systems and Regular Papers
    November 2019
    267 pages
    ISSN:2157-6904
    EISSN:2157-6912
    DOI:10.1145/3368406
    Issue’s Table of Contents
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 13 November 2019
    Accepted: 01 March 2019
    Revised: 01 February 2019
    Received: 01 December 2018
    Published in TIST Volume 10, Issue 6

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Cyber physical systems
    2. data collection
    3. malicious attacks
    4. trust-based routing

    Qualifiers

    • Research-article
    • Research
    • Refereed

    Funding Sources

    • National Natural Science Foundation of China

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)18
    • Downloads (Last 6 weeks)1
    Reflects downloads up to 09 Nov 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Directional Antenna-Based Routing Protocol With Low Detection Probability in Airborne NetworksIEEE Sensors Journal10.1109/JSEN.2023.334932524:5(6919-6929)Online publication date: 1-Mar-2024
    • (2024)Copycat perceptron: Smashing barriers through collective learningPhysical Review E10.1103/PhysRevE.109.065313109:6Online publication date: 28-Jun-2024
    • (2022)Cybersecurity of Industrial Cyber-Physical Systems: A ReviewACM Computing Surveys10.1145/351041054:11s(1-35)Online publication date: 9-Sep-2022
    • (2022)Intelligent resource allocation management for vehicles networkComputer Communications10.1016/j.comcom.2019.12.054151:C(485-494)Online publication date: 22-Apr-2022
    • (2022)Trust Management for Cyber-Physical SystemsEncyclopedia of Cryptography, Security and Privacy10.1007/978-3-642-27739-9_1733-2(1-7)Online publication date: 21-Oct-2022
    • (2021)BD-VTE: A Novel Baseline Data Based Verifiable Trust Evaluation Scheme for Smart Network SystemsIEEE Transactions on Network Science and Engineering10.1109/TNSE.2020.30144558:3(2087-2105)Online publication date: 1-Jul-2021
    • (2021)PDM: Privacy-Aware Deployment of Machine-Learning Applications for Industrial Cyber–Physical Cloud SystemsIEEE Transactions on Industrial Informatics10.1109/TII.2020.303144017:8(5819-5828)Online publication date: Aug-2021
    • (2021)ATTDC: An Active and Traceable Trust Data Collection Scheme for Industrial Security in Smart CitiesIEEE Internet of Things Journal10.1109/JIOT.2021.30491738:8(6437-6453)Online publication date: 15-Apr-2021
    • (2021)Adaptive Contention Window MAC Protocol in a Global View for Emerging Trends NetworksIEEE Access10.1109/ACCESS.2021.30540159(18402-18423)Online publication date: 2021
    • (2021)A low-cost physical location discovery scheme for large-scale Internet of Things in smart city through joint use of vehicles and UAVsFuture Generation Computer Systems10.1016/j.future.2021.01.032118(310-326)Online publication date: May-2021
    • Show More Cited By

    View Options

    Get Access

    Login options

    Full Access

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format.

    HTML Format

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media