Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

System-Level Design Optimization for Security-Critical Cyber-Physical-Social Systems

Published: 14 April 2017 Publication History

Abstract

Cyber-physical-social systems (CPSS), an emerging computing paradigm, have attracted intensive attentions from the research community and industry. We are facing various challenges in designing secure, reliable, and user-satisfied CPSS. In this article, we consider these design issues as a whole and propose a system-level design optimization framework for CPSS design where energy consumption, security-level, and user satisfaction requirements can be fulfilled while satisfying constraints for system reliability. Specifically, we model the constraints (energy efficiency, security, and reliability) as the penalty functions to be incorporated into the corresponding objective functions for the optimization problem. A smart office application is presented to demonstrate the feasibility and effectiveness of our proposed design optimization approach.

References

[1]
Kalyanmoy Deb, Amrit Pratap, Sameer Agarwal, and TAMT Meyarivan. 2002. A fast and elitist multiobjective genetic algorithm: NSGA-II. IEEE Transactions on Evolutionary Computation 6, 2, 182--197.
[2]
M. D. Galanis, P. Kitsos, G. Kostopoulos, N. Sklavos, O. Koufopavlou, and C. E. Goutis. 2004. Comparison of the hardware architectures and FPGA implementations of stream ciphers. In Proceedings of the 11th IEEE International Conference on Electronics, Circuits, and Systems (ICECS’04). IEEE, Los Alamitos, CA, 571--574.
[3]
Junhe Gan, Flavius Gruian, Paul Pop, and Jan Madsen. 2011. Energy/reliability trade-offs in fault-tolerant event-triggered distributed embedded systems. In Proceedings of the 16th Asia and South Pacific Design Automation Conference. IEEE, Los Alamitos, CA, 731--736.
[4]
Abdullah Konak, David W. Coit, and Alice E. Smith. 2006. Multi-objective optimization using genetic algorithms: A tutorial. Reliability Engineering and System Safety 91, 9, 992--1007.
[5]
Philip Koopman. 2004. Embedded system security. IEEE Computer 37, 7, 95--97.
[6]
Stacey Kuznetsov and Eric Paulos. 2010. Participatory sensing in public spaces: Activating urban surfaces with sensor probes. In Proceedings of the 8th ACM Conference on Designing Interactive Systems. ACM, New York, NY, 21--30.
[7]
M. Lin, Y. Pan, L. T. Yang, M. Guo, and N. Zheng. 2013. Scheduling co-design for reliability and energy in cyber-physical systems. IEEE Transactions on Emerging Topics in Computing 1, 2, 353--365.
[8]
M. Lin, L. Xu, L. T. Yang, X. Qin, N. Zheng, Z. Wu, and M. Qiu. 2009. Static security optimization for real-time systems. IEEE Transactions on Industrial Informatics 5, 1, 22--37.
[9]
Y. Liu, H. Yang, R. P. Dick, H. Wang, and L. Shang. 2007. Thermal vs energy optimization for DVFS-enabled processors in embedded systems. In Proceedings of 8th International Symposium on Quality Electronic Design (ISQED’07). 204--209.
[10]
Huansheng Ning and Hong Liu. 2012. Cyber-physical-social based security architecture for future Internet of Things. Advances in Internet of Things 2, 1, 1.
[11]
Sean Peisert, Jonathan Margulies, David M. Nicol, Himanshu Khurana, and Chris Sawall. 2014. Designed-in security for cyber-physical systems. IEEE Security and Privacy 12, 5, 9--12.
[12]
Paul Pop, Kåre Harbo Poulsen, Viacheslav Izosimov, and Petru Eles. 2007. Scheduling and voltage scaling for energy/reliability trade-offs in fault-tolerant time-triggered embedded systems. In Proceedings of the 5th IEEE/ACM International Conference on Hardware/Software Codesign and System Synthesis. ACM, New York, NY, 233--238.
[13]
Chao Qian, Changqing Luo, Fei Hao, Laurence T. Yang, and Geyong Min. 2013. Energy-efficient dynamic network selection in heterogeneous wireless networks. In Proceedings of the 2013 IEEE Green Computing and Communications Conference (GreenCom’13). IEEE, Los Alamitos, CA, 71--76.
[14]
Anand Ranganathan, Jalal Al-Muhtadi, Jacob Biehl, Brian Ziebart, Roy H. Campbell, and Brian Bailey. 2005. Towards a pervasive computing benchmark. In Proceedings of the 3rd IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom’05). IEEE, Los Alamitos, CA, 194--198.
[15]
Gaël Rouvroy, François-Xavier Standaert, Jean-Jacques Quisquater, and Jean-Didier Legat. 2004. Compact and efficient encryption/decryption module for FPGA implementation of the AES Rijndael very well suited for small embedded applications. In Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC’04), Vol. 2. IEEE, Los Alamitos, CA, 583--587.
[16]
Kiran Seth, Aravindh Anantaraman, Frank Mueller, and Eric Rotenberg. 2006. Fast: Frequency-aware static timing analysis. ACM Transactions on Embedded Computing Systems 5, 1, 200--224.
[17]
A. Sheth, P. Anantharam, and C. Henson. 2013. Physical-cyber-social computing: An early 21st century approach. IEEE Intelligent Systems 28, 1, 78--82.
[18]
Alexander Smirnov, Alexey Kashevnik, and Andrew Ponomarev. 2015. Multi-level self-organization in cyber-physical-social systems: Smart home cleaning scenario. Procedia CIRP 30, 329--334.
[19]
Mandavilli Srinivas and Lalit M. Patnaik. 1994. Genetic algorithms: A survey. IEEE Computer 27, 6, 17--26.
[20]
T. S. B. Sudarshan, R. Mir, and S. Vijayalakshmi. 2005. DRILC: A flexible architecture for blowfish encryption using dynamic reconfiguration, replication, inner-loop pipelining, loop folding techniques. In Advances in Computer Systems Architecture, Lecture Notes in Computer Science, Vol. 3740. Springer, 625--639.
[21]
Alessandro Vinciarelli, Maja Pantic, Dirk Heylen, Catherine Pelachaud, Isabella Poggi, Francesca D’Errico, and Marc Schröder. 2012. Bridging the gap between social animal and unsocial machine: A survey of social signal processing. IEEE Transactions on Affective Computing 3, 1, 69--87.
[22]
Gregor Von Laszewski, Lizhe Wang, Andrew J. Younge, and Xi He. 2009. Power-aware scheduling of virtual machines in DVFS-enabled clusters. In Proceedings of the IEEE International Conference on Cluster Computing and Workshops (CLUSTER’09). IEEE, Los Alamitos, CA, 1--10.
[23]
Fei-Yue Wang. 2010. The emergence of intelligent enterprises: From CPS to CPSS. IEEE Intelligent Systems 25, 4, 85--88.
[24]
Chin Mun Wee, Peter R. Sutton, and Neil W. Bergmann. 2005. An FPGA network architecture for accelerating 3DES-CBC. In Proceedings of the International Conference on Field Programmable Logic and Applications. IEEE, Los Alamitos, CA, 654--657.
[25]
Tao Xie and Xiao Qin. 2006. Scheduling security-critical real-time applications on clusters. IEEE Transactions on Computers 55, 7, 864--879.
[26]
Gang Xiong, Fenghua Zhu, Xiwei Liu, Xisong Dong, Wuling Huang, Songhang Chen, and Kai Zhao. 2015. Cyber-physical-social system in intelligent transportation. IEEE/CAA Journal of Automatica Sinica 2, 3, 320--333.
[27]
Yuqiong Xu, Shijian Li, Zhaohui Wu, and Gang Pan. 2013. An intensive location-aware framework for device-involved human tasks. In Proceedings of the IEEE 10th International Conference on High Performance Computing and Communications (HPCC’13). 2135--2142.
[28]
Jing Zeng, Laurence T. Yang, and Jianhua Ma. 2016. A system-level modeling and design for cyber-physical-social systems. ACM Transactions on Embedded Computing Systems 15, 2, Article No. 35.
[29]
Dakai Zhu and Hakan Aydin. 2006. Energy management for real-time embedded systems with reliability requirements. In Proceedings of the 2006 IEEE/ACM International Conference on Computer-Aided Design. ACM, New York, NY, 528--534.
[30]
Dakai Zhu and Hakan Aydin. 2009. Reliability-aware energy management for periodic real-time tasks. IEEE Transactions on Computers 58, 10, 1382--1397.
[31]
Dakai Zhu, Rami Melhem, and Daniel Mosse. 2004. The effects of energy management on reliability in real-time embedded systems. In Proceedings of the 2004 IEEE/ACM International Conference on Computer-Aided Design (ICCAD’04). 35--40.

Cited By

View all
  • (2024)A Secure and Fast Range Query Scheme for Encrypted Multi-Dimensional DataInternational Journal of Web Services Research10.4018/IJWSR.34039121:1(1-17)Online publication date: 9-Apr-2024
  • (2023)Toward an Analysis Method of Software Evolution Triggered by Place Change in Mobile ComputingIEEE Transactions on Reliability10.1109/TR.2022.319319272:2(527-541)Online publication date: Jun-2023
  • (2022)Cyber-Physical-Social Systems: Taxonomy, Challenges, and OpportunitiesIEEE Access10.1109/ACCESS.2022.316744110(42404-42419)Online publication date: 2022
  • Show More Cited By

Index Terms

  1. System-Level Design Optimization for Security-Critical Cyber-Physical-Social Systems

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Transactions on Embedded Computing Systems
    ACM Transactions on Embedded Computing Systems  Volume 16, Issue 2
    Special Issue on LCETES 2015, Special Issue on ACSD 2015 and Special Issue on Embedded Devise Forensics and Security
    May 2017
    705 pages
    ISSN:1539-9087
    EISSN:1558-3465
    DOI:10.1145/3025020
    Issue’s Table of Contents
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Journal Family

    Publication History

    Published: 14 April 2017
    Accepted: 01 April 2016
    Revised: 01 January 2016
    Received: 01 August 2015
    Published in TECS Volume 16, Issue 2

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Cyber-physical-social systems
    2. design optimization
    3. pervasive computing
    4. security critical
    5. system-level design

    Qualifiers

    • Research-article
    • Research
    • Refereed

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)8
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 16 Oct 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)A Secure and Fast Range Query Scheme for Encrypted Multi-Dimensional DataInternational Journal of Web Services Research10.4018/IJWSR.34039121:1(1-17)Online publication date: 9-Apr-2024
    • (2023)Toward an Analysis Method of Software Evolution Triggered by Place Change in Mobile ComputingIEEE Transactions on Reliability10.1109/TR.2022.319319272:2(527-541)Online publication date: Jun-2023
    • (2022)Cyber-Physical-Social Systems: Taxonomy, Challenges, and OpportunitiesIEEE Access10.1109/ACCESS.2022.316744110(42404-42419)Online publication date: 2022
    • (2020)A Blockchain-Based Access Control Framework for Cyber-Physical-Social System Big DataIEEE Access10.1109/ACCESS.2020.29889518(77215-77226)Online publication date: 2020
    • (2019)Data fusion in cyber-physical-social systems: State-of-the-art and perspectivesInformation Fusion10.1016/j.inffus.2018.11.00251(42-57)Online publication date: Nov-2019
    • (2018)Dependability in Cyber-Physical Systems and ApplicationsACM Transactions on Cyber-Physical Systems10.1145/32714323:1(1-4)Online publication date: 29-Sep-2018
    • (2018)Smart Space Concepts, Properties and ArchitecturesIEEE Access10.1109/ACCESS.2018.28807946(70088-70112)Online publication date: 2018
    • (2018)Electromagnetic radiation based continuous authentication in edge computing enabled internet of thingsJournal of Systems Architecture10.1016/j.sysarc.2018.12.003Online publication date: Dec-2018
    • (2017)Cyber Physical System (CPS)-Based Industry 4.0: A SurveyJournal of Industrial Integration and Management10.1142/S242486221750014202:03(1750014)Online publication date: Sep-2017

    View Options

    Get Access

    Login options

    Full Access

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media