Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Tolerance Analysis of Cyber-Manufacturing Systems to Cascading Failures

Published: 17 November 2023 Publication History

Abstract

In practical cyber-manufacturing systems (CMS), the node component is the forwarder of information and the provider of services. This dual role makes the whole system have the typical physical-services interaction characteristic, making CMS more vulnerable to cascading failures than general manufacturing systems. In this work, in order to reasonably characterize the cascading process of CMS, we first develop an interdependent network model for CMS from a physical-service networking perspective. On this basis, a realistic cascading failure model for CMS is designed with full consideration of the routing-oriented load distribution characteristics of the physical network and selective load distribution characteristics of the service network. Through extensive experiments, the soundness of the proposed model has been verified and some meaningful findings have been obtained: (1) attacks on the physical network are more likely to trigger cascading failures and may cause more damage; (2) interdependency failures are the main cause of performance degradation in the service network during cascading failures; and (3) isolation failures are the main cause of performance degradation in the physical network during cascading failures. The obtained results can certainly help users to design a more reliable CMS against cascading failures.

References

[1]
Komal Batool and Muaz A. Niazi. 2017. Modeling the Internet of Things: A hybrid modeling approach using complex networks and agent-based models. Complex Adaptive Systems Modeling 5, 1 (2017), 1–19.
[2]
Djallel Eddine Boubiche, Al-Sakib Khan Pathan, Jaime Lloret, Huiyu Zhou, Seongik Hong, Syed Obaid Amin, and Mohamed Ali Feki. 2018. Advanced industrial wireless sensor networks and intelligent IoT. IEEE Communications Magazine 56, 2 (2018), 14–15.
[3]
Ye Cai, Yong Li, Yijia Cao, Wenguo Li, and Xiangjun Zeng. 2017. Modeling and impact analysis of interdependent characteristics on cascading failures in smart grids. International Journal of Electrical Power & Energy Systems 89 (2017), 106–114.
[4]
Ning Chen, Tie Qiu, Zilong Lu, and Dapeng Oliver Wu. 2021. An adaptive robustness evolution algorithm with self-competition and its 3d deployment for Internet of Things. IEEE/ACM Transactions on Networking 30, 1 (2021), 368–381.
[5]
Ying Duan, Wenfeng Li, Xiuwen Fu, Yun Luo, and Lin Yang. 2017. A methodology for reliability of WSN based on software defined network in adaptive industrial environment. IEEE/CAA Journal of Automatica Sinica 5, 1 (2017), 74–82.
[6]
Santiago Egea, Albert Rego Mañez, Belen Carro, Antonio Sánchez-Esguevillas, and Jaime Lloret. 2017. Intelligent IoT traffic classification using novel search strategy for fast-based-correlation feature selection in industrial environments. IEEE Internet of Things Journal 5, 3 (2017), 1616–1624.
[7]
Xiuwen Fu, Pasquale Pace, Gianluca Aloi, Lin Yang, and Giancarlo Fortino. 2020. Topology optimization against cascading failures on wireless sensor networks using a memetic algorithm. Computer Networks 177 (2020), 107327.
[8]
Xiuwen Fu and Yongsheng Yang. 2021. Modeling and analyzing cascading failures for Internet of Things. Information Sciences 545 (2021), 753–770.
[9]
Xiuwen Fu, Yongsheng Yang, and Octavian Postolache. 2018. Invulnerability of clustering wireless sensor networks against cascading failures. IEEE Systems Journal 13, 2 (2018), 1431–1442.
[10]
Xiuwen Fu, Haiqing Yao, and Yongsheng Yang. 2019. Modeling and analyzing cascading dynamics of the clustered wireless sensor network. Reliability Engineering & System Safety 186 (2019), 1–10.
[11]
Conner J. Goodrum, Colin P. F. Shields, and David J. Singer. 2018. Understanding cascading failures through a vulnerability analysis of interdependent ship-centric distributed systems using networks. Ocean Engineering 150 (2018), 36–47.
[12]
Shidrokh Goudarzi, Mohammad Hossein Anisi, Abdul Hanan Abdullah, Jaime Lloret, Seyed Ahmad Soleymani, and Wan Haslina Hassan. 2019. A hybrid intelligent model for network selection in the industrial Internet of Things. Applied Soft Computing 74 (2019), 529–546.
[13]
Mohammad Mehedi Hassan, Shamsul Huda, Shaila Sharmeen, Jemal Abawajy, and Giancarlo Fortino. 2020. An adaptive trust boundary protection for IIoT networks using deep-learning feature-extraction-based semisupervised model. IEEE Transactions on Industrial Informatics 17, 4 (2020), 2860–2870.
[14]
Zhen Huang, Cheng Wang, Amiya Nayak, and Ivan Stojmenovic. 2014. Small cluster in cyber physical systems: Network topology, interdependence and cascading failures. IEEE Transactions on Parallel and Distributed Systems 26, 8 (2014), 2340–2351.
[15]
Sabina Jeschke, Christian Brecher, Tobias Meisen, Denis Özdemir, and Tim Eschert. 2017. Industrial Internet of Things and cyber manufacturing systems. In Industrial Internet of Things. Springer, 3–19.
[16]
Lily Lee and Po Hu. 2019. Vulnerability analysis of cascading dynamics in smart grids under load redistribution attacks. International Journal of Electrical Power & Energy Systems 111 (2019), 182–190.
[17]
Pei Li, Ying Cheng, and Fei Tao. 2020. Failures detection and cascading analysis of manufacturing services collaboration toward industrial Internet platforms. Journal of Manufacturing Systems 57 (2020), 169–181.
[18]
Yun Luo, Ying Duan, Wenfeng Li, Pasquale Pace, and Giancarlo Fortino. 2018. Workshop networks integration using mobile intelligence in smart factories. IEEE Communications Magazine 56, 2 (2018), 68–75.
[19]
Pin Ni, Yuming Li, Gangmin Li, and Victor Chang. 2021. A hybrid Siamese neural network for natural language inference in cyber-physical systems. ACM Transactions on Internet Technology 21, 2 (2021), 1–25.
[20]
Gurobi Optimization. Inc. 2015. GurobiOptimizer Reference Manual. (2015).
[21]
Mahshid Rahnamay-Naeini and Majeed M. Hayat. 2016. Cascading failures in interdependent infrastructures: An interdependent Markov-chain approach. IEEE Transactions on Smart Grid 7, 4 (2016), 1997–2006.
[22]
Edward R. Scheinerman. 2008. Matgraph: A MATLAB toolbox for graph theory. Department of Applied Mathematics and Statistics, the Johns Hopkins University, Baltimore, Maryland (2008), 1–7.
[23]
Xiaojun Gene Shan and Jun Zhuang. 2020. A game-theoretic approach to modeling attacks and defenses of smart grids at three levels. Reliability Engineering & System Safety 195 (2020), 106683.
[24]
Wen Sun, Jiajia Liu, and Yanlin Yue. 2019. AI-enhanced offloading in edge computing: When machine learning meets industrial IoT. IEEE Network 33, 5 (2019), 68–74.
[25]
Liang Tang, Ke Jing, Jie He, and H. Eugene Stanley. 2016. Robustness of assembly supply chain networks by considering risk propagation and cascading failure. Physica A: Statistical Mechanics and its Applications 459 (2016), 129–139.
[26]
Tian Wang, Pan Wang, Shaobin Cai, Ying Ma, Anfeng Liu, and Mande Xie. 2019. A unified trustworthy environment establishment based on edge computing in industrial IoT. IEEE Transactions on Industrial Informatics 16, 9 (2019), 6083–6091.
[27]
Yingcong Wang and Fengpeng Zhang. 2018. Modeling and analysis of under-load-based cascading failures in supply chain networks. Nonlinear Dynamics 92, 3 (2018), 1403–1417.
[28]
Liudong Xing. 2020. Cascading failures in Internet of things: Review and perspectives on reliability and resilience. IEEE Internet of Things Journal 8, 1 (2020), 44–64.
[29]
Yuyu Yin, Haoran Xu, Tingting Liang, Manman Chen, Honghao Gao, and Antonella Longo. 2021. Leveraging data augmentation for service QoS prediction in cyber-physical systems. ACM Transactions on Internet Technology 21, 2 (2021), 1–25.
[30]
Ziyu Zeng, Tao Ding, Yiting Xu, Yongheng Yang, and Zhaoyang Dong. 2019. Reliability evaluation for integrated power-gas systems with power-to-gas and gas storages. IEEE Transactions on Power Systems 35, 1 (2019), 571–583.
[31]
Yingrui Zhang and Osman Yağan. 2019. Robustness of interdependent cyber-physical systems against cascading failures. IEEE Trans. Automat. Control 65, 2 (2019), 711–726.
[32]
Jian Zhou, David W. Coit, Frank A. Felder, and Dali Wang. 2021. Resiliency-based restoration optimization for dependent network systems against cascading failures. Reliability Engineering & System Safety 207 (2021), 107383.

Cited By

View all
  • (2025)Systematic review and future perspectives on cascading failures in Internet of Things: Modeling and optimizationReliability Engineering & System Safety10.1016/j.ress.2024.110582254(110582)Online publication date: Feb-2025
  • (2025)A novel IoT-based adaptive protection scheme for active DC distribution systems incorporating networked microgridsElectric Power Systems Research10.1016/j.epsr.2024.111113238(111113)Online publication date: Jan-2025
  • (2025)Location-aware job scheduling for IoT systems using cloud and fogAlexandria Engineering Journal10.1016/j.aej.2024.09.055110(346-362)Online publication date: Jan-2025
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Transactions on Internet Technology
ACM Transactions on Internet Technology  Volume 23, Issue 4
November 2023
249 pages
ISSN:1533-5399
EISSN:1557-6051
DOI:10.1145/3633308
  • Editor:
  • Ling Liu
Issue’s Table of Contents

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 17 November 2023
Online AM: 12 January 2023
Accepted: 21 December 2022
Revised: 02 November 2022
Received: 17 March 2022
Published in TOIT Volume 23, Issue 4

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Cyber-manufacturing
  2. cascading failures
  3. network model
  4. load distribution

Qualifiers

  • Research-article

Funding Sources

  • National Natural Science Foundation of China (NSFC)
  • China Postdoctoral Science Foundation
  • Science and Technology Commission of Shanghai Municipality
  • Italian MIUR, PRIN 2017 Project “Fluidware: a Novel Approach for Large-Scale IoT Systems”

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)257
  • Downloads (Last 6 weeks)48
Reflects downloads up to 12 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2025)Systematic review and future perspectives on cascading failures in Internet of Things: Modeling and optimizationReliability Engineering & System Safety10.1016/j.ress.2024.110582254(110582)Online publication date: Feb-2025
  • (2025)A novel IoT-based adaptive protection scheme for active DC distribution systems incorporating networked microgridsElectric Power Systems Research10.1016/j.epsr.2024.111113238(111113)Online publication date: Jan-2025
  • (2025)Location-aware job scheduling for IoT systems using cloud and fogAlexandria Engineering Journal10.1016/j.aej.2024.09.055110(346-362)Online publication date: Jan-2025
  • (2024)Renewable Energy Credits Transforming Market DynamicsSustainability10.3390/su1619860216:19(8602)Online publication date: 3-Oct-2024
  • (2024)A Human–Machine Interaction Mechanism: Additive Manufacturing for Industry 5.0—Design and ManagementSustainability10.3390/su1610415816:10(4158)Online publication date: 15-May-2024
  • (2024)Biosensor-Driven IoT Wearables for Accurate Body Motion Tracking and LocalizationSensors10.3390/s2410303224:10(3032)Online publication date: 10-May-2024
  • (2024)Building integrated assessment model for IoT technology deployment in the Industry 4.0Journal of Cloud Computing10.1186/s13677-024-00718-513:1Online publication date: 14-Nov-2024
  • (2024)Towards blockchain based federated learning in categorizing healthcare monitoring devices on artificial intelligence of medical things investigative frameworkBMC Medical Imaging10.1186/s12880-024-01279-424:1Online publication date: 10-May-2024
  • (2024)Detection of top-r spreader influential nodes on the Social Internet of Things networks to maximize spreading influenceThe European Physical Journal Plus10.1140/epjp/s13360-024-05538-9139:9Online publication date: 6-Sep-2024
  • (2024)Secure Bearing-Based Target Localization for Multi-Agent Networks Against Malicious AgentsIEEE Transactions on Automation Science and Engineering10.1109/TASE.2023.331933421:4(5812-5825)Online publication date: Oct-2024
  • Show More Cited By

View Options

Get Access

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Full Text

View this article in Full Text.

Full Text

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media