Energy-Aware Green Adversary Model for Cyberphysical Security in Industrial System

被引:88
|
作者
Sangaiah, Arun Kumar [1 ]
Medhane, Darshan Vishwasrao [2 ]
Bian, Gui-Bin [3 ,4 ]
Ghoneim, Ahmed [5 ,6 ]
Alrashoud, Mubarak [5 ]
Hossain, M. Shamim [5 ]
机构
[1] Vellore Inst Technol, Sch Comp Sci & Engn, Vellore 632014, Tamil Nadu, India
[2] Indian Inst Informat Technol, Dept Comp Sci & Engn, Pune 411048, Maharashtra, India
[3] Chinese Acad Sci, Inst Automat, State Key Lab Management & Control Complex Syst, Beijing 100190, Peoples R China
[4] Zhengzhou Univ, Sch Elect Engn, Zhengzhou 450001, Peoples R China
[5] King Saud Univ, Coll Comp & Informat Sci, Dept Software Engn, Riyadh 11543, Saudi Arabia
[6] Menoufia Univ, Fac Sci, Dept Math & Comp Sci, Shibin Al Kawm 32511, Egypt
关键词
Cyber physical system (CPS); energy efficiency; information confidentiality; opacity; position-based services; position confidentiality;
D O I
10.1109/TII.2019.2953289
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Adversary models have been fundamental to the various cryptographic protocols and methods. However, their use in most of the branches of research in computer science is comparatively restricted, primarily in case of the research in cyberphysical security (e.g., vulnerability studies, position confidentiality). In this article, we propose an energy-aware green adversary model for its use in smart industrial environment through achieving confidentiality. Even though, mutually the hardware and the software parts of cyberphysical systems can be improved to decrease its energy consumption, this article focuses on aspects of conserving position and information confidentiality. On the basis of our findings (assumptions, adversary goals, and capabilities) from the literature, we give some testimonials to help practitioners and researchers working in cyberphysical security. The proposed model that runs on real-time anticipatory position-based query scheduling in order to minimize the communication and computation cost for each query, thus, facilitating energy consumption minimization. Moreover, we calculate the transferring/acceptance slots required for each query to avoid deteriorating slots. The experimental results confirm that the proposed approach can diminish energy consumption up to five times in comparison to existing approaches
引用
收藏
页码:3322 / 3329
页数:8
相关论文
共 50 条
  • [1] A survey on energy-aware security mechanisms
    Merlo, Alessio
    Migliardi, Mauro
    Caviglione, Luca
    PERVASIVE AND MOBILE COMPUTING, 2015, 24 : 77 - 90
  • [2] A survey on energy-aware security mechanisms
    Merlo, Alessio
    Migliardi, Mauro
    Caviglione, Luca
    Pervasive and Mobile Computing, 2015, 24 : 77 - 90
  • [3] A survey on energy-aware security mechanisms
    Merlo, Alessio
    Migliardi, Mauro
    Caviglione, Luca
    Pervasive and Mobile Computing, 2015, 24 : 77 - 90
  • [4] A Case for Energy-Aware Security Mechanisms
    Li, Xun
    Chong, Frederic T.
    2013 IEEE 27TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS (WAINA), 2013, : 1541 - 1546
  • [5] Energy-Aware security protocol for IoT devices
    Barari, Malak
    Saifan, Ramzi
    PERVASIVE AND MOBILE COMPUTING, 2023, 96
  • [7] Enabling Green IT through Energy-Aware Software
    Sabharwal, Manuj
    Agrawal, Abhishek
    Metri, Grace
    IT PROFESSIONAL, 2013, 15 (01) : 19 - 27
  • [8] Energy-Aware System Design with SDL
    Gotzhein, Reinhard
    Kraemer, Mare
    Litz, Lothar
    Chamaken, Alain
    SDL 2009: DESIGN FOR MOTES AND MOBILES, PROCEEDINGS, 2009, 5719 : 19 - +
  • [9] A Survey of Green,Energy-Aware Security and Some of its Recent Developments in Networking and Mobile Computing
    Migliardi, Mauro
    Merlo, Alessio
    Caviglione, Luca
    2014 EIGHTH INTERNATIONAL CONFERENCE ON INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING (IMIS), 2014, : 241 - 246
  • [10] A Survey on Energy-Aware Security Mechanisms for the Internet of Things
    He, Peixiong
    Zhou, Yi
    Qin, Xiao
    FUTURE INTERNET, 2024, 16 (04)