scholarly journals SNPL: One Scheme of Securing Nodes in IoT Perception Layer

Sensors ◽  
2020 ◽  
Vol 20 (4) ◽  
pp. 1090 ◽  
Author(s):  
Yongkai Fan ◽  
Guanqun Zhao ◽  
Kuan-Ching Li ◽  
Bin Zhang ◽  
Gang Tan ◽  
...  

The trustworthiness of data is vital data analysis in the age of big data. In cyber-physical systems, most data is collected by sensors. With the increase of sensors as Internet of Things (IoT) nodes in the network, the security risk of data tampering, unauthorized access, false identify, and others are overgrowing because of vulnerable nodes, which leads to the great economic and social loss. This paper proposes a security scheme, Securing Nodes in IoT Perception Layer (SNPL), for protecting nodes in the perception layer. The SNPL is constructed by novel lightweight algorithms to ensure security and satisfy performance requirements, as well as safety technologies to provide security isolation for sensitive operations. A series of experiments with different types and numbers of nodes are presented. Experimental results and performance analysis show that SNPL is efficient and effective at protecting IoT from faulty or malicious nodes. Some potential practical application scenarios are also discussed to motivate the implementation of the proposed scheme in the real world.

Author(s):  
Linlin Zhang ◽  
Zehui Zhang ◽  
Cong Guan

AbstractFederated learning (FL) is a distributed learning approach, which allows the distributed computing nodes to collaboratively develop a global model while keeping their data locally. However, the issues of privacy-preserving and performance improvement hinder the applications of the FL in the industrial cyber-physical systems (ICPSs). In this work, we propose a privacy-preserving momentum FL approach, named PMFL, which uses the momentum term to accelerate the model convergence rate during the training process. Furthermore, a fully homomorphic encryption scheme CKKS is adopted to encrypt the gradient parameters of the industrial agents’ models for preserving their local privacy information. In particular, the cloud server calculates the global encrypted momentum term by utilizing the encrypted gradients based on the momentum gradient descent optimization algorithm (MGD). The performance of the proposed PMFL is evaluated on two common deep learning datasets, i.e., MNIST and Fashion-MNIST. Theoretical analysis and experiment results confirm that the proposed approach can improve the convergence rate while preserving the privacy information of the industrial agents.


Author(s):  
Jiayi Su ◽  
Yuqin Weng ◽  
Susan C. Schneider ◽  
Edwin E. Yaz

Abstract In this work, a new approach to detect sensor and actuator intrusion for Cyber-Physical Systems using a bank of Kalman filters is presented. The case where the unknown type of the intrusion signal is considered first, using two Kalman filters in a bank to provide the conditional state estimates, then the unknown type of intrusion signal can be detected properly via the adaptive estimation algorithm. The case where the target (either sensor or actuator) of the intrusion signal is unknown is also considered, using four Kalman filters in a bank designed to detect if the intrusion signal is about to affect healthy sensor or actuator signal. To test these methods, a DC motor speed control system subject to attack by different types of sensor and actuator signals is simulated. Simulations show that different types of sensor and actuator intrusion signals can be detected properly without the knowledge of the nature and the type of these signals.


2020 ◽  
Vol 2020 ◽  
pp. 1-18
Author(s):  
Aisha Kanwal Junejo ◽  
Nikos Komninos

In this paper, a lightweight attribute-based security scheme based on elliptic curve cryptography (ECC) is proposed for fog-enabled cyber physical systems (Fog-CPS). A novel aspect of the proposed scheme is that the communication between Fog-CPS entities is secure even when the certification authority (CA) is compromised. This is achieved by dividing the attributes into two sets, namely, secret and shared, and subsequently generating two key pairs, referred to as the partial and final key pairs, for each entity of the Fog-CPS system. Unlike existing attribute-based encryption (ABE) and identity-based encryption schemes, in the proposed scheme, each entity calculates the final public key of the communicating CPS devices without the need of generating and transmitting digital certificates. Moreover, the proposed security scheme considers an efficient and secure key pair update approach in which the calculation overhead is limited to one group element. To show the effectiveness of the proposed scheme, we have calculated and compared the memory and processing complexity with other bilinear and elliptic curve schemes. We have also implemented our scheme in a Raspberry Pi (3B+ model) for CPS simulations. The proposed scheme guarantees the confidentiality, integrity, privacy, and authenticity in Fog-CPS systems.


Information ◽  
2019 ◽  
Vol 10 (11) ◽  
pp. 343 ◽  
Author(s):  
Nelson H. Carreras Guzman ◽  
Adam Gergo Mezovari

From autonomous vehicles to robotics and machinery, organizations are developing autonomous transportation systems in various domains. Strategic incentives point towards a fourth industrial revolution of cyber–physical systems with higher levels of automation and connectivity throughout the Internet of Things (IoT) that interact with the physical world. In the construction and mining sectors, these developments are still at their infancy, and practitioners are interested in autonomous solutions to enhance efficiency and reliability. This paper illustrates the enhanced design of a driverless bulldozer prototype using IoT-based solutions for the remote control and navigation tracking of the mobile machinery. We illustrate the integration of a cloud application, communication protocols and a wireless communication network to control a small-scale bulldozer from a remote workstation. Furthermore, we explain a new tracking functionality of work completion using maps and georeferenced indicators available via a user interface. Finally, we provide a preliminary safety and security risk assessment of the system prototype and propose guidance for application in real-scale machinery.


2015 ◽  
Vol 33 (4/5) ◽  
pp. 337-353 ◽  
Author(s):  
Carmo Gonçalves de Carvalho ◽  
Inês Flores-Colen ◽  
Paulina Faria

Purpose – The purpose of this paper is to present a proposal for a methodology to support the rehabilitation project of renders of old buildings. Design/methodology/approach – To achieve the objective it was considered essential to define the main types of participants and aspects to integrate the proposal. The research methodology consists in an inquiry presented to several professional participants in rehabilitation, a market study of materials and products available in Portugal, the design of a methodology proposal and its application to a case study. The inquiry sample totals 24 answers from the targeted professionals. A sequence of relevant supporting procedures consists in the proposal, which aims to provide a supporting methodology to decide and project in this context and also to be tested with its application to the building. This proposal was applied to an old building with load-bearing stone masonry walls and air-lime-based renders. Findings – It was concluded that the assessment of the building and ex+ternal renderings’ condition, its diagnosis and of the supporting walls, the definition of intervention, the specification of materials to be used and performance requirements to comply, and also plans for conservation and periodic maintenance, are crucial. From the inquiry, compatibility between materials and complementary roles and points of view of different types of participants in rehabilitation must be highlighted. Originality/value – A proposal for a methodology to support the project could provide useful guidance particularly for architects and construction engineers, and improve the understanding of direct participants on site, therefore contributing for the correct implementation of the intervention.


2021 ◽  
Vol 5 (3) ◽  
pp. 1-32
Author(s):  
Georgios Bakirtzis ◽  
Cody H. Fleming ◽  
Christina Vasilakopoulou

Cyber-physical systems require the construction and management of various models to assure their correct, safe, and secure operation. These various models are necessary because of the coupled physical and computational dynamics present in cyber-physical systems. However, to date the different model views of cyber-physical systems are largely related informally, which raises issues with the degree of formal consistency between those various models of requirements, system behavior, and system architecture. We present a category-theoretic framework to make different types of composition explicit in the modeling and analysis of cyber-physical systems, which could assist in verifying the system as a whole. This compositional framework for cyber-physical systems gives rise to unified system models, where system behavior is hierarchically decomposed and related to a system architecture using the systems-as-algebras paradigm. As part of this paradigm, we show that an algebra of (safety) contracts generalizes over the state of the art, providing more uniform mathematical tools for constraining the behavior over a richer set of composite cyber-physical system models, which has the potential of minimizing or eliminating hazardous behavior.


2021 ◽  
Vol 21 (1) ◽  
pp. 37-49
Author(s):  
Yu-Pei Liang ◽  
Shuo-Han Chen ◽  
Yuan-Hao Chang ◽  
Yun-Fei Liu ◽  
Hsin-Wen Wei ◽  
...  

Owing to the energy-constraint nature of cyber-physical systems (CPS), energy efficiency has become a primary design consideration for CPS. On CPS, owing to the high leakage power issue of SRAM, the major portion of its energy consumption comes from static random-access memory (SRAM)-based processors. Recently, with the emerging and rapidly evolving nonvolatile Spin-Transfer Torque RAM (STT-RAM), STT-RAM is expected to replace SRAM within processors for enhancing the energy efficiency with its near-zero leakage power features. The advances in Magnetic Tunneling Junction (MTJ) technology also realize the multi-level cell (MLC) STT-RAM to pack more cells with the same die area for achieving the memory density. However, the write disturbance issue of MLC STT-RAM prevents STT-RAM from properly resolving the energy efficiency of CPS. Although studies have been proposed to alleviate this issue, previous strategies could induce additional management overhead due to the use of counters or lead to frequent swap operations. Such an observation motivates us to propose an effective and simple strategy to combine direct and split cache mapping designs to enhance the energy efficiency of MLC STT-RAM. A series of experiments have been conducted on an open-source emulator with encouraging results.


Sign in / Sign up

Export Citation Format

Share Document