skip to main content
research-article

System-Level Design Optimization for Security-Critical Cyber-Physical-Social Systems

Authors Info & Claims
Published:14 April 2017Publication History
Skip Abstract Section

Abstract

Cyber-physical-social systems (CPSS), an emerging computing paradigm, have attracted intensive attentions from the research community and industry. We are facing various challenges in designing secure, reliable, and user-satisfied CPSS. In this article, we consider these design issues as a whole and propose a system-level design optimization framework for CPSS design where energy consumption, security-level, and user satisfaction requirements can be fulfilled while satisfying constraints for system reliability. Specifically, we model the constraints (energy efficiency, security, and reliability) as the penalty functions to be incorporated into the corresponding objective functions for the optimization problem. A smart office application is presented to demonstrate the feasibility and effectiveness of our proposed design optimization approach.

References

  1. Kalyanmoy Deb, Amrit Pratap, Sameer Agarwal, and TAMT Meyarivan. 2002. A fast and elitist multiobjective genetic algorithm: NSGA-II. IEEE Transactions on Evolutionary Computation 6, 2, 182--197. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. M. D. Galanis, P. Kitsos, G. Kostopoulos, N. Sklavos, O. Koufopavlou, and C. E. Goutis. 2004. Comparison of the hardware architectures and FPGA implementations of stream ciphers. In Proceedings of the 11th IEEE International Conference on Electronics, Circuits, and Systems (ICECS’04). IEEE, Los Alamitos, CA, 571--574. Google ScholarGoogle ScholarCross RefCross Ref
  3. Junhe Gan, Flavius Gruian, Paul Pop, and Jan Madsen. 2011. Energy/reliability trade-offs in fault-tolerant event-triggered distributed embedded systems. In Proceedings of the 16th Asia and South Pacific Design Automation Conference. IEEE, Los Alamitos, CA, 731--736. Google ScholarGoogle ScholarCross RefCross Ref
  4. Abdullah Konak, David W. Coit, and Alice E. Smith. 2006. Multi-objective optimization using genetic algorithms: A tutorial. Reliability Engineering and System Safety 91, 9, 992--1007. Google ScholarGoogle ScholarCross RefCross Ref
  5. Philip Koopman. 2004. Embedded system security. IEEE Computer 37, 7, 95--97. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Stacey Kuznetsov and Eric Paulos. 2010. Participatory sensing in public spaces: Activating urban surfaces with sensor probes. In Proceedings of the 8th ACM Conference on Designing Interactive Systems. ACM, New York, NY, 21--30. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. M. Lin, Y. Pan, L. T. Yang, M. Guo, and N. Zheng. 2013. Scheduling co-design for reliability and energy in cyber-physical systems. IEEE Transactions on Emerging Topics in Computing 1, 2, 353--365. DOI:http://dx.doi.org/10.1109/TETC.2013.2274042 Google ScholarGoogle ScholarCross RefCross Ref
  8. M. Lin, L. Xu, L. T. Yang, X. Qin, N. Zheng, Z. Wu, and M. Qiu. 2009. Static security optimization for real-time systems. IEEE Transactions on Industrial Informatics 5, 1, 22--37. Google ScholarGoogle ScholarCross RefCross Ref
  9. Y. Liu, H. Yang, R. P. Dick, H. Wang, and L. Shang. 2007. Thermal vs energy optimization for DVFS-enabled processors in embedded systems. In Proceedings of 8th International Symposium on Quality Electronic Design (ISQED’07). 204--209. DOI:http://dx.doi.org/10.1109/ISQED.2007.158 Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Huansheng Ning and Hong Liu. 2012. Cyber-physical-social based security architecture for future Internet of Things. Advances in Internet of Things 2, 1, 1.Google ScholarGoogle ScholarCross RefCross Ref
  11. Sean Peisert, Jonathan Margulies, David M. Nicol, Himanshu Khurana, and Chris Sawall. 2014. Designed-in security for cyber-physical systems. IEEE Security and Privacy 12, 5, 9--12. Google ScholarGoogle ScholarCross RefCross Ref
  12. Paul Pop, Kåre Harbo Poulsen, Viacheslav Izosimov, and Petru Eles. 2007. Scheduling and voltage scaling for energy/reliability trade-offs in fault-tolerant time-triggered embedded systems. In Proceedings of the 5th IEEE/ACM International Conference on Hardware/Software Codesign and System Synthesis. ACM, New York, NY, 233--238. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Chao Qian, Changqing Luo, Fei Hao, Laurence T. Yang, and Geyong Min. 2013. Energy-efficient dynamic network selection in heterogeneous wireless networks. In Proceedings of the 2013 IEEE Green Computing and Communications Conference (GreenCom’13). IEEE, Los Alamitos, CA, 71--76. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Anand Ranganathan, Jalal Al-Muhtadi, Jacob Biehl, Brian Ziebart, Roy H. Campbell, and Brian Bailey. 2005. Towards a pervasive computing benchmark. In Proceedings of the 3rd IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom’05). IEEE, Los Alamitos, CA, 194--198. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Gaël Rouvroy, François-Xavier Standaert, Jean-Jacques Quisquater, and Jean-Didier Legat. 2004. Compact and efficient encryption/decryption module for FPGA implementation of the AES Rijndael very well suited for small embedded applications. In Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC’04), Vol. 2. IEEE, Los Alamitos, CA, 583--587. Google ScholarGoogle ScholarCross RefCross Ref
  16. Kiran Seth, Aravindh Anantaraman, Frank Mueller, and Eric Rotenberg. 2006. Fast: Frequency-aware static timing analysis. ACM Transactions on Embedded Computing Systems 5, 1, 200--224. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. A. Sheth, P. Anantharam, and C. Henson. 2013. Physical-cyber-social computing: An early 21st century approach. IEEE Intelligent Systems 28, 1, 78--82. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Alexander Smirnov, Alexey Kashevnik, and Andrew Ponomarev. 2015. Multi-level self-organization in cyber-physical-social systems: Smart home cleaning scenario. Procedia CIRP 30, 329--334. Google ScholarGoogle ScholarCross RefCross Ref
  19. Mandavilli Srinivas and Lalit M. Patnaik. 1994. Genetic algorithms: A survey. IEEE Computer 27, 6, 17--26. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. T. S. B. Sudarshan, R. Mir, and S. Vijayalakshmi. 2005. DRILC: A flexible architecture for blowfish encryption using dynamic reconfiguration, replication, inner-loop pipelining, loop folding techniques. In Advances in Computer Systems Architecture, Lecture Notes in Computer Science, Vol. 3740. Springer, 625--639. DOI:http://dx.doi.org/10.1007/11572961_51 Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Alessandro Vinciarelli, Maja Pantic, Dirk Heylen, Catherine Pelachaud, Isabella Poggi, Francesca D’Errico, and Marc Schröder. 2012. Bridging the gap between social animal and unsocial machine: A survey of social signal processing. IEEE Transactions on Affective Computing 3, 1, 69--87. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Gregor Von Laszewski, Lizhe Wang, Andrew J. Younge, and Xi He. 2009. Power-aware scheduling of virtual machines in DVFS-enabled clusters. In Proceedings of the IEEE International Conference on Cluster Computing and Workshops (CLUSTER’09). IEEE, Los Alamitos, CA, 1--10. Google ScholarGoogle ScholarCross RefCross Ref
  23. Fei-Yue Wang. 2010. The emergence of intelligent enterprises: From CPS to CPSS. IEEE Intelligent Systems 25, 4, 85--88. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Chin Mun Wee, Peter R. Sutton, and Neil W. Bergmann. 2005. An FPGA network architecture for accelerating 3DES-CBC. In Proceedings of the International Conference on Field Programmable Logic and Applications. IEEE, Los Alamitos, CA, 654--657.Google ScholarGoogle Scholar
  25. Tao Xie and Xiao Qin. 2006. Scheduling security-critical real-time applications on clusters. IEEE Transactions on Computers 55, 7, 864--879. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Gang Xiong, Fenghua Zhu, Xiwei Liu, Xisong Dong, Wuling Huang, Songhang Chen, and Kai Zhao. 2015. Cyber-physical-social system in intelligent transportation. IEEE/CAA Journal of Automatica Sinica 2, 3, 320--333.Google ScholarGoogle ScholarCross RefCross Ref
  27. Yuqiong Xu, Shijian Li, Zhaohui Wu, and Gang Pan. 2013. An intensive location-aware framework for device-involved human tasks. In Proceedings of the IEEE 10th International Conference on High Performance Computing and Communications (HPCC’13). 2135--2142. Google ScholarGoogle ScholarCross RefCross Ref
  28. Jing Zeng, Laurence T. Yang, and Jianhua Ma. 2016. A system-level modeling and design for cyber-physical-social systems. ACM Transactions on Embedded Computing Systems 15, 2, Article No. 35. DOI:http://dx.doi.org/10.1145/2834119 Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Dakai Zhu and Hakan Aydin. 2006. Energy management for real-time embedded systems with reliability requirements. In Proceedings of the 2006 IEEE/ACM International Conference on Computer-Aided Design. ACM, New York, NY, 528--534.Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. Dakai Zhu and Hakan Aydin. 2009. Reliability-aware energy management for periodic real-time tasks. IEEE Transactions on Computers 58, 10, 1382--1397. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. Dakai Zhu, Rami Melhem, and Daniel Mosse. 2004. The effects of energy management on reliability in real-time embedded systems. In Proceedings of the 2004 IEEE/ACM International Conference on Computer-Aided Design (ICCAD’04). 35--40. DOI:http://dx.doi.org/10.1109/ICCAD.2004.1382539 Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. System-Level Design Optimization for Security-Critical Cyber-Physical-Social Systems

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in

    Full Access

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader
    About Cookies On This Site

    We use cookies to ensure that we give you the best experience on our website.

    Learn more

    Got it!