skip to main content
research-article

A Trust Computing-based Security Routing Scheme for Cyber Physical Systems

Published:13 November 2019Publication History
Skip Abstract Section

Abstract

Security is a pivotal issue for the development of Cyber Physical Systems (CPS). The trusted computing of CPS includes the complete protection mechanisms, such as hardware, firmware, and software, the combination of which is responsible for enforcing a system security policy. A Trust Detection-based Secured Routing (TDSR) scheme is proposed to establish security routes from source nodes to the data center under malicious environment to ensure network security. In the TDSR scheme, sensor nodes in the routing path send detection routing to identify relay nodes’ trust. And then, data packets are routed through trustworthy nodes to sink securely. In the TDSR scheme, the detection routing is executed in those nodes that have abundant energy; thus, the network lifetime cannot be affected. Performance evaluation through simulation is carried out for success of routing ratio, compromised node detection ratio, and detection routing overhead. The experiment results show that the performance can be improved in the TDSR scheme compared to previous schemes.

References

  1. Ghada H. Badawy, Amir A. Sayegh, and Terence D. Todd. 2010. Energy provisioning in solar-powered wireless mesh networks. IEEE Trans. Vehic. Technol. 59, 8 (2010), 3859--3871.Google ScholarGoogle ScholarCross RefCross Ref
  2. Juan Cota-Ruiz, Pablo Rivas-Perea, Ernesto Sifuentes, and Rafael Gonzalez-Landaeta. 2016. A recursive shortest path routing algorithm with application for wireless sensor network localization. IEEE Sens. J. 16, 11 (2016), 4631--4637.Google ScholarGoogle ScholarCross RefCross Ref
  3. Alcaraz Cristina, Xinyi Huang, and Erich Rome. 2018. Security and privacy in cloud-assisted cyber-physical systems. Computer Networks 138 (2018), 13--14.Google ScholarGoogle ScholarCross RefCross Ref
  4. Mianxiong Dong, Kaoru Ota, Laurence T. Yang, Anfeng Liu, and Minyi Guo. 2016. LSCD: A low storage clone detecting protocol for cyber-physical systems. IEEE Trans. Comput.-Aided Design Integr. Circ. Syst. 35, 5 (2016), 712--723.Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Béla Genge, Piroska Haller, and Adrian-Vasile Duka. 2019. Engineering security-aware control applications for data authentication in smart industrial cyber--physical systems. Future Gen. Comput. Syst. 91 (2019), 206--222.Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Wenbo He, Xue Liu, Hoang Nguyen, Klara Nahrstedt, and Tarek Abdelzaher. 2007. PDA: Privacy-preserving data aggregation in wireless sensor networks. In Proceedings of the 26th IEEE International Conference on Computer Communications (INFOCOM’07). 2045--2053.Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Ron Hirschprung, Eran Toch, Hadas Schwartz-Chassidim, Tamir Mendel, and Oded Maimon. 2017. Analyzing and optimizing access control choice architectures in online social networks. ACM Trans. Intell. Syst. Technol. 8, 4 (2017), 57.Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Mingfeng Huang, Anfeng Liu, Nealxue Xiong, Tian Wang, and Athanasios. V. Vasilakos. 2019. A low-latency communication scheme for mobile wireless sensor control systems. IEEE Trans. Syst. Man Cybernet.-Syst. 49, 2 (2019), 317--332.Google ScholarGoogle ScholarCross RefCross Ref
  9. Xin Ju, Wei Liu, Chengyuan Zhang, Anfeng Liu, Tian Wang, Neal N. Xiong, and Zhiping Cai. 2018. An energy conserving and transmission radius adaptive scheme to optimize performance of energy harvesting sensor networks. Sensors 18, 9 (2018), 2885.Google ScholarGoogle ScholarCross RefCross Ref
  10. Zhetao Li, Yuxin Liu, Anfeng Liu, Shiguo Wang, and Haolin Liu. 2018. Minimizing convergecast time and energy consumption in green internet of things. IEEE Trans. Emerg. Top. Comput. In Press. DOI:10.1109/TETC.2018.2844282Google ScholarGoogle Scholar
  11. Anfeng Liu, Xiao Liu, and Jun Long. 2016. A trust-based adaptive probability marking and storage traceback scheme for WSNs. Sensors 16, 4 (2016), 451.Google ScholarGoogle ScholarCross RefCross Ref
  12. Anfeng Liu, Zhongming Zheng, Chao Zhang, Zhigang Chen, and Xuemin (Sherman) Shen. 2012. Secure and energy-efficient disjoint multi-path routing for WSNs. IEEE Trans. Vehic. Technol. 61, 7 (2012), 3255--3265.Google ScholarGoogle ScholarCross RefCross Ref
  13. Xiao Liu, Mianxiong Dong, Kaoru Ota, Laurence T. Yang, and Anfeng Liu. 2018a. Trace malicious source to guarantee cyber security for mass monitor critical infrastructure. J. Comput. Syst. Sci. 98 (2018), 1--26.Google ScholarGoogle ScholarCross RefCross Ref
  14. Xiao Liu, Yuxin Liu, Anfeng Liu, and Laurence T. Yang. 2018. Defending on-off attacks using light probing messages in smart sensors for industrial communication systems. IEEE Trans. Industr. Informat. 14, 9 (2018), 3801--3811.Google ScholarGoogle ScholarCross RefCross Ref
  15. Xiao Liu, Mianxiong Dong, Kaoru Ota, Patrick Hung, and Anfeng Liu. 2016. Service pricing decision in cyber-physical systems: Insights from game theory. IEEE Trans. Serv. Comput. 9, 2 (2016), 186--198.Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Yuxin Liu, Ming Ma, Xiao Liu, Naixue Xiong, Anfeng Liu, and Ying Zhu. 2018. Design and analysis of probing route to defense sink-hole attacks for internet of things security. IEEE Trans. Netw. Sci. Eng. In Press. DOI:https://doi.org/10.1109/TNSE.2018.2881152Google ScholarGoogle Scholar
  17. Yuxin Liu, Mianxiong Dong, Kaoru Ota, and Anfeng Liu. 2016. ActiveTrust: Secure and trustable routing in wireless sensor networks. IEEE Trans. Info. Forens. Secur. 11, 9 (2016), 2013--2027.Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Yuxin Liu, Anfeng Liu, and Sheng He. 2015. A novel joint logging and migrating traceback scheme for achieving low storage requirement and long lifetime in WSNs. AEU-International J. Electron. Commun. 69, 10 (2015), 1434--8411.Google ScholarGoogle ScholarCross RefCross Ref
  19. Nikhil Muralidhar, Chen Wang, Nathan Self, Marjan Momtazpour, Kiyoshi Nakayama, Ratnesh Sharma, and Naren Ramakrishnan. 2018. illiad: InteLLigent invariant and anomaly detection in cyber-physical systems. ACM Trans. Intell. Syst. Technol. 9, 3 (2018), 35.Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Hamed Orojloo and Mohammad Abdollahi Azgomi. 2018. A stochastic game model for evaluating the impacts of security attacks against cyber-physical systems. J. Netw. Syst. Manage. 26, 4 (2018), 929--965.Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Zhou Su, Yuntao Wang, Qichao Xu, Minrui Fei, Yu-Chu Tian, and Ning Zhang. 2018. A secure charging scheme for electric vehicles with smart communities in energy blockchain. IEEE Internet Things J. DOI:10.1109/JIOT.2018.2869297Google ScholarGoogle Scholar
  22. Tao Shu, Marwan Krunz, and Sisi Liu. 2010. Secure data collection in wireless sensor networks using randomized dispersive routes. IEEE Trans. Mobile Comput. 9, 7 (2010), 941--954.Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Jiawei Tan, Wei Liu, Mande Xie, Houbing Song, Anfeng Liu, Ming Zhao, and Guoping Zhang. 2019. A low redundancy data collection scheme to maximize lifetime using matrix completion technique. EURASIP J. Wireless Commun. Netw. 5 (2019). DOI:http://doi.org/10.1186/s13638-018-1313-0Google ScholarGoogle Scholar
  24. Jiawei Tang, Anfeng Liu, Jian Zhang, Zhiwen Zeng, Neal N. Xiong, and Tian Wang. 2018. A security routing scheme using traceback approach for energy harvesting sensor networks. Sensors 18, 3 (2018), 751.Google ScholarGoogle ScholarCross RefCross Ref
  25. Tian Wang, Yang Li, Yonghong Chen, Hui Tian, Yiqiao Cai, Weijia Jia, and Baowei Wang. 2017. Fog-based evaluation approach for trustworthy communication in sensor-cloud system. IEEE Commun. Lett. 21, 11 (2017), 2532--2535.Google ScholarGoogle ScholarCross RefCross Ref
  26. OMNET++ simulator. 2016. Retrieved from http://www.omnetpp.org/.Google ScholarGoogle Scholar

Index Terms

  1. A Trust Computing-based Security Routing Scheme for Cyber Physical Systems

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in

    Full Access

    • Published in

      cover image ACM Transactions on Intelligent Systems and Technology
      ACM Transactions on Intelligent Systems and Technology  Volume 10, Issue 6
      Special Section on Intelligent Edge Computing for Cyber Physical and Cloud Systems and Regular Papers
      November 2019
      267 pages
      ISSN:2157-6904
      EISSN:2157-6912
      DOI:10.1145/3368406
      Issue’s Table of Contents

      Copyright © 2019 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 13 November 2019
      • Accepted: 1 March 2019
      • Revised: 1 February 2019
      • Received: 1 December 2018
      Published in tist Volume 10, Issue 6

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format .

    View HTML Format