Trustworthy CPS: An Enhanced Dynamic Clustered Architecture to Secure CPS with Digital Signature and Route Optimization

Trustworthy CPS: An Enhanced Dynamic Clustered Architecture to Secure CPS with Digital Signature and Route Optimization

  IJETT-book-cover           
  
© 2024 by IJETT Journal
Volume-72 Issue-4
Year of Publication : 2024
Author : Sandeep Singh Bindra, Alankrita Aggarwa
DOI : 10.14445/22315381/IJETT-V72I4P137

How to Cite?

Sandeep Singh Bindra, Alankrita Aggarwa, "Trustworthy CPS: An Enhanced Dynamic Clustered Architecture to Secure CPS with Digital Signature and Route Optimization," International Journal of Engineering Trends and Technology, vol. 72, no. 4, pp. 378-388, 2024. Crossref, https://doi.org/10.14445/22315381/IJETT-V72I4P137

Abstract
Robust and adaptable security architectures are becoming essential in the face of growing cyberattacks and security breaches in Cyber-Physical Systems (CPS). To overcome these obstacles, this work has created a unique secure CPS architecture called trustworthy CPS. The method uses Fuzzy Adaptive Resonance Theory (Fuzzy ART) to dynamically cluster network nodes called security zones, enabling flexible adaptability to changing situations. A trust and energy-based selection method selects a designated security chief for each security zone, which is again dynamic. Further, to ensure the integrity and validity of the nodes, each security chief in the zone uses SHA-256 to provide cryptographic signatures. To promote inter-zone security and cooperation, security chiefs participate in communication protocols, confirm nodes as they move across clusters, and protect the system from attacks. The proposed system also adds a route optimization technique during communication. Krill Herd Optimization (KHO) and Spider Monkey Optimization (SMO) are integrated to improve route selection effectiveness and provide flexibility in real-time circumstances. This optimization helps increase the CPS network's overall resilience while reducing delays. In this research, the resilience of the architecture under such adversarial situations is explored, with a particular focus on Distributed Denial of Service (DDoS) attacks. Further, the proposed architecture is evaluated using NS-2 simulators based on distinct network scenarios, where its effective performance provides a better scope for this architecture in real-time CPS systems.

Keywords
CPS, Security, Clustering, Signature, Optimization.

References
[1] Ayaskanta Mishra et al., “Emerging Technologies and Design Aspects of Next Generation Cyber Physical System with a Smart City Application Perspective,” International Journal of System Assurance Engineering and Management, vol. 14, pp. 699-721, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[2] Maki K. Habib, and Chimsom Isidore Chukwuemeka, “CPS: Role, Characteristics, Architectures and Future Potentials,” Procedia Computer Science, vol. 200, pp. 1347-1358, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[3] David G. Rosado et al., “Managing Cybersecurity Risks of Cyber-Physical Systems: The MARISMA-CPS Pattern,” Computers in Industry, vol. 142, pp. 1-20, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[4] Shaokai Lin et al., “Towards Building Verifiable CPS using Lingua Franca,” ACM Transactions on Embedded Computing Systems, vol. 22, no. 5s, pp. 1-24, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[5] Jiacheng Xie, Shuguang Liu, and Xuewen Wang, “Framework for a Closed-Loop Cooperative Human Cyber-Physical System for the Mining Industry Driven by VR and AR: MHCPS,” Computers & Industrial Engineering, vol. 168, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[6] Sunil Kr. Singh et al., Evolving Requirements and Application of SDN and IoT in the Context of Industry 4.0, Blockchain and Artificial Intelligence, Software Defined Networks, Wiley, pp. 427-496, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[7] Zakir Ahmad Sheikh et al., “Intelligent and Secure Framework for Critical Infrastructure (CPS): Current Trends, Challenges, and Future Scope,” Computer Communications, vol. 193, pp. 302-331, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[8] Neha Agrawal, and Rohit Kumar, “Security Perspective Analysis of Industrial Cyber Physical Systems (I-CPS): A Decade-Wide Survey,” ISA Transactions, vol. 130, pp. 10-24, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[9] Muhammad Fakhrul Safitra, Muharman Lubis, and Hanif Fakhrurroja, “Counterattacking Cyber Threats: A Framework for the Future of Cybersecurity,” Sustainability, vol. 15, no. 18, pp. 1-32, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[10] P. Muralidhara Rao, and B.D. Deebak, “Security and Privacy Issues in Smart Cities/Industries: Technologies, Applications, and Challenges,” Journal of Ambient Intelligence and Humanized Computing, vol. 14, pp. 10517-10553, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[11] Valentina Casola et al., “Designing Secure and Resilient Cyber-Physical Systems: A Model-based Moving Target Defense Approach,” IEEE Transactions on Emerging Topics in Computing, pp. 1-12, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[12] Dipankar Dasgupta, Zahid Akhtar, and Sajib Sen, “Machine Learning in Cybersecurity: A Comprehensive Survey,” The Journal of Defense Modeling and Simulation: Applications, Methodology, Technology, vol. 19, no. 1, pp. 57-106, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[13] May Bashendy, Ashraf Tantawy, and Abdelkarim Erradi, “Intrusion Response Systems for Cyber-Physical Systems: A Comprehensive Survey,” Computers & Security, vol. 124, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[14] Aniruddh Chandratre et al., “Stealthy Attacks Formalized as STL Formulas for Falsification of CPS Security,” Proceedings of the 26th ACM International Conference on Hybrid Systems: Computation and Control, New York, USA, no. 15, pp. 1-8, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[15] Ying Ju et al., “Reliability-Security Trade-off Analysis in mmWave Ad Hoc Based CPS,” ACM Transactions on Sensor Networks, vol. 2, no. 2, pp. 1-23, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[16] Zakir Ahmad Sheikh et al., “Defending the Defender: Adversarial Learning Based Defending Strategy for Learning Based Security Methods in Cyber-Physical Systems (CPS),” Sensors, vol. 23, no. 12, pp. 1-19, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[17] Junyi Liu et al., “CPS Attack Detection under Limited Local Information in Cyber Security: An Ensemble Multi-Node Multi-Class Classification Approach,” ACM Transactions on Sensor Networks, vol. 20, no. 2, pp. 1-27, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[18] Lei Ma et al., “Recursive Watermarking-Based Transient Covert Attack Detection for the Industrial CPS,” IEEE Transactions on Information Forensics and Security, vol. 18, pp. 1709-1719, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[19] Manal Abdullah Alohali et al., “Swarm Intelligence for IoT Attack Detection in Fog-Enabled Cyber-Physical System,” Computers and Electrical Engineering, vol. 108, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[20] S. Sivamohan, S.S. Sridhar, and S. Krishnaveni, “TEA-EKHO-IDS: An Intrusion Detection System for Industrial CPS with Trustworthy Explainable AI and Enhanced Krill Herd Optimization,” Peer-to-Peer Networking and Applications, vol. 16, pp. 1993- 2021, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[21] Umesh Kumar Lilhore et al., “EHML: An Efficient Hybrid Machine Learning Model for Cyber Threat Forecasting in CPS,” 2023 International Conference on Artificial Intelligence and Smart Communication (AISC), Greater Noida, India, pp. 1453-1458, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[22] Shimeng Wu et al., “Attack Prevention and Detection For Cyber-Physical Systems Based on Coprime Factorization Technique,” 2023 IEEE 32nd International Symposium on Industrial Electronics (ISIE), Helsinki, Finland, pp. 1-6, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[23] S. Simonthomas, and R. Subramanian, “Detection and Prevention of Cyber-Attacks in Cyber-Physical Systems based on Nature Inspired Algorithm,” 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), Coimbatore, India, pp. 483-487, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[24] Samuel Oliveira et al., “Security of Cyber-Physical Systems Against Actuator Attacks through Cryptography*,” 2023 International Conference on Information Technology (ICIT), Amman, Jordan, pp. 758-764, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[25] David G. Lowe, “Similarity Metric Learning for a Variable-Kernel Classifier,” Neural Computation, vol. 7, no. 1, pp. 72-85, 1995.
[CrossRef] [Google Scholar] [Publisher Link]
[26] Igor Škrjanc et al., “Evolving Fuzzy and Neuro-Fuzzy Approaches in Clustering, Regression, Identification, and Classification: A Survey,” Information Sciences, vol. 490, pp. 344-368, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[27] Hassan. M. Elkamchouchi, Abdel-Aty M. Emarah, and Esam A. A. Hagras, “A New Secure Hash Dynamic Structure Algorithm (SHDSA) for Public Key Digital Signature Schemes,” Proceedings of the Twenty Third National Radio Science Conference (NRSC'2006), Menouf, Egypt, pp. 1-9, 2006.
[CrossRef] [Google Scholar] [Publisher Link]
[28] Yevgeniy Dodis, Iftach Haitner, and Aris Tentes, “On the Instantiability of Hash-and-Sign RSA Signatures,” Theory of Cryptography: 9th Theory of Cryptography Conference, Taormina, Sicily, Italy, pp. 112-132, 2012.
[CrossRef] [Google Scholar] [Publisher Link]
[29] Jagdish Chand Bansal et al., “Spider Monkey Optimization Algorithm for Numerical Optimization,” Memetic Computing, vol. 6, pp. 31-47, 2014.
[CrossRef] [Google Scholar] [Publisher Link]