Design optimization of confidentiality-critical cyber physical systems with fault detection

被引:41
作者
Jiang, Wei [1 ]
Wen, Liang [1 ]
Zhan, Jinyu [1 ]
Jiang, Ke [2 ]
机构
[1] Univ Elect Sci & Technol China, Sch Informat & Software Engn, Chengdu, Sichuan, Peoples R China
[2] Veoneer Sweden AB, Stockholm, Sweden
基金
中国国家自然科学基金;
关键词
Cyber physical systems; Confidentiality-critical; Fault injection; Fault detection; Multi-objective design optimization; EMBEDDED SYSTEMS; ENCRYPTION; ALGORITHMS; PERMANENT;
D O I
10.1016/j.sysarc.2020.101739
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Since fault injection attack can be utilized to corrupt the data or deduce the secret key of sensitive information, we approach the fault detection design of confidential real-time applications running on Cyber Physical Systems (CPSs) to resist fault injection attacks. We choose cryptographic service to implement confidentiality protection for messages delivered over distributed CPSs, and deploy fault detection within confidential algorithm to resist fault injection attacks. We establish the fault dispersion model and the fault coverage model of ten fault detection schemes to quantify the security strength. We formulate the design problem as a system-level multi-objective optimization problem and then make efforts to search for the best fault detection schemes for the encryption/decryption of messages with the constraints of deadline and execution dependency.We propose an efficient approach based on traditional multi-objective evolutionary mechanisms, which can obtain better solutions with lower time complexity. Extensive experiments and a real-life application are conducted to evaluate the efficiency of the proposed techniques.
引用
收藏
页数:11
相关论文
共 36 条
  • [1] Aumüller C, 2002, LECT NOTES COMPUT SC, V2523, P260
  • [2] A parity code based fault detection for an implementation of the Advanced Encryption Standard
    Bertoni, G
    Breveglieri, L
    Koren, I
    Maistri, P
    Piuri, V
    [J]. 17TH IEEE INTERNATIONAL SYMPOSIUM ON DEFECT AND FAULT TOLERANCE IN VLSI SYSTEMS, PROCEEDINGS, 2002, : 51 - 59
  • [3] Biham E., 1993, Differ. Cryptanal. Data Encrypt. Stand., DOI DOI 10.1007/978-1-4613-9314-6
  • [4] Blömer J, 2003, LECT NOTES COMPUT SC, V2742, P162
  • [5] Optimization between security and delay of quality-of-service
    Chen, Jianyong
    Zeng, Huawang
    Hu, Cunying
    Ji, Zhen
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2011, 34 (02) : 603 - 608
  • [6] A fast and elitist multiobjective genetic algorithm: NSGA-II
    Deb, K
    Pratap, A
    Agarwal, S
    Meyarivan, T
    [J]. IEEE TRANSACTIONS ON EVOLUTIONARY COMPUTATION, 2002, 6 (02) : 182 - 197
  • [7] Scheduling with bus access optimization for distributed embedded systems
    Eles, P
    Doboli, A
    Pop, P
    Peng, Z
    [J]. IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2000, 8 (05) : 472 - 491
  • [8] Hardware security platform for multicast communications
    Granado-Criado, Jose M.
    Vega-Rodriguez, Miguel A.
    Sanchez-Perez, Juan M.
    Gomez-Pulido, Juan A.
    [J]. JOURNAL OF SYSTEMS ARCHITECTURE, 2014, 60 (01) : 11 - 21
  • [9] Huang J, 2012, DES AUT CON, P188
  • [10] Securing embedded systems
    Hwang, DD
    Tiri, SK
    Verbauwhede, I
    [J]. IEEE SECURITY & PRIVACY, 2006, 4 (02) : 40 - 49