Hybrid Technique for Cyber-Physical Security in Cloud-Based Smart Industries

被引:10
作者
Garg, Deepak [1 ]
Rani, Shalli [1 ]
Herencsar, Norbert [2 ]
Verma, Sahil [3 ]
Wozniak, Marcin [4 ]
Ijaz, Muhammad Fazal [5 ]
机构
[1] Chitkara Univ, Inst Engn & Technol, Rajpura 140401, Punjab, India
[2] Brno Univ Technol, Fac Elect Engn & Commun, Dept Telecommun, Tech 12, Brno 61600, Czech Republic
[3] Chandigarh Univ, Dept Comp Sci & Engn, Mohali 140055, Punjab, India
[4] Silesian Tech Univ, Fac Appl Math, PL-44100 Gliwice, Poland
[5] Sejong Univ, Dept Intelligent Mechatron Engn, Seoul 05006, South Korea
关键词
security; confidentiality; Cyber-Physical System (CPS); smart industrial environment; encryption; decryption; AES; IBE; ABE; FUZZY TOPSIS; SYSTEMS; ENCRYPTION; ARCHITECTURE; SELECTION;
D O I
10.3390/s22124630
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
New technologies and trends in industries have opened up ways for distributed establishment of Cyber-Physical Systems (CPSs) for smart industries. CPSs are largely based upon Internet of Things (IoT) because of data storage on cloud servers which poses many constraints due to the heterogeneous nature of devices involved in communication. Among other challenges, security is the most daunting challenge that contributes, at least in part, to the impeded momentum of the CPS realization. Designers assume that CPSs are themselves protected as they cannot be accessed from external networks. However, these days, CPSs have combined parts of the cyber world and also the physical layer. Therefore, cyber security problems are large for commercial CPSs because the systems move with one another and conjointly with physical surroundings, i.e., Complex Industrial Applications (CIA). Therefore, in this paper, a novel data security algorithm Dynamic Hybrid Secured Encryption Technique (DHSE) is proposed based on the hybrid encryption scheme of Advanced Encryption Standard (AES), Identity-Based Encryption (IBE) and Attribute-Based Encryption (ABE). The proposed algorithm divides the data into three categories, i.e., less sensitive, mid-sensitive and high sensitive. The data is distributed by forming the named-data packets (NDPs) via labelling the names. One can choose the number of rounds depending on the actual size of a key; it is necessary to perform a minimum of 10 rounds for 128-bit keys in DHSE. The average encryption time taken by AES (Advanced Encryption Standard), IBE (Identity-based encryption) and ABE (Attribute-Based Encryption) is 3.25 ms, 2.18 ms and 2.39 ms, respectively. Whereas the average time taken by the DHSE encryption algorithm is 2.07 ms which is very much less when compared to other algorithms. Similarly, the average decryption times taken by AES, IBE and ABE are 1.77 ms, 1.09 ms and 1.20 ms and the average times taken by the DHSE decryption algorithms are 1.07 ms, which is very much less when compared to other algorithms. The analysis shows that the framework is well designed and provides confidentiality of data with minimum encryption and decryption time. Therefore, the proposed approach is well suited for CPS-IoT.
引用
收藏
页数:18
相关论文
共 34 条
[1]  
Ahmed S.H., 2017, SECURE TRUSTWORTHY T, P51
[2]  
Ahmed SH, 2013, IFIP WIREL DAY
[3]   The Meaningful Mixed Data TOPSIS (TOPSIS-MMD) Method and its Application in Supplier Selection [J].
Aouadni, Sourour ;
Rebai, Abdelwaheb ;
Turskis, Zenonas .
STUDIES IN INFORMATICS AND CONTROL, 2017, 26 (03) :353-363
[4]  
Balu A., 2013, CIPHERTEXT POLICY AT, V115, P696
[5]   Ensuring Safety, Security, and Sustainability of Mission-Critical Cyber-Physical Systems [J].
Banerjee, Ayan ;
Venkatasubramanian, Krishna K. ;
Mukherjee, Tridib ;
Gupta, Sandeep Kumar S. .
PROCEEDINGS OF THE IEEE, 2012, 100 (01) :283-299
[6]  
Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P506
[7]   Data Mining for the Internet of Things: Literature Review and Challenges [J].
Chen, Feng ;
Deng, Pan ;
Wan, Jiafu ;
Zhang, Daqiang ;
Vasilakos, Athanasios V. ;
Rong, Xiaohui .
INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2015,
[8]   EMC: Emotion-Aware Mobile Cloud Computing in 5G [J].
Chen, Min ;
Zhang, Yin ;
Li, Yong ;
Mao, Shiwen ;
Leung, Victor C. M. .
IEEE NETWORK, 2015, 29 (02) :32-38
[9]  
Cheng HB, 2012, CHINESE J ELECTRON, V21, P254
[10]  
Cheung L, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P456