Skip to main content

Advertisement

Log in

On Survivability of Mobile Cyber Physical Systems with Intrusion Detection

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

In this paper we address the survivability issue of a mobile cyber physical system (MCPS) comprising sensor-carried human actors, vehicles, or robots assembled together for executing a specific mission in battlefield or emergency response situations. We develop a mathematical model to assess the survivability property of a MCPS subject to energy exhaustion and security failure. Our model-based analysis reveals the optimal design setting for invoking intrusion detection to best balance energy conservation versus intrusion tolerance for achieving high survivability. We test the effectiveness of our approach with a dynamic voting-based intrusion detection technique leveraging sensing and ranging capabilities of mobile nodes in the MCPS and demonstrate its validity with simulation validation.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Anand, M., Cronin, E., Sherr, M., Blaze, M., Ives, Z., & Lee, I. (2006). Security challenges in next generation cyber physical systems. In Beyond SCADA: Networked Embedded Control for Cyber Physical Systems. Pittsburgh, Pennsylvania, USA.

  2. Cárdenas, A. A., Amin, S., Sinopoli, B., Giani, A., Perrig, A., & Sastry, S. (2009). Challenges for securing cyber physical systems. In: Workshop on future directions in cyber-physical systems security. Newark, NJ, USA.

  3. Chandola, V., Banerjee, A., & Kumar, V. (2010). Anomaly detection for discrete sequences: A survey. IEEE Transactions on Knowledge and Data Engineering. doi:10.1109/TKDE.2010.235.

  4. Chen, I. R., & Wang, D. C. (1996). Analyzing dynamic voting using petri nets. In: 15th IEEE symposium on reliable distributed systems. Niagara Falls, ON, Canada.

  5. Cho J. H., Chen I. R. (2010) Modeling and analysis of intrusion detection integrated with batch rekeying for dynamic group communication systems in mobile ad hoc networks. Wireless Networks 16(4): 1157–1173

    Article  MathSciNet  Google Scholar 

  6. Cho J. H., Chen I. R. (2011) Performance analysis of hierarchical group key management integrated with adaptive intrusion detection in mobile ad hoc networks. Performance Evaluation 68(1): 58–75

    Article  MathSciNet  Google Scholar 

  7. Cho J. H., Chen I. R., Feng P. G. (2010) Effect of intrusion detection on reliability of mission-oriented mobile group systems in mobile ad hoc networks. IEEE Transactions on Reliability 59(1): 231–241

    Article  Google Scholar 

  8. El-Khatib K. (2010) Impact of feature reduction on the efficiency of wireless intrusion detection systems. IEEE Transactions on Knowledge and Data Engineering 21(8): 1143–1149

    Google Scholar 

  9. Lamport L., Shostak R., Pease M. (1982) The byzantine generals problem. ACM Transactions on Programming Languages and Systems 4(3): 382–401

    Article  MATH  Google Scholar 

  10. Lima M., dos Santos A., Pujolle G. (2009) A survey of survivability in mobile ad hoc networks. IEEE Communications Surveys and Tutorials 11(1): 66–77

    Article  Google Scholar 

  11. MacDougall M. H. (1987) Simulating computer systems, techniques and tools. The MIT Press, Cambridge

    Google Scholar 

  12. Mitchell, R., & Chen, I. R. (2011). A hierarchical performance model for intrusion detection in cyber-physical systems. In IEEE wireless communication and networking conference. Cancun, Mexico.

  13. Noble, B. D., & Flinn, J. (2006). Wireless, self-organizing cyber-physical systems. In: NSF workshop on cyber-physical systems. Austin, Texas, USA.

  14. Sahner R. A., Trivedi K. S., Puliafito A. (1996) Performance and reliability analysis of computer systems. Kluwer Academic Publishers, Dordrecht

    Book  MATH  Google Scholar 

  15. Sun B., Osborne L., Xiao Y., Guizani S. (2007) Intrusion detection techniques in mobile ad hoc and wireless sensor networks. IEEE Wireless Communications 14(5): 56–63

    Article  Google Scholar 

  16. US Department of Homeland Security. (2009). BAA-09-02 Geospatial Location Accountability and Navigation System for Emergency Responders (GLANSER).

  17. Wang Y., Wang X., Xie B., Wang D., Agrawal D. P. (2008) Intrusion detection in homogenerous and heterogeneous wireless sensor networks. IEEE Transactions on Mobile Computing 7(6): 698–711

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ing-Ray Chen.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Mitchell, R., Chen, IR. On Survivability of Mobile Cyber Physical Systems with Intrusion Detection. Wireless Pers Commun 68, 1377–1391 (2013). https://doi.org/10.1007/s11277-012-0528-3

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-012-0528-3

Keywords

Navigation