Abstract
In this paper we address the survivability issue of a mobile cyber physical system (MCPS) comprising sensor-carried human actors, vehicles, or robots assembled together for executing a specific mission in battlefield or emergency response situations. We develop a mathematical model to assess the survivability property of a MCPS subject to energy exhaustion and security failure. Our model-based analysis reveals the optimal design setting for invoking intrusion detection to best balance energy conservation versus intrusion tolerance for achieving high survivability. We test the effectiveness of our approach with a dynamic voting-based intrusion detection technique leveraging sensing and ranging capabilities of mobile nodes in the MCPS and demonstrate its validity with simulation validation.
Similar content being viewed by others
References
Anand, M., Cronin, E., Sherr, M., Blaze, M., Ives, Z., & Lee, I. (2006). Security challenges in next generation cyber physical systems. In Beyond SCADA: Networked Embedded Control for Cyber Physical Systems. Pittsburgh, Pennsylvania, USA.
Cárdenas, A. A., Amin, S., Sinopoli, B., Giani, A., Perrig, A., & Sastry, S. (2009). Challenges for securing cyber physical systems. In: Workshop on future directions in cyber-physical systems security. Newark, NJ, USA.
Chandola, V., Banerjee, A., & Kumar, V. (2010). Anomaly detection for discrete sequences: A survey. IEEE Transactions on Knowledge and Data Engineering. doi:10.1109/TKDE.2010.235.
Chen, I. R., & Wang, D. C. (1996). Analyzing dynamic voting using petri nets. In: 15th IEEE symposium on reliable distributed systems. Niagara Falls, ON, Canada.
Cho J. H., Chen I. R. (2010) Modeling and analysis of intrusion detection integrated with batch rekeying for dynamic group communication systems in mobile ad hoc networks. Wireless Networks 16(4): 1157–1173
Cho J. H., Chen I. R. (2011) Performance analysis of hierarchical group key management integrated with adaptive intrusion detection in mobile ad hoc networks. Performance Evaluation 68(1): 58–75
Cho J. H., Chen I. R., Feng P. G. (2010) Effect of intrusion detection on reliability of mission-oriented mobile group systems in mobile ad hoc networks. IEEE Transactions on Reliability 59(1): 231–241
El-Khatib K. (2010) Impact of feature reduction on the efficiency of wireless intrusion detection systems. IEEE Transactions on Knowledge and Data Engineering 21(8): 1143–1149
Lamport L., Shostak R., Pease M. (1982) The byzantine generals problem. ACM Transactions on Programming Languages and Systems 4(3): 382–401
Lima M., dos Santos A., Pujolle G. (2009) A survey of survivability in mobile ad hoc networks. IEEE Communications Surveys and Tutorials 11(1): 66–77
MacDougall M. H. (1987) Simulating computer systems, techniques and tools. The MIT Press, Cambridge
Mitchell, R., & Chen, I. R. (2011). A hierarchical performance model for intrusion detection in cyber-physical systems. In IEEE wireless communication and networking conference. Cancun, Mexico.
Noble, B. D., & Flinn, J. (2006). Wireless, self-organizing cyber-physical systems. In: NSF workshop on cyber-physical systems. Austin, Texas, USA.
Sahner R. A., Trivedi K. S., Puliafito A. (1996) Performance and reliability analysis of computer systems. Kluwer Academic Publishers, Dordrecht
Sun B., Osborne L., Xiao Y., Guizani S. (2007) Intrusion detection techniques in mobile ad hoc and wireless sensor networks. IEEE Wireless Communications 14(5): 56–63
US Department of Homeland Security. (2009). BAA-09-02 Geospatial Location Accountability and Navigation System for Emergency Responders (GLANSER).
Wang Y., Wang X., Xie B., Wang D., Agrawal D. P. (2008) Intrusion detection in homogenerous and heterogeneous wireless sensor networks. IEEE Transactions on Mobile Computing 7(6): 698–711
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Mitchell, R., Chen, IR. On Survivability of Mobile Cyber Physical Systems with Intrusion Detection. Wireless Pers Commun 68, 1377–1391 (2013). https://doi.org/10.1007/s11277-012-0528-3
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-012-0528-3