DESCO: Decomposition-Based Co-Design to Improve Fault Tolerance of Security-Critical Tasks in Cyber Physical Systems

Confidentiality-Specific Faults (CSFs) will put cyber physical systems in threat, since they can result in corrupted information or even retrieve the cryptographic key of security-critical applications. In this paper, we will look into fault-tolerant co-design optimization for security-critical cybe...

Full description

Saved in:
Bibliographic Details
Published inIEEE transactions on computers Vol. 72; no. 6; pp. 1 - 14
Main Authors Jiang, Wei, Liao, Xinke, Zhan, Jinyu, Adhikari, Deepak, Jiang, Ke
Format Journal Article
LanguageEnglish
Published New York IEEE 01.06.2023
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Subjects
Online AccessGet full text

Cover

Loading…
Abstract Confidentiality-Specific Faults (CSFs) will put cyber physical systems in threat, since they can result in corrupted information or even retrieve the cryptographic key of security-critical applications. In this paper, we will look into fault-tolerant co-design optimization for security-critical cyber physical systems with resource constraints, such that the encryption/decryption of confidential messages are protected against transient CSF faults. We consider imperfect fault detection mechanisms to identify transient CSF faults happened on confidentiality protection, and utilize duplication code to recovery from such faults. We utilize FPGA to accelerate the executions of security tasks, reducing the overheads of fault-tolerant implementations. The system-level design problem is formulated as a two-objective optimization problem, i.e., to minimize the average reliability degradation of the fault tolerant assignments and to minimize the balanced degree of the reliability degradation, subject to available FPGA budget, deadline, and application execution constraints. Since finding Pareto-optimal solutions is NP-hard, we propose an improved multi-objective optimization algorithm, called DEcomposition-based Security Co-design Optimization (DESCO), to search for Pareto-optimal solutions of fault-tolerant assignments. Experimental results demonstrate that DESCO is effective and can outperform other candidates, proving that our approach is promising in dealing with system-level optimization problem for security-critical applications on cyber physical systems.
AbstractList Confidentiality-Specific Faults (CSFs) will put cyber physical systems in threat, since they can result in corrupted information or even retrieve the cryptographic key of security-critical applications. In this paper, we will look into fault-tolerant co-design optimization for security-critical cyber physical systems with resource constraints, such that the encryption/decryption of confidential messages are protected against transient CSF faults. We consider imperfect fault detection mechanisms to identify transient CSF faults happened on confidentiality protection, and utilize duplication code to recovery from such faults. We utilize FPGA to accelerate the executions of security tasks, reducing the overheads of fault-tolerant implementations. The system-level design problem is formulated as a two-objective optimization problem, i.e., to minimize the average reliability degradation of the fault tolerant assignments and to minimize the balanced degree of the reliability degradation, subject to available FPGA budget, deadline, and application execution constraints. Since finding Pareto-optimal solutions is NP-hard, we propose an improved multi-objective optimization algorithm, called DEcomposition-based Security Co-design Optimization (DESCO), to search for Pareto-optimal solutions of fault-tolerant assignments. Experimental results demonstrate that DESCO is effective and can outperform other candidates, proving that our approach is promising in dealing with system-level optimization problem for security-critical applications on cyber physical systems.
Author Zhan, Jinyu
Liao, Xinke
Adhikari, Deepak
Jiang, Ke
Jiang, Wei
Author_xml – sequence: 1
  givenname: Wei
  orcidid: 0000-0001-6181-3900
  surname: Jiang
  fullname: Jiang, Wei
  organization: School of Information and Software Engineering, University of Electronic Science and Technology of China, China
– sequence: 2
  givenname: Xinke
  surname: Liao
  fullname: Liao, Xinke
  organization: School of Information and Software Engineering, University of Electronic Science and Technology of China, China
– sequence: 3
  givenname: Jinyu
  orcidid: 0000-0002-0214-7124
  surname: Zhan
  fullname: Zhan, Jinyu
  organization: School of Information and Software Engineering, University of Electronic Science and Technology of China, China
– sequence: 4
  givenname: Deepak
  orcidid: 0000-0002-3768-0666
  surname: Adhikari
  fullname: Adhikari, Deepak
  organization: School of Information and Software Engineering, University of Electronic Science and Technology of China, China
– sequence: 5
  givenname: Ke
  surname: Jiang
  fullname: Jiang, Ke
  organization: Advanced Safety Department, Aptiv, Sweden
BookMark eNp9kE1LxDAQhoMouK6ePXgJeO6aNE2beNPu-gGCwtZzSdOpRttmTVKh_96uKx48eMmE4X1mhucI7fe2B4ROKVlQSuRFkS9iEscLFlMhRbaHZpTzLJKSp_toRggVkWQJOURH3r8RQtKYyBkKy9U6f7zES9C221hvgrF9dK081Di30RK8eelxsPi-2zj7CfhGDW3AhW3BqV4Dtg1egx6cCWOUT6_RqsWF8u8emx7nYwUOP72O_ru_Hn2Azh-jg0a1Hk5-6hw936yK_C56eLy9z68eIh0LGSKtmUhEUwlCtKpEprmgPGEphelHEqoyUacNIwyYoJlgtYRaiDRpeFLpWtZsjs53c6fTPwbwoXyzg-unlWUsKM0YkVRMKb5LaWe9d9CU2gS19RCcMm1JSbkVXBZ5uRVc_gieuIs_3MaZTrnxH-JsRxgA-E1LyXgsOfsC-yCHCA
CODEN ITCOB4
CitedBy_id crossref_primary_10_1016_j_sysarc_2023_103021
crossref_primary_10_1111_exsy_13664
Cites_doi 10.1016/j.micpro.2016.08.002
10.46586/tches.v2018.i3.547-572
10.7873/DATE.2013.102
10.1145/2967611
10.1109/TEVC.2007.892759
10.1145/2228360.2228398
10.1109/4235.996017
10.1109/DDECS.2011.5783087
10.1109/TCSII.2020.2989184
10.1109/92.894152
10.1016/j.sysarc.2013.09.008
10.1109/TEVC.2014.2301794
10.1109/JIOT.2018.2867917
10.1007/978-3-540-45238-6_10
10.1007/BFb0052259
10.1109/TII.2020.2978889
10.1109/DATE.2012.6176633
10.1109/TC.2019.2935042
10.1109/TSC.2019.2963301
10.1016/j.sysarc.2013.11.007
10.1109/TCAD.2020.2979457
10.1007/978-1-4020-2873-1
10.1007/978-3-642-13190-5_15
10.1145/2345770.2345773
10.1109/TEVC.2019.2912726
10.1109/TNS.2021.3053424
10.1109/ASAP.2003.1212865
10.1109/ACCESS.2022.3217212
10.1007/978-3-030-45721-1_22
10.1109/NICS.2016.7725675
10.46586/tches.v2018.i3.150-172
10.1007/s11004-005-1560-6
ContentType Journal Article
Copyright Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2023
Copyright_xml – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2023
DBID 97E
RIA
RIE
AAYXX
CITATION
7SC
7SP
8FD
JQ2
L7M
L~C
L~D
DOI 10.1109/TC.2022.3218987
DatabaseName IEEE All-Society Periodicals Package (ASPP) 2005–Present
IEEE All-Society Periodicals Package (ASPP) 1998–Present
IEEE Electronic Library (IEL) - NZ
CrossRef
Computer and Information Systems Abstracts
Electronics & Communications Abstracts
Technology Research Database
ProQuest Computer Science Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
DatabaseTitle CrossRef
Technology Research Database
Computer and Information Systems Abstracts – Academic
Electronics & Communications Abstracts
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts Professional
DatabaseTitleList
Technology Research Database
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE/IET Electronic Library
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
Computer Science
EISSN 1557-9956
EndPage 14
ExternalDocumentID 10_1109_TC_2022_3218987
9935295
Genre orig-research
GrantInformation_xml – fundername: Natural Science Foundation of Sichuan, China
  grantid: 2022NSFSC0500
– fundername: National Natural Science Foundation of China
  grantid: 62072076
GroupedDBID --Z
-DZ
-~X
.55
.DC
0R~
29I
3EH
3O-
4.4
5GY
5VS
6IK
85S
97E
AAJGR
AARMG
AASAJ
AAWTH
ABAZT
ABFSI
ABQJQ
ABVLG
ACGFO
ACIWK
ACNCT
AENEX
AETEA
AETIX
AGQYO
AGSQL
AHBIQ
AI.
AIBXA
AKJIK
AKQYR
ALLEH
ALMA_UNASSIGNED_HOLDINGS
ASUFR
ATWAV
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CS3
DU5
E.L
EBS
EJD
HZ~
H~9
IAAWW
IBMZZ
ICLAB
IEDLZ
IFIPE
IFJZH
IPLJI
JAVBF
LAI
M43
MS~
MVM
O9-
OCL
P2P
PQQKQ
RIA
RIE
RNI
RNS
RXW
RZB
TAE
TN5
TWZ
UHB
UKR
UPT
VH1
X7M
XJT
XOL
XZL
YXB
YYQ
YZZ
ZCG
AAYXX
CITATION
7SC
7SP
8FD
JQ2
L7M
L~C
L~D
ID FETCH-LOGICAL-c289t-cc3848fb800cab87c58154361ec58041a78d6f303e381783d9ed8864f54bcd9d3
IEDL.DBID RIE
ISSN 0018-9340
IngestDate Mon Jun 30 06:53:36 EDT 2025
Tue Jul 01 00:27:42 EDT 2025
Thu Apr 24 23:12:03 EDT 2025
Wed Aug 27 02:29:07 EDT 2025
IsPeerReviewed true
IsScholarly true
Issue 6
Language English
License https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html
https://doi.org/10.15223/policy-029
https://doi.org/10.15223/policy-037
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c289t-cc3848fb800cab87c58154361ec58041a78d6f303e381783d9ed8864f54bcd9d3
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0000-0002-3768-0666
0000-0001-6181-3900
0000-0002-0214-7124
PQID 2811730918
PQPubID 85452
PageCount 14
ParticipantIDs crossref_citationtrail_10_1109_TC_2022_3218987
crossref_primary_10_1109_TC_2022_3218987
ieee_primary_9935295
proquest_journals_2811730918
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2023-06-01
PublicationDateYYYYMMDD 2023-06-01
PublicationDate_xml – month: 06
  year: 2023
  text: 2023-06-01
  day: 01
PublicationDecade 2020
PublicationPlace New York
PublicationPlace_xml – name: New York
PublicationTitle IEEE transactions on computers
PublicationTitleAbbrev TC
PublicationYear 2023
Publisher IEEE
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Publisher_xml – name: IEEE
– name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
References ref13
ref35
ref12
ref15
ref37
ref14
ref36
ref33
ref10
ref32
ref2
ref17
patrick (ref39) 2016
ref16
ref38
ref19
kamber (ref34) 1998; 13
jiang (ref31) 2011
ref24
ref26
mahfouzi (ref1) 2019; 25
ref25
ref42
ref41
ma (ref18) 2011
wang (ref23) 2008
ref21
ref28
ref27
ref29
ref8
ref7
guo (ref30) 2016
ref9
adrian (ref20) 2011
ref4
baksi (ref11) 2020
ref3
ref6
ref5
ref40
anton (ref22) 2012
References_xml – year: 2020
  ident: ref11
  article-title: Fault attacks in symmetric key cryptosystems
  publication-title: IACR Cryptol ePrint Arch
– ident: ref9
  doi: 10.1016/j.micpro.2016.08.002
– ident: ref40
  doi: 10.46586/tches.v2018.i3.547-572
– ident: ref2
  doi: 10.7873/DATE.2013.102
– ident: ref19
  doi: 10.1145/2967611
– start-page: 245
  year: 2012
  ident: ref22
  article-title: Using associative memories in coding theory for communication channels
  publication-title: Proc World Congr Internet Secur
– ident: ref29
  doi: 10.1109/TEVC.2007.892759
– start-page: 369
  year: 2011
  ident: ref20
  article-title: Performance optimization of error detection based on speculative reconfiguration
  publication-title: Proc Des Automat Conf
– ident: ref17
  doi: 10.1145/2228360.2228398
– ident: ref36
  doi: 10.1109/4235.996017
– start-page: 291
  year: 2016
  ident: ref30
  article-title: MOEA/D with adaptive weight vector design
  publication-title: Proc IEEE Int Conf Comput Intell Secur
– ident: ref4
  doi: 10.1109/DDECS.2011.5783087
– ident: ref41
  doi: 10.1109/TCSII.2020.2989184
– ident: ref35
  doi: 10.1109/92.894152
– start-page: 1260
  year: 2011
  ident: ref31
  article-title: Multiobjective optimization by decomposition with pareto-adaptive weight vectors
  publication-title: Proc IEEE 7th Int Conf Natural Computation
– ident: ref27
  doi: 10.1016/j.sysarc.2013.09.008
– ident: ref33
  doi: 10.1109/TEVC.2014.2301794
– ident: ref3
  doi: 10.1109/JIOT.2018.2867917
– ident: ref12
  doi: 10.1007/978-3-540-45238-6_10
– ident: ref10
  doi: 10.1007/BFb0052259
– ident: ref16
  doi: 10.1109/TII.2020.2978889
– ident: ref15
  doi: 10.1109/DATE.2012.6176633
– volume: 25
  start-page: 1:1
  year: 2019
  ident: ref1
  article-title: Security-aware routing and scheduling for control applications on ethernet TSN networks
  publication-title: ACM Trans Des Automat Electron Syst
– ident: ref8
  doi: 10.1109/TC.2019.2935042
– ident: ref13
  doi: 10.1109/TSC.2019.2963301
– ident: ref14
  doi: 10.1016/j.sysarc.2013.11.007
– ident: ref24
  doi: 10.1109/TCAD.2020.2979457
– ident: ref38
  doi: 10.1007/978-1-4020-2873-1
– start-page: 231
  year: 2016
  ident: ref39
  article-title: Lightweight fault attack resistance in software using intra-instruction redundancy
  publication-title: Proc Int Conf Sel Areas Cryptogr
– ident: ref26
  doi: 10.1007/978-3-642-13190-5_15
– ident: ref7
  doi: 10.1145/2345770.2345773
– volume: 13
  start-page: 610
  year: 1998
  ident: ref34
  article-title: Ingo rechenberg: Evolutionsstrategie'94
– ident: ref32
  doi: 10.1109/TEVC.2019.2912726
– start-page: 25
  year: 2008
  ident: ref23
  article-title: FPGA based design of a novel enhanced error detection and correction technique
  publication-title: Proc IEEE Int Conf Electro/inf Technol
– ident: ref5
  doi: 10.1109/TNS.2021.3053424
– ident: ref28
  doi: 10.1109/ASAP.2003.1212865
– start-page: 1
  year: 2011
  ident: ref18
  article-title: LOEDAR: A low cost error detection and recovery scheme for ECC
  publication-title: Proc Des Autom Test Europe
– ident: ref6
  doi: 10.1109/ACCESS.2022.3217212
– ident: ref42
  doi: 10.1007/978-3-030-45721-1_22
– ident: ref21
  doi: 10.1109/NICS.2016.7725675
– ident: ref25
  doi: 10.46586/tches.v2018.i3.150-172
– ident: ref37
  doi: 10.1007/s11004-005-1560-6
SSID ssj0006209
Score 2.3982317
Snippet Confidentiality-Specific Faults (CSFs) will put cyber physical systems in threat, since they can result in corrupted information or even retrieve the...
SourceID proquest
crossref
ieee
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 1
SubjectTerms Algorithms
Co-design
Confidentiality
Confidentiality-Specific Faults
Cryptography
Cyber-physical systems
Decomposition
Decomposition-based Optimization
Degradation
Design optimization
Encryption
Fault detection
Fault tolerance
Fault tolerant systems
Faults
Field programmable gate arrays
Information retrieval
Multiple objective analysis
Pareto optimization
Pareto optimum
Reliability
Security
Security Co-Design
Security-Critical Cyber Physical Systems
Task analysis
Transient analysis
Title DESCO: Decomposition-Based Co-Design to Improve Fault Tolerance of Security-Critical Tasks in Cyber Physical Systems
URI https://ieeexplore.ieee.org/document/9935295
https://www.proquest.com/docview/2811730918
Volume 72
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1Na9wwEB2SnNJD0yYp3XwUHXroIXJsSyvLvbXeLKGQtBAHcjOWNIaSZR2y3kP76zOy5SU0LfQmg4QFM9LMSE_vAXwUWS0xkY57ohYu69xyoxB5mlFuHDdKG-ePBq6u1eWt_HY3vduCs81bGETswWcY-WZ_l-9au_ZHZecUS_291DZsU-E2vNXa7LpqhHMktICFjAONTxLn52VBdWCaRoLCWe6xc88iUC-p8mIf7oPLfA-uxmkNmJL7aN2ZyP7-g7Hxf-f9Bl6HLJN9GdziLWzhch_2RgUHFhb0Prx6Rkd4AN3s4qb4_pnN0APNA5qLf6U451jR8lkP9mBdy4aTCGTzer3oWNku0MtzIGsbdhP08PioocDKenW_Yj-XrPhl6N8_gmOwwJV-CLfzi7K45EGVgVsqzjpurdBSN4YyTVsbndmppjRMqASpFcukzrRTDUVG9OR_WrgcndZKNlNprMudeAc7y3aJ74HJJjNKSMwSpESiTunDusy5ODWOgqiaQDRaqrKBstwrZyyqvnSJ86osKm_aKph2Ap82Ax4Gto5_dz3whtp0CzaawMnoClVYzasq9a9xBWVW-ujvo45h18vQDxCyE9jpHtd4SslKZz70XvoEHP3lBQ
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1Nb9QwEB2VcgAOFFoQCwV84MABp0nsdRxukO1qgW5Bair1FsX2REJdbRCbPcCvZ5w4q4oPiZsj2Yqlsf3G9vN7AK9EVktMpONeqIXLOrfcKESeZpQbx43SxvmjgeW5WlzKj1fTqz14s3sLg4g9-QwjX-zv8l1rt_6o7ISw1N9L3YLbhPvTdHittVt31UjoSGgKCxkHIZ8kzk_KgnaCaRoJArTcs-duYFBvqvLHStzDy_wAlmPHBlbJdbTtTGR__qbZ-L89fwD3Q57J3g0D4yHs4foQDkYPBxam9CHcuyFIeATd7PSi-PyWzdBTzQOfi78npHOsaPmsp3uwrmXDWQSyeb1ddaxsV-gNOpC1DbsIjnh8dFFgZb253rCva1b8MPTvL2FosKCW_ggu56dlseDBl4Fb2p513FqhpW4M5Zq2NjqzU02JmFAJUimWSZ1ppxrCRvTyf1q4HJ3WSjZTaazLnXgM--t2jU-AySYzSkjMEqRUok7pw7rMuTg1jmBUTSAaI1XZIFruvTNWVb95ifOqLCof2iqEdgKvdw2-DXod_6565AO1qxZiNIHjcShUYT5vqtS_xxWUW-mnf2_1Eu4syuVZdfbh_NMzuOtN6QdC2THsd9-3-JxSl8686EfsLzlW6E8
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=DESCO%3A+Decomposition-Based+Co-Design+to+Improve+Fault+Tolerance+of+Security-Critical+Tasks+in+Cyber+Physical+Systems&rft.jtitle=IEEE+transactions+on+computers&rft.au=Jiang%2C+Wei&rft.au=Liao%2C+Xinke&rft.au=Zhan%2C+Jinyu&rft.au=Adhikari%2C+Deepak&rft.date=2023-06-01&rft.issn=0018-9340&rft.eissn=1557-9956&rft.volume=72&rft.issue=6&rft.spage=1652&rft.epage=1665&rft_id=info:doi/10.1109%2FTC.2022.3218987&rft.externalDBID=n%2Fa&rft.externalDocID=10_1109_TC_2022_3218987
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0018-9340&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0018-9340&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0018-9340&client=summon