DESCO: Decomposition-Based Co-Design to Improve Fault Tolerance of Security-Critical Tasks in Cyber Physical Systems
Confidentiality-Specific Faults (CSFs) will put cyber physical systems in threat, since they can result in corrupted information or even retrieve the cryptographic key of security-critical applications. In this paper, we will look into fault-tolerant co-design optimization for security-critical cybe...
Saved in:
Published in | IEEE transactions on computers Vol. 72; no. 6; pp. 1 - 14 |
---|---|
Main Authors | , , , , |
Format | Journal Article |
Language | English |
Published |
New York
IEEE
01.06.2023
The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | Confidentiality-Specific Faults (CSFs) will put cyber physical systems in threat, since they can result in corrupted information or even retrieve the cryptographic key of security-critical applications. In this paper, we will look into fault-tolerant co-design optimization for security-critical cyber physical systems with resource constraints, such that the encryption/decryption of confidential messages are protected against transient CSF faults. We consider imperfect fault detection mechanisms to identify transient CSF faults happened on confidentiality protection, and utilize duplication code to recovery from such faults. We utilize FPGA to accelerate the executions of security tasks, reducing the overheads of fault-tolerant implementations. The system-level design problem is formulated as a two-objective optimization problem, i.e., to minimize the average reliability degradation of the fault tolerant assignments and to minimize the balanced degree of the reliability degradation, subject to available FPGA budget, deadline, and application execution constraints. Since finding Pareto-optimal solutions is NP-hard, we propose an improved multi-objective optimization algorithm, called DEcomposition-based Security Co-design Optimization (DESCO), to search for Pareto-optimal solutions of fault-tolerant assignments. Experimental results demonstrate that DESCO is effective and can outperform other candidates, proving that our approach is promising in dealing with system-level optimization problem for security-critical applications on cyber physical systems. |
---|---|
AbstractList | Confidentiality-Specific Faults (CSFs) will put cyber physical systems in threat, since they can result in corrupted information or even retrieve the cryptographic key of security-critical applications. In this paper, we will look into fault-tolerant co-design optimization for security-critical cyber physical systems with resource constraints, such that the encryption/decryption of confidential messages are protected against transient CSF faults. We consider imperfect fault detection mechanisms to identify transient CSF faults happened on confidentiality protection, and utilize duplication code to recovery from such faults. We utilize FPGA to accelerate the executions of security tasks, reducing the overheads of fault-tolerant implementations. The system-level design problem is formulated as a two-objective optimization problem, i.e., to minimize the average reliability degradation of the fault tolerant assignments and to minimize the balanced degree of the reliability degradation, subject to available FPGA budget, deadline, and application execution constraints. Since finding Pareto-optimal solutions is NP-hard, we propose an improved multi-objective optimization algorithm, called DEcomposition-based Security Co-design Optimization (DESCO), to search for Pareto-optimal solutions of fault-tolerant assignments. Experimental results demonstrate that DESCO is effective and can outperform other candidates, proving that our approach is promising in dealing with system-level optimization problem for security-critical applications on cyber physical systems. |
Author | Zhan, Jinyu Liao, Xinke Adhikari, Deepak Jiang, Ke Jiang, Wei |
Author_xml | – sequence: 1 givenname: Wei orcidid: 0000-0001-6181-3900 surname: Jiang fullname: Jiang, Wei organization: School of Information and Software Engineering, University of Electronic Science and Technology of China, China – sequence: 2 givenname: Xinke surname: Liao fullname: Liao, Xinke organization: School of Information and Software Engineering, University of Electronic Science and Technology of China, China – sequence: 3 givenname: Jinyu orcidid: 0000-0002-0214-7124 surname: Zhan fullname: Zhan, Jinyu organization: School of Information and Software Engineering, University of Electronic Science and Technology of China, China – sequence: 4 givenname: Deepak orcidid: 0000-0002-3768-0666 surname: Adhikari fullname: Adhikari, Deepak organization: School of Information and Software Engineering, University of Electronic Science and Technology of China, China – sequence: 5 givenname: Ke surname: Jiang fullname: Jiang, Ke organization: Advanced Safety Department, Aptiv, Sweden |
BookMark | eNp9kE1LxDAQhoMouK6ePXgJeO6aNE2beNPu-gGCwtZzSdOpRttmTVKh_96uKx48eMmE4X1mhucI7fe2B4ROKVlQSuRFkS9iEscLFlMhRbaHZpTzLJKSp_toRggVkWQJOURH3r8RQtKYyBkKy9U6f7zES9C221hvgrF9dK081Di30RK8eelxsPi-2zj7CfhGDW3AhW3BqV4Dtg1egx6cCWOUT6_RqsWF8u8emx7nYwUOP72O_ru_Hn2Azh-jg0a1Hk5-6hw936yK_C56eLy9z68eIh0LGSKtmUhEUwlCtKpEprmgPGEphelHEqoyUacNIwyYoJlgtYRaiDRpeFLpWtZsjs53c6fTPwbwoXyzg-unlWUsKM0YkVRMKb5LaWe9d9CU2gS19RCcMm1JSbkVXBZ5uRVc_gieuIs_3MaZTrnxH-JsRxgA-E1LyXgsOfsC-yCHCA |
CODEN | ITCOB4 |
CitedBy_id | crossref_primary_10_1016_j_sysarc_2023_103021 crossref_primary_10_1111_exsy_13664 |
Cites_doi | 10.1016/j.micpro.2016.08.002 10.46586/tches.v2018.i3.547-572 10.7873/DATE.2013.102 10.1145/2967611 10.1109/TEVC.2007.892759 10.1145/2228360.2228398 10.1109/4235.996017 10.1109/DDECS.2011.5783087 10.1109/TCSII.2020.2989184 10.1109/92.894152 10.1016/j.sysarc.2013.09.008 10.1109/TEVC.2014.2301794 10.1109/JIOT.2018.2867917 10.1007/978-3-540-45238-6_10 10.1007/BFb0052259 10.1109/TII.2020.2978889 10.1109/DATE.2012.6176633 10.1109/TC.2019.2935042 10.1109/TSC.2019.2963301 10.1016/j.sysarc.2013.11.007 10.1109/TCAD.2020.2979457 10.1007/978-1-4020-2873-1 10.1007/978-3-642-13190-5_15 10.1145/2345770.2345773 10.1109/TEVC.2019.2912726 10.1109/TNS.2021.3053424 10.1109/ASAP.2003.1212865 10.1109/ACCESS.2022.3217212 10.1007/978-3-030-45721-1_22 10.1109/NICS.2016.7725675 10.46586/tches.v2018.i3.150-172 10.1007/s11004-005-1560-6 |
ContentType | Journal Article |
Copyright | Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2023 |
Copyright_xml | – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2023 |
DBID | 97E RIA RIE AAYXX CITATION 7SC 7SP 8FD JQ2 L7M L~C L~D |
DOI | 10.1109/TC.2022.3218987 |
DatabaseName | IEEE All-Society Periodicals Package (ASPP) 2005–Present IEEE All-Society Periodicals Package (ASPP) 1998–Present IEEE Electronic Library (IEL) - NZ CrossRef Computer and Information Systems Abstracts Electronics & Communications Abstracts Technology Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional |
DatabaseTitle | CrossRef Technology Research Database Computer and Information Systems Abstracts – Academic Electronics & Communications Abstracts ProQuest Computer Science Collection Computer and Information Systems Abstracts Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Professional |
DatabaseTitleList | Technology Research Database |
Database_xml | – sequence: 1 dbid: RIE name: IEEE/IET Electronic Library url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering Computer Science |
EISSN | 1557-9956 |
EndPage | 14 |
ExternalDocumentID | 10_1109_TC_2022_3218987 9935295 |
Genre | orig-research |
GrantInformation_xml | – fundername: Natural Science Foundation of Sichuan, China grantid: 2022NSFSC0500 – fundername: National Natural Science Foundation of China grantid: 62072076 |
GroupedDBID | --Z -DZ -~X .55 .DC 0R~ 29I 3EH 3O- 4.4 5GY 5VS 6IK 85S 97E AAJGR AARMG AASAJ AAWTH ABAZT ABFSI ABQJQ ABVLG ACGFO ACIWK ACNCT AENEX AETEA AETIX AGQYO AGSQL AHBIQ AI. AIBXA AKJIK AKQYR ALLEH ALMA_UNASSIGNED_HOLDINGS ASUFR ATWAV BEFXN BFFAM BGNUA BKEBE BPEOZ CS3 DU5 E.L EBS EJD HZ~ H~9 IAAWW IBMZZ ICLAB IEDLZ IFIPE IFJZH IPLJI JAVBF LAI M43 MS~ MVM O9- OCL P2P PQQKQ RIA RIE RNI RNS RXW RZB TAE TN5 TWZ UHB UKR UPT VH1 X7M XJT XOL XZL YXB YYQ YZZ ZCG AAYXX CITATION 7SC 7SP 8FD JQ2 L7M L~C L~D |
ID | FETCH-LOGICAL-c289t-cc3848fb800cab87c58154361ec58041a78d6f303e381783d9ed8864f54bcd9d3 |
IEDL.DBID | RIE |
ISSN | 0018-9340 |
IngestDate | Mon Jun 30 06:53:36 EDT 2025 Tue Jul 01 00:27:42 EDT 2025 Thu Apr 24 23:12:03 EDT 2025 Wed Aug 27 02:29:07 EDT 2025 |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 6 |
Language | English |
License | https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html https://doi.org/10.15223/policy-029 https://doi.org/10.15223/policy-037 |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c289t-cc3848fb800cab87c58154361ec58041a78d6f303e381783d9ed8864f54bcd9d3 |
Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
ORCID | 0000-0002-3768-0666 0000-0001-6181-3900 0000-0002-0214-7124 |
PQID | 2811730918 |
PQPubID | 85452 |
PageCount | 14 |
ParticipantIDs | crossref_citationtrail_10_1109_TC_2022_3218987 crossref_primary_10_1109_TC_2022_3218987 ieee_primary_9935295 proquest_journals_2811730918 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 2023-06-01 |
PublicationDateYYYYMMDD | 2023-06-01 |
PublicationDate_xml | – month: 06 year: 2023 text: 2023-06-01 day: 01 |
PublicationDecade | 2020 |
PublicationPlace | New York |
PublicationPlace_xml | – name: New York |
PublicationTitle | IEEE transactions on computers |
PublicationTitleAbbrev | TC |
PublicationYear | 2023 |
Publisher | IEEE The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Publisher_xml | – name: IEEE – name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
References | ref13 ref35 ref12 ref15 ref37 ref14 ref36 ref33 ref10 ref32 ref2 ref17 patrick (ref39) 2016 ref16 ref38 ref19 kamber (ref34) 1998; 13 jiang (ref31) 2011 ref24 ref26 mahfouzi (ref1) 2019; 25 ref25 ref42 ref41 ma (ref18) 2011 wang (ref23) 2008 ref21 ref28 ref27 ref29 ref8 ref7 guo (ref30) 2016 ref9 adrian (ref20) 2011 ref4 baksi (ref11) 2020 ref3 ref6 ref5 ref40 anton (ref22) 2012 |
References_xml | – year: 2020 ident: ref11 article-title: Fault attacks in symmetric key cryptosystems publication-title: IACR Cryptol ePrint Arch – ident: ref9 doi: 10.1016/j.micpro.2016.08.002 – ident: ref40 doi: 10.46586/tches.v2018.i3.547-572 – ident: ref2 doi: 10.7873/DATE.2013.102 – ident: ref19 doi: 10.1145/2967611 – start-page: 245 year: 2012 ident: ref22 article-title: Using associative memories in coding theory for communication channels publication-title: Proc World Congr Internet Secur – ident: ref29 doi: 10.1109/TEVC.2007.892759 – start-page: 369 year: 2011 ident: ref20 article-title: Performance optimization of error detection based on speculative reconfiguration publication-title: Proc Des Automat Conf – ident: ref17 doi: 10.1145/2228360.2228398 – ident: ref36 doi: 10.1109/4235.996017 – start-page: 291 year: 2016 ident: ref30 article-title: MOEA/D with adaptive weight vector design publication-title: Proc IEEE Int Conf Comput Intell Secur – ident: ref4 doi: 10.1109/DDECS.2011.5783087 – ident: ref41 doi: 10.1109/TCSII.2020.2989184 – ident: ref35 doi: 10.1109/92.894152 – start-page: 1260 year: 2011 ident: ref31 article-title: Multiobjective optimization by decomposition with pareto-adaptive weight vectors publication-title: Proc IEEE 7th Int Conf Natural Computation – ident: ref27 doi: 10.1016/j.sysarc.2013.09.008 – ident: ref33 doi: 10.1109/TEVC.2014.2301794 – ident: ref3 doi: 10.1109/JIOT.2018.2867917 – ident: ref12 doi: 10.1007/978-3-540-45238-6_10 – ident: ref10 doi: 10.1007/BFb0052259 – ident: ref16 doi: 10.1109/TII.2020.2978889 – ident: ref15 doi: 10.1109/DATE.2012.6176633 – volume: 25 start-page: 1:1 year: 2019 ident: ref1 article-title: Security-aware routing and scheduling for control applications on ethernet TSN networks publication-title: ACM Trans Des Automat Electron Syst – ident: ref8 doi: 10.1109/TC.2019.2935042 – ident: ref13 doi: 10.1109/TSC.2019.2963301 – ident: ref14 doi: 10.1016/j.sysarc.2013.11.007 – ident: ref24 doi: 10.1109/TCAD.2020.2979457 – ident: ref38 doi: 10.1007/978-1-4020-2873-1 – start-page: 231 year: 2016 ident: ref39 article-title: Lightweight fault attack resistance in software using intra-instruction redundancy publication-title: Proc Int Conf Sel Areas Cryptogr – ident: ref26 doi: 10.1007/978-3-642-13190-5_15 – ident: ref7 doi: 10.1145/2345770.2345773 – volume: 13 start-page: 610 year: 1998 ident: ref34 article-title: Ingo rechenberg: Evolutionsstrategie'94 – ident: ref32 doi: 10.1109/TEVC.2019.2912726 – start-page: 25 year: 2008 ident: ref23 article-title: FPGA based design of a novel enhanced error detection and correction technique publication-title: Proc IEEE Int Conf Electro/inf Technol – ident: ref5 doi: 10.1109/TNS.2021.3053424 – ident: ref28 doi: 10.1109/ASAP.2003.1212865 – start-page: 1 year: 2011 ident: ref18 article-title: LOEDAR: A low cost error detection and recovery scheme for ECC publication-title: Proc Des Autom Test Europe – ident: ref6 doi: 10.1109/ACCESS.2022.3217212 – ident: ref42 doi: 10.1007/978-3-030-45721-1_22 – ident: ref21 doi: 10.1109/NICS.2016.7725675 – ident: ref25 doi: 10.46586/tches.v2018.i3.150-172 – ident: ref37 doi: 10.1007/s11004-005-1560-6 |
SSID | ssj0006209 |
Score | 2.3982317 |
Snippet | Confidentiality-Specific Faults (CSFs) will put cyber physical systems in threat, since they can result in corrupted information or even retrieve the... |
SourceID | proquest crossref ieee |
SourceType | Aggregation Database Enrichment Source Index Database Publisher |
StartPage | 1 |
SubjectTerms | Algorithms Co-design Confidentiality Confidentiality-Specific Faults Cryptography Cyber-physical systems Decomposition Decomposition-based Optimization Degradation Design optimization Encryption Fault detection Fault tolerance Fault tolerant systems Faults Field programmable gate arrays Information retrieval Multiple objective analysis Pareto optimization Pareto optimum Reliability Security Security Co-Design Security-Critical Cyber Physical Systems Task analysis Transient analysis |
Title | DESCO: Decomposition-Based Co-Design to Improve Fault Tolerance of Security-Critical Tasks in Cyber Physical Systems |
URI | https://ieeexplore.ieee.org/document/9935295 https://www.proquest.com/docview/2811730918 |
Volume | 72 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1Na9wwEB2SnNJD0yYp3XwUHXroIXJsSyvLvbXeLKGQtBAHcjOWNIaSZR2y3kP76zOy5SU0LfQmg4QFM9LMSE_vAXwUWS0xkY57ohYu69xyoxB5mlFuHDdKG-ePBq6u1eWt_HY3vduCs81bGETswWcY-WZ_l-9au_ZHZecUS_291DZsU-E2vNXa7LpqhHMktICFjAONTxLn52VBdWCaRoLCWe6xc88iUC-p8mIf7oPLfA-uxmkNmJL7aN2ZyP7-g7Hxf-f9Bl6HLJN9GdziLWzhch_2RgUHFhb0Prx6Rkd4AN3s4qb4_pnN0APNA5qLf6U451jR8lkP9mBdy4aTCGTzer3oWNku0MtzIGsbdhP08PioocDKenW_Yj-XrPhl6N8_gmOwwJV-CLfzi7K45EGVgVsqzjpurdBSN4YyTVsbndmppjRMqASpFcukzrRTDUVG9OR_WrgcndZKNlNprMudeAc7y3aJ74HJJjNKSMwSpESiTunDusy5ODWOgqiaQDRaqrKBstwrZyyqvnSJ86osKm_aKph2Ap82Ax4Gto5_dz3whtp0CzaawMnoClVYzasq9a9xBWVW-ujvo45h18vQDxCyE9jpHtd4SslKZz70XvoEHP3lBQ |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1Nb9QwEB2VcgAOFFoQCwV84MABp0nsdRxukO1qgW5Bair1FsX2REJdbRCbPcCvZ5w4q4oPiZsj2Yqlsf3G9vN7AK9EVktMpONeqIXLOrfcKESeZpQbx43SxvmjgeW5WlzKj1fTqz14s3sLg4g9-QwjX-zv8l1rt_6o7ISw1N9L3YLbhPvTdHittVt31UjoSGgKCxkHIZ8kzk_KgnaCaRoJArTcs-duYFBvqvLHStzDy_wAlmPHBlbJdbTtTGR__qbZ-L89fwD3Q57J3g0D4yHs4foQDkYPBxam9CHcuyFIeATd7PSi-PyWzdBTzQOfi78npHOsaPmsp3uwrmXDWQSyeb1ddaxsV-gNOpC1DbsIjnh8dFFgZb253rCva1b8MPTvL2FosKCW_ggu56dlseDBl4Fb2p513FqhpW4M5Zq2NjqzU02JmFAJUimWSZ1ppxrCRvTyf1q4HJ3WSjZTaazLnXgM--t2jU-AySYzSkjMEqRUok7pw7rMuTg1jmBUTSAaI1XZIFruvTNWVb95ifOqLCof2iqEdgKvdw2-DXod_6565AO1qxZiNIHjcShUYT5vqtS_xxWUW-mnf2_1Eu4syuVZdfbh_NMzuOtN6QdC2THsd9-3-JxSl8686EfsLzlW6E8 |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=DESCO%3A+Decomposition-Based+Co-Design+to+Improve+Fault+Tolerance+of+Security-Critical+Tasks+in+Cyber+Physical+Systems&rft.jtitle=IEEE+transactions+on+computers&rft.au=Jiang%2C+Wei&rft.au=Liao%2C+Xinke&rft.au=Zhan%2C+Jinyu&rft.au=Adhikari%2C+Deepak&rft.date=2023-06-01&rft.issn=0018-9340&rft.eissn=1557-9956&rft.volume=72&rft.issue=6&rft.spage=1652&rft.epage=1665&rft_id=info:doi/10.1109%2FTC.2022.3218987&rft.externalDBID=n%2Fa&rft.externalDocID=10_1109_TC_2022_3218987 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0018-9340&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0018-9340&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0018-9340&client=summon |