Abstract-Coupling cyber and physical systems gives rise to numerous engineering challenges and opportunities. An important challenge is the contagion of failure from one system to another, which can lead to large-scale cascading failures. However, the self-healing ability emerges as a valuable opportunity where the overlaying cyber network can cure failures in the underlying physical network. To capture both self-healing and contagion, this paper considers a graphical model representation of an interdependent cyber-physical system, in which nodes represent various cyber or physical functionalities, and edges capture the interactions between the nodes. A message-passing algorithm is proposed for this representation to study the dynamics of failure propagation and healing. By conducting a density evolution analysis for this algorithm, network reaction to initial disruptions is investigated. It is proved that as the number of message-passing iterations increases, the network reaches a steady-state condition that would be either a complete healing or a complete collapse. Then, a sufficient condition is derived to select the network parameters to guarantee the complete healing of the system. The result of the density evolution analysis is further employed to jointly optimize the design of cyber and physical networks for maximum resiliency. This analytical framework is then extended to the cases where propagation of failures in the physical network is faster than the healing responses of the cyber network. Such scenarios are of interest in many real-life applications such as smart grid. Finally, extensive numerical results are presented to verify the analysis and investigate the impact of the network parameters on the resiliency of the network.
Recent developments have made autonomous vehicles (AVs) closer to hitting our roads. However, their security is still a major concern among drivers as well as manufacturers. Although some work has been done to identify threats and possible solutions, a theoretical framework is needed to measure the security of AVs. In this paper, a simple security model based on defense graphs is proposed to quantitatively assess the likelihood of threats on components of an AV in the presence of available countermeasures. A Bayesian network (BN) analysis is then applied to obtain the associated security risk. In a case study, the model and the analysis are studied for GPS spoofing attacks to demonstrate the effectiveness of the proposed approach for a highly vulnerable component.
Emerging short-lived (ephemeral) connections between wireless mobile devices have raised concerns over the security of ephemeral networks. An important security challenge in these networks is to identify misbehaving nodes, especially in places where a centrally managed station is absent. To tackle this problem, a local voting-based scheme (game) in which neighboring nodes quickly decide whether to discredit an accused (target) node in mobile networks has been introduced in the literature. However, nodes' beliefs and reactions significantly affect the outcome of target node identification in the collaboration. In this paper, a plain Bayesian game between a benign node and a target node in one stage of a local voting-based scheme is proposed in order to capture uncertainties of nodes for target node identification. In this context, the expected utilities (payoffs) of players in the game are defined according to uncertainties of nodes regarding their monitoring systems, the type of target node and participants, and the outcome of the cooperation. Meanwhile, incentives are offered in payoffs in order to promote cooperation in the network. To discourage nodes from abusing incentives, a variable-benefit approach that rewards each player according to the value of their contribution to the game is introduced. Then, possible equilibrium points between a benign node and a malicious node are derived using a pure-strategy Bayesian Nash equilibrium (BNE) and a mixed-strategy BNE, ensuring that no node is able to improve its payoffs by changing its strategy. Finally, the behavior of malicious and benign nodes is studied via simulations. Specifically, it is shown how the aforementioned uncertainties and the designed incentives impact the strategies of the players and, consequently, the correct target-node identification.
Microscale sensors provide critical solutions in diverse fields, ranging from measurement, automation, and control in industrial, agricultural, and biomedical applications. However, their development is limited by many requirements and challenges, such as efficient powering and the selection of suitable wireless communication technologies. A number of wireless communication technologies have been deployed in these sensors, including terahertz (Thz) radio frequency and ultrasound. Designing sensors in micro-scale imposes challenges for any communication technique deployed. This paper investigates the use of magnetic induction-based backscatter communication in a microscale sensor. The aim here is to provide both physical and media access control (MAC) layer design analysis for a microscale mote that is powered inductively and communicates with a reader using backscattering. Magnetic induction-based communication and powering are demonstrated via analysis and simulation for the mote. Then, low-power modulation, error-correction coding, and suitable low-power MAC schemes with evidence of feasible implementation in microscale are explored. Results of the performance analysis indicate that the proposed design achieves communication at a range of at least a few centimeters (5−6 cm) with an acceptable bit error rate (BER). Finally, MAC layer analysis reveals the optimum number of motes to be deployed for various read delays and transmission rates. INDEX TERMS Microscale mote, near-field communication, IoT sensor, low-power modulation, resource-constrained MAC.
Cooperation between neighboring vehicles is an effective solution to the problem of malicious node identification in vehicular ad hoc networks (VANETs). However, the outcome is subject to nodes' beliefs and reactions in the collaboration. In this paper, a plain game-theoretic approach that captures the uncertainty of nodes about their monitoring systems, the type of their neighboring nodes, and the outcome of the cooperation is proposed. In particular, one stage of a local voting-based scheme (game) for identifying a target node is developed using a Bayesian game. In this context, incentives are offered in expected utilities of nodes in order to promote cooperation in the network. The proposed model is then analyzed to obtain equilibrium points, ensuring that no node can improve its utility by changing its strategy. Finally, the behavior of malicious and benign nodes is studied by extensive simulation results. Specifically, it is shown how the existing uncertainties and the designed incentives impact the strategies of the players and, consequently, the correct targetnode identification.
Micro-scale implantable medical devices (IMDs) extend the immense benefits of sensors used in health management. However, their development is limited by many requirements and challenges, such as the use of safe materials, size restrictions, safe and efficient powering, and selection of suitable wireless communication technologies. Some of the proposed wireless communication technologies are the terahertz (THz) radio frequency (RF), and ultrasound. This paper investigates the use of magnetic induction-based backscatter communication as an alternative technology. In particular, the goal is to provide a practical design for a micro-scale IMD, referred to as a "biomote" here, that can communicate with a wearable or handheld device such as a cell phone, tablet, or smart watch. First, it is demonstrated that communication via magnetic induction can be established between a biomote and such an external reader. Then, low-power modulation and error-correction coding schemes that can be implemented in micro-scale are explored for the mote. With the aim of increasing reliability and accuracy of measurements through mass deployment of biomotes, suitable low-power media access control (MAC) schemes are proposed, and the feasibility of their implementation in micro-scale is highlighted. Next, assuming that the human body is an additive white Gaussian noise (AWGN) channel, the performance of the mote is simulated and analyzed. Results of this analysis asserts that a communication range of at least few centimeters is achievable with an acceptable bit error rate. Finally, from the analysis of the MAC schemes, the optimum number of motes to be deployed for various read delays and transmission rates is obtained.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.