=Paper=
{{Paper
|id=Vol-2603/short13
|storemode=property
|title=Criterion Of Cyber-Physical Systems Sustainability
|pdfUrl=https://ceur-ws.org/Vol-2603/short13.pdf
|volume=Vol-2603
|authors=Evgeny Pavlenko,Dmitry Zegzhda,Anna Shtyrkina
}}
==Criterion Of Cyber-Physical Systems Sustainability==
Copyright © 2019 for this paper by its authors. Use permitted under Creative Commons License Attribution 4.0 International (CC BY 4.0) Criterion Of Cyber-Physical Systems Sustainability Evgeny Pavlenko Dmitry Zegzhda Anna Shtyrkina Higher School of Cybersecurity and Higher School of Cybersecurity and Higher School of Cybersecurity and Information Security Information Security Peter the Great Information Security Peter the Great St. Petersburg St. Petersburg Polytechnic Peter the Great St. Petersburg Polytechnic University University Polytechnic University Saint-Petersburg, Russia Saint-Petersburg, Russia Saint-Petersburg, Russia pavlenko@ibks.spbstu.ru dmitry@ibks.spbstu.ru anna_sh@ibks.spbstu.ru Abstract—The article proposes a sustainability criterion for of CPS in the context of destructive interventions comes to the cyber-physical systems. The concept of information security for fore. cyber-physical systems has been transformed due to the specifics of these systems. Cyber-physical systems combine information and physical processes, which requires the creation of new II. RELATED WORKS approaches to ensure their security. The sustainability property There are many approaches to maintain sustainability of for such systems shows their ability to maintain correct CPS [8-19, 22]. One of promising approach uses a biology functioning under cyber-attacks. The criterion proposed in the concept of homeostasis – mechanism that provide constancy of article uses the representation of the structure of the cyber- internal organism processes. This approach provides adaptation physical system in the form of a graph, where the processes and self-regulation mechanisms of complex dynamic systems. performed by the system are reflected in the form of routes. In Such features of the approach allow autonomous control and proposed approach sustainability criterion is the number of maintenance of the state of the system. Homeostatic approach routes of a certain quality, which allow to perform the objective for CPS was proposed in [11, 12] as an ability of self- function. Such a representation of the system and the objective adaptation. However, authors of these papers were focused on function provides convenient modeling of possible ways to the operation correctness, but not on security aspects. rebuild routes. Attacking impacts and system restoration measures that prove the applicability of the criterion for Moreover, proposed model is not applicable because of high assessing the sustainability of cyber-physical systems are monitoring algorithm complexity in case of large dynamic considered. systems. One more paper [13] focused from self-adaptive architectures to self-learning architectures to learn and improve Keywords—sustainability; cyber sustainability; cyber resilience; QoS parameters over a time. However, such approach do not cyber-physical system; information security; graph theory; take into account structural parameters of CPS, but only time cybersecurity; modeling. series and data stream. Thus, due to dynamic behavior of CPS, homeostatic I. INTRODUCTION strategy can be separate on three stages: system monitoring, Cyber-physical systems (CPS) is a technological concept, sustainability estimating and making decision to system which provides a close coordination between computing and recovery. To implement this strategy, a method is needed to physical resources. In general, CPS support the maintenance of evaluate the sustainability of the CPS at the current time, as real world processes using regular monitoring and a feedback well as to predict the maximum destructive load, which will loop [1-4]. As a result, physical processes influence on lead to a complete loss of system functionality. Thus, second information processes and vice versa. stage can be realized by different methods using mathematical statistics, game theory and so on. Paper [14] proposed novel Vivid examples of CPS are industrial systems associated algorithm for estimation of system state that resilient to with critical areas of human activity [5, 6]. Unauthorized different types of attacks. Proposed method uses principles of interference with such systems can lead to disastrous robust optimization and give a “frequentist” robust estimator. consequences; therefore, the question about CPS security is However, such method do not take into account structure of the extremely important nowadays. CPS which can be represented as a network of devices. Paper The close integration of physical and information processes [15] proposed game-theoretic concept to estimating system leads to the fact that CPS security do not provide by classical sustainability. This approach defined sustainability as power- concepts of confidentially, integrity and availability of form product of the survival probabilities of cyber and physical information circulated in system [7]. The CPS protection from spaces, each with a corresponding correlation coefficient. Such destructive impact is also important, since the physical method do not take into account a structure of the system and processes implemented by system are irreversible. In this might not be as flexible as it needed for providing regard, the problem of maintaining the functional sustainability cybersecurity. Paper [16] proposes methodology to estimate environmental sustainability of CPS. This approach is scalable, The study was carried out as part of the scholarship of the President of the Russian Federation to young scientists and graduate students SP-1689.2019.5. 60 economic perspective, however due to simplifications some total route performance. failures can be missed. In addition, this method do not consider structural features of heterogeneous systems. In [17, 19] time of route execution. authors proposed to estimate CPS as rate of system recovery, energy characteristics of the vertex, determined by however this method is posteriori, so this model allow only device type. restoring system after destructive influences. Thus, when calculating the characteristics of the route, all connections between the components of the system are taken III. APPROACH TO CPS SECURITY into account, as well as the characteristics of the vertices that Homeostasis strategy was applied to security of CPS in perform the functions included in the process. Intermediate [20]. The method of estimating CPS sustainability is nodes are not counted in the summation. determined by the way the system is presented and simulated. In case of CPS, one of the most common is a model based on The presence of high-quality routes, for example, with a graph theory. Graph theory allows us to consider not only the short execution time, determines the stability of the CPS in network of devices within an integrated CPS, but also the terms of destructive influences, since the reduction of such interaction of CPS components with each other. Since the routes will lead to system downtime, which can lead to failures processes in the CPS are carried out by exchanging data and of the target function - that is, to lose sustainability. between devices, each process can be represented as a route on a graph. The presence of a large number of such routes, as well IV. ESTIMATING OF SUSTAINABILITY AREA as their quality, determine the system's ability to function, To estimate the CPS sustainability, the information system thereby giving an assessment of its stability. was modeled as a graph. The graph was constructed using Paper [18] proposed graph model, according to which CPS Erdos-Renyi model [21] with the number of nodes equal to 30, is a graph G=, where V={v1,v2,…,vn} − is set of graph and the probability, and the probability of edge appearance vertices representing the devices, and E={e1,e2,…,en} − set of equal to 0.35. Each vertex of the graph was mapped: edges representing connections between system components. set functions that the vertex can perform and its Each vertex is characterized by a tuple, which contains the complexity. characteristics, depending on its type. The important parameter performance of the device. of vertex is capacity of device performance(vi), where i is the node identifier. In addition to typical parameters, each vertex time of function execution of the device. corresponds to a set of functions that it can perform F(vi)=(f1,f2,…,fk). The set of functions that can be performed by Each edge is associated with a time rate between vi and vj components of the CPS is not homogeneous: it can include time: time(vi, vj). both trivial and more complex in terms of function While ensuring the CPS security, important parameters are implementation. Therefore, it is advisable to enter a measure times of attacks detection and CPS rebuilding to neutralize for each of the functions that determines its complexity fi→ destructive impacts. Therefore, as the characteristics of the complexity(fi). Knowing the node performance and the quality of the route were chosen the time of the route execution complexity of the functions it performs, you can find the and its total performance. execution time of the function fj on the device vi through the equation (1). As a part of study, a working route was defined, represented as a sequence of functions. To estimate CPS sustainability an algorithm was developed that performs a time(vi, fj)= complexity(fj)/ performance(vi) (1) search for various routes on a graph, including a sequence of vertices that perform functions from the working route. The Each edge also has a parameter characterizing the data rate characteristics of the intermediate vertices were not taken into between vertices vi and vj: time(vi, vj). account. For each route found, time and performance were A process running in a CPS is characterized by a sequence calculated. The bar plot for the values obtained are shown in of functions that are performed by the vertices of the graph Fig. 1. Rprocess={f1,f2,…,fm}. It should be noted that complex functions can be decomposed as a sequence of simpler ones, which allows to effectively reconfigure the route in terms of destructive effects. This fact, as well as the fact that each function can correspond to several vertices of the graph with different performance, leads to the fact that each processi in the CPS corresponds to a set of working routes pathj from Rprocess differing in their characteristics. As parameters of the routes, it is proposed to consider: Fig. 1. Bar plot for time and performance of working routes. route length. total route complexity. 61 To estimate the number of routes depending on the time of The left area of the graph corresponds to routes with lowest their execution, a cumulative function was built (Figure 2). The performance; the right area corresponds to routes with longest argument of this function is an ordered set of time values, and execution time. Thus, routes in the middle part of plot on Fig. 4 the function values are the number of routes that have a time can be interpreted as area of system sustainability. It is execution less than the value of the argument. Thus, judging proposed to limit the sustainability area by symmetric intervals from Fig. 2, the number of routes that have an execution time of length 0.25 from the intersection point. The right boundary less than 19 is approximately 100,000. refers to the execution time of the routes — that is, routes from the sustainability area should not run for longer than a certain time. The left border, respectively, refers to route performance. For fix values of execution time and performance of working route on x axis the number of routes suites to such characteristics was calculated. The largest value observed at the intersection point of two curves (Fig. 5). Since the number of routes is also a quality criterion, to limit the area of sustainability, it is proposed to cut off a part with characteristics for which the number of routes is less than 20,000. Fig. 2. Cumulative function for route time execution. In a case of performance estimation, the best quality route will have a large total performance value. Therefore, the cumulative function for the performance of routes is constructed as follows: the number of routes whose performance is greater than the value of the performance taken as the value of function (Fig. 3). Fig. 5. Number of routes for the fixed values of execution time and performance of working route. Thus, the paper proposed the criterion for CPS sustainability, which is number of working routes in system with optimal values of execution time and performance. In order to check the applicability of the criterion, it is necessary to simulate destructive influences and to check reaction of criterion to changes in system structure. V. SIMULATING IF DESTRUCTIVE INFLUENCES Fig. 3. Cumulative function for route performance. As part of the study, an attack was modeled, consisting in sequential removal of half of the vertices. For the resulting graph, number of routes was calculated, characteristics of time For further analysis, the normalization of the values of and performance that was in area of the system sustainability performance and execution time of the route was carried out. (Fig. 6). The graphs for both characteristics were combined, and then the intersection point was found (Fig.4). Fig. 4. Intersection of execution and performance curves for working routes. Fig. 6. Number of routes in sustainability area depending on the number of deleted vertices. 62 Obviously, due to varying complexity of functions performed by devices, an increase in performance of different The second model of the attack influence is to delete the types of vertices affect the number of suitable routes in vertex, which has a certain degree of criticality. As an indicator different ways. As part of the work, an experiment consists in of the vertex criticality, is it proposes to use the ratio of increasing performance of certain type vertex twice, was working routes number passing through the vertex to the total conducted. Results are presented in Figure 8. number of working routes. Number of routes depending on criticality of deleted vertex was evaluated for fixed values of Abscissa axis indicates type of functions that can be execution time and performance of routes (Fig. 7). performed by system components, arranged in order of increasing complexity. The first point on the plot corresponds to the initial value of number of routes in graph without changing the performance of devices of a particular type. Fig. 7. Number of routes in sustainability area depending on criticality of deleted vertex. Fig. 8. Sustainability criterion depended on changing performance of certain As experiments show, at a certain criticality of vertex, type vertices. number of routes in the sustainability area reaches zero, which indicates the complete inability of system to function along a It should be noted that in Figure 8, the observed linear given sequence of functions. relationship is determined by the fact that the sequence of During the simulation of attacking influences, proposed functions includes all the functions performed by system. If, criterion of sustainability showed high sensitivity to structural however, we increase length of working route and duplicate changes in CPS. occurrence of f3 function, then a small jump will be observed precisely with an increase in performance of devices implementing this function, as shown in Fig. 9. VI. APPROACH TO SYSTEM RECOVERY Taking into account the proposed criterion, recovery of system functionality is reduced to problem of changing the graph in such a way that number of routes satisfying the given characteristics increases. An increase in the number of routes is possible through implementation of various scenarios: Rebuilding and reconfiguration of CPs to improve the graph connectivity, which will lead to emergence of new routes or change their length. Definition of new sequence of performing target function due to possibility of representing the functions as a decomposition of other functions. Improving device characteristics, in particular, increasing the performance of certain type devices. Fig. 9. Sustainability criterion depended on changing performance of certain The tasks of reconfiguring the network structure and setting type vertices. new routes can be associated with high computational costs for implementing mathematical algorithms, as well as time costs Thus, for effective CPS recovery and increasing number of for rebuilding the system, which can lead to system downtime suitable routes that satisfy the specified characteristics, it is and, consequently, affect the speed of the target function. necessary to give preference to types of devices that perform Therefore, these methods are recommended in most serious more complex functions if the ratio of functions of different cases. The approach of changing the characteristics of devices types in a given sequence is approximately the same. implies the allocation of additional resources to increase devices performance. 63 VII. CONCLUSION Contingency management, Intelligent, Agent-based, Cloud computing and Cyber security" (IWCI 2018), vol. 158, pp. 100-105. 2018. DOI: CPS security reduces to maintaining system sustainability. 10.2991/iwci-18.2018.18. For solving this problem criterion on sustainability is needed. [10] N. Voropai, I. Kolosok and E. Korkina, “Resilience Assessment of the This criterion should take into account not only information State Estimation Software under Cyber Attacks,” E3S Web of and physical parameters of system devices, but also structural Conferences, vol. 58, pp. 1-6. 2018 DOI: 10.1051/e3sconf/20185802013. characteristics of CPS network. [11] I. Gerostathopoulos, D. Skoda, F.Plasil, T. Bures and A. Knauss, Using graph representation of CPS, the processes in the “Architectural Homeostasis in Self-Adaptive Software-Intensive Cyber- system can be represented as a set of routes that include a given Physical Systems,” Tekinerdogan B., Zdun U., Babar A. (eds) Software Architecture. ECSA 2016. Lecture Notes in Computer Science, vol sequence of vertices, each of which performs set of specific 9839, pp. 113-128, 2016. DOI: 10.1007/978-3-319-48992-6_8. functions. Mapping set of qualitative characteristics to vertices [12] I. Gerostathopoulos, T. Bures, P. Hnetynka, J. Keznikl, M. Kit, F. Plasil and connections, leads to simple evaluating the optimality of and N.Plouzeau, “Self-adaptation in software-intensive cyber–physical the route as total value of vertices and links characteristics systems: From system goals to architecture configurations,” Journal of containing in the route. Systems and Software,vol. 122, pp. 378-397, 2016. DOI: 10.1016/j.jss.2016.02.028. Thus, number of routes with optimal value of quality [13] H. Muccini and K. Vaidhyanathan, “A Machine Learning-Driven characteristics determines sustainability of CPS. Applicability Approach for Proactive Decision Making in Adaptive Architectures,” of this criterion was verified by modeling destructive effects, as 2019 IEEE International Conference on Software Architecture a result of which proposed sustainability assessment Companion (ICSA-C), Hamburg, Germany, 2019, pp. 242-245, 2019. DOI: 10.1109/ICSA-C.2019.00050. demonstrated high sensitivity to changes in the graph [14] S. Z. Yong, M. Q. Foo and E. Frazzoli, “Robust and resilient estimation describing CPS. for Cyber-Physical Systems under adversarial attacks,” 2016 American Control Conference (ACC), Boston, MA, 2016, pp. 308-315, 2016. DOI: REFERENCES 10.1109/ACC.2016.7524933. [15] F. He, J. Zhuang, N. S. V. Rao, C. Y. T. Ma and D. K. Y. Yau, “Game- theoretic resilience analysis of Cyber-Physical Systems,” 2013 IEEE 1st [1] D. Lavrova, M. Poltavtseva, A. Shtyrkina, “Security analysis of cyber- International Conference on Cyber-Physical Systems, Networks, and physical systems network infrastructure,” IEEE Industrial Cyber- Applications (CPSNA), Taipei, 2013, pp. 90-95, 2013. DOI: Physical Systems (ICPS), pp. 818-823, May 2018. DOI: 10.1109/CPSNA.2013.6614252. 10.1109/ICPHYS.2018.8390812. [16] S. Thiede, “Environmental Sustainability of Cyber Physical Production [2] Zegzhda D., Vasilev U., Poltavtseva M., Kefele I., Borovkov A. Systems,” Procedia CIRP, vol. 69, pp. 644-649, 2018. DOI: Advanced Production Technologies Security in the Era of Digital 10.1016/j.procir.2017.11.124. Transformation. Voprosy kiberbezopasnosti [Cybersecurity issues], [17] D. Wei, J. Kun, “Method for quantitative resilience estimation of 2018, No 2 (26), pp. 2-15. DOI: 10.21681/2311-3456-2018-2-2-15. industrial control systems,” U.S. Patent Application No. 13/703,158, [3] Kotenko I., Levshun D., Chechulin A., Ushakov I., Krasov A. Integrated 2010. Approach to Provide Security of Cyber-Physical Systems Based on [18] Barabanov A., Markov A., Tsirlov V. Procedure for Substantiated Microcontrollers. Voprosy kiberbezopasnosti [Cybersecurity issues], Development of Measures to Design Secure Software for Automated 2018, No 3 (27), pp. 29-38. DOI: 10.21681/2311-3456-2018-3-29-38. Process Control Systems. In Proceedings of the 12th International [4] N. Sadiku, Y. Wang, S. Cui, M. Musa, “Cyber-physical systems: a Siberian Conference on Control and Communications (Moscow, Russia, literature review,” European Scientific Journal, vol. 13, num. 36, pp. 52- May 12-14, 2016). SIBCON 2016. IEEE, 7491660, 1-4. DOI: 58, 2017. DOI: 10.1142/S2424862217500129. 10.1109/SIBCON.2016.7491660. [5] D. P. F. Möller and H. Vakilzadian, “Cyber-physical systems in smart [19] Markov A., Barabanov A., Tsirlov V. Periodic Monitoring and Recovery transportation,” 2016 IEEE International Conference on Electro of Resources in Information Systems. In Book: Probabilistic Modeling Information Technology (EIT), Grand Forks, ND, pp. 0776-0781. 2016. in System Engineering, by ed. A.Kostogryzov. IntechOpen, 2018, DOI: 10.1109/EIT.2016.7535338. Chapter 10, pp. 213-231. DOI: 10.5772/intechopen.75232. [6] O. Givehchi, K. Landsdorf, P. Simoens and A. W. Colombo, [20] D.P Zegzhda and E. Y. Pavlenko, “Cyber-physical system homeostatic “Interoperability for Industrial Cyber-Physical Systems: An Approach security management,” Automatic Control and Computer Sciences, vol. for Legacy Systems,” IEEE Transactions on Industrial Informatics, vol. 51, num. 8, pp. 805-816, 2017. DOI: 10.3103/S0146411617080260. 13, num. 6, pp. 3370-3378, Dec. 2017. DOI: 10.1109/TII.2017.2740434. [21] P. Erdos and A.Rényi, “On the evolution of random graphs,” Publication [7] Y.Ashibani and Q. H. Mahmoud, “Cyber physical systems security: Of The Mathematical Institute Of The Hungarian Academy Of Sciences, Analysis, challenges and solutions,” Computers & Security, vol. 68, pp. vol. 5, pp. 17-61. 1960. 81-97, 2017. DOI: 10.1016/j.cose.2017.04.005. [22] Petrenko A.S., Petrenko S.A., Makoveichuk K.A., Chetyrbok P.V. The [8] V. Marquis, R. Ho, W. Rainey, M. Kimpel, J. Ghiorzi, W. Cricchi, N. IIoT/IoT device control model based on narrow-band IoT (NB-IoT). In Bezzo, “Toward attack-resilient state estimation and control of Proceedings of the the 2018 IEEE Conference of Russian Young autonomous cyber-physical systems,” 2018 Systems and Information Researchers in Electrical and Electronic Engineering (29 Jan.-1 Feb. Engineering Design Symposium (SIEDS), Charlottesville, VA, pp. 70- 2018, Moscow and St. Petersburg, Russia) EIConRus, IEEE, 2018, pp. 75. 2018. DOI: 10.1109/SIEDS.2018.8374762. 950-953. DOI: 10.1109/EIConRus.2018.8317246. [9] I. Kolosok and E. Korkina, “Cyber resilience of SCADA at the level of energy facilities,” V-th International workshop " Critical infrastructures: 64