Skip to main content
Sensors (Basel, Switzerland) logoLink to Sensors (Basel, Switzerland)
. 2020 Oct 28;20(21):6123. doi: 10.3390/s20216123

Security Evaluation under Different Exchange Strategies Based on Heterogeneous CPS Model in Interdependent Sensor Networks

Hao Peng 1, Can Liu 1, Dandan Zhao 1,*, Zhaolong Hu 1, Jianmin Han 1
PMCID: PMC7662949  PMID: 33126431

Abstract

In the real Internet of Everything scenario, many large-scale information systems can be converted into interdependent sensor networks, such as smart grids, smart medical systems, and industrial Internet systems. These complex systems usually have multiple interdependent sensor networks. Small faults or failure behaviors between networks may cause serious cascading failure effects of the entire system. Therefore, in this paper, we will focus on the security of interdependent sensor networks. Firstly, by calculating the size of the largest functional component in the entire network, the impact of random attacks on the security of interdependent sensor networks is analyzed. Secondly, it compares and analyzes the impact of cascading failures between interdependent sensor networks under different switching edge strategies. Finally, the simulation results verify the effect of the security of the system under different strategies, and give a better exchange strategy to enhance the security of the system. In addition, the research work in this article can help design how to further optimize the topology of interdependent sensor networks by reducing the impact of cascading failures.

Keywords: sensor network, interdependent network, cascading failures, swap inter-links strategy, robustness, giant component

1. Introduction

During the advent of the Internet of Things (IoT), the Internet has become widely applied in our society and life. After all deepening and penetration of Internet applications, more and more sensor networks are playing a vital role in medical, industrial control systems, and military fields. Furthermore, we see that due to the limitations of a single network, a single network cannot complete more complex transactions. The sensor network has evolved from a single and small number of nodes to a complex and huge number of nodes network and accelerating to present interdependent sensor networks [1,2].

The sensor networks consist of a data collection unit, a control unit, a communication unit, and a power unit into defined environments that have specific purposes [3,4,5]. The communication unit can exchange data with other systems [6]. The control unit is necessary to interact with the real world and process the data obtained [6,7,8]. The data collection unit is essential for the interdependent network since the data can be linked and importance can be evaluated [9]. In other words, the sensor network is an embedded system that can send and receive data over networks [8]. To model the interdependent sensor networks, we transform the interdependent network into a cyber network and a physical network. This coupled network is named the Cyber-Physical System (CPS). A large number of infrastructure systems evolve into CPS. For instance, all of the smart grid systems, the transportation systems, and the radar systems are regarded as the typical representative of the interdependent CPS [9,10,11,12,13]. If one faulty node or several failed nodes appear in the above-mentioned interdependent system or other important infrastructure systems, this phenomenon may result in the loss of money or even the death of people. In this way, the reliability of the interdependent network is a leading indicator in interdependent systems, which is explored by scholars. Maintaining the normal working of interdependent networks and enhancing the ability of nodes are important. The scholars have found that a small number of failed nodes in an interdependent network could easily lead to severe cascading failures in the entire system [14,15,16].

Over the last decade, extensive research demonstrates many critical properties of the network’s organization, growth, and robustness [14,15,17]. More recently, research on network robustness has been pushed further. Nodes organize networks, but the network does not occur in isolation. Several dependency networks are constructed into one system for one purpose. To complete this purpose, different networks have to apply different sources, which are needed by other networks.

To adapt to society and human development, scholars focus on improving the reliability of social networks. Based on this goal, we model the interdependent CPS as an unweighted and undirected graph. In this graph, the devices are represented in nodes and the relationship of networks’ devices is shown in links. By reconstructing the relationship of different nodes, we achieve the goal of improving the reliability of interdependent networks. The main contributions of our paper are described in the following:

  • (i)

    First, we abstract the interdependent networks into various CPS models and attack at a fixed ratio to obtain the influence of different methods on enhancing the robustness of interdependent networks.

  • (ii)

    Second, the high betweenness centrality and high eigenvector centrality swapping inter-links strategies have a better performance than other methods in enhancing G and pc in all CPS models, respectively.

The outline of this work is as follows: many efforts in improving reliability are shown in Section 2. In Section 3, we describe our models for the CPS. Section 4 performs the processes of six kinds of swapping strategies in detail. Section 5 is the simulation of our models and we analyzed the reasons for the important points. In the end, conclusions are summarized in Section 6.

2. Literature Review

The interdependent sensor network is becoming increasingly critical in daily life. Maintaining the reliability of interdependent CPS has become an important research direction. Many scholars have explored this topic from the hardware perspective [18,19,20,21]. In [11], research work shows that the interdependent network will lead to a large number of new dataflows on the Internet of Production (IoP). In [22], scholars study the realization of multi-state channels and the security of symbol energy, and consider their influence on the acceptance threshold of interdependent networks. The method [21,23] is proposed to change the system state by software to ensure that the system remains safe. Except for changing network reliability of hardware and software, a number of researchers have also promoted studying the reliability of the network of interdependence direction from the evaluation of the safety of the network [24]. Machine learning is gradually applied to enhance the reliability of the interdependent network [18,25,26].

The mentioned studies depart the CPS into the physical devices and the cyber components. The above methods are studied depending on the differences in the network’s equipment. Recently, improving the robustness of the interdependent networks by abstracting the system into a graph is another research direction that has received more attention. This approach ignores the differences between devices and treats all devices and components as objects with similar functions. It pays attention to the point-to-point topological relationship between interdependent networks. Because of the specifics of actuation and the physical world reaction, a unique CPS model is infeasible [17]. To solve this problem, Zhang et al. [27] proposed a classification of interdependent networks that is now widely used. In interdependent CPS, batteries and sensors, for example, seem to be physical components. The cyber components include embedded computers and communication networks. To model the relationship of intra-links and inter-links between these two networks, Wang et al. [28] and Derler et al. [29] proposed different algorithms to solve the above-mentioned relationship between the intra-links and inter-links and related problems.

In the above interdependent network graph models, scholars propose various methods to improve the reliability of the CPS. Tu et al. [30] study the robustness of a single network with different values of network centralities. They find the optimal network topology to achieve the best network robustness. They deduce that if one network has better reliability, the values of metrics that they proposed will be different from before. In one network, there are several important nodes and a large number of unimportant nodes. Keeping important nodes in a safe state could guarantee the entire CPS relatively safe [31,32]. However, Nguyen et al. [32] prove that finding critical nodes in a network graph is an NP-hard problem. When one node fails in one network, it can restore to normal working condition by itself without relying on external force [33]. However, this approach will consume huge amounts of money [34]. Refiguring the relationship of links in one network by rewiring links can improve the reliability of interdependent networks [10,35]. However, it is difficult to come true in an existing factual network. This modification will affect the normal operation of existing networks and cause many existing nodes and links to be abandoned. Therefore, this method will lead to a lot of wasting of resources. Adding links in networks was proposed by XingPei Ji et al. [34,36,37]. They discuss the effects of different addition strategies on the reliability of CPS. Through numerous simulations, they find that interdependent networks can maximize reliability by adding intra-links by low inter degree-degree (IDD) values. This will cause many redundant lines and increase overheads. The approach of adjusting the dependency links allocation [38,39] may not increase the costs of building systems. The pros and cons of these mentioned approaches are listed in Table 1.

Table 1.

Approaches in interdependent systems.

Approaches Pros Cons
Protecting critical network nodes This method has strong pertinence Finding the critical nodes is
an NP-hard problem
Making nodes autonomous It can make the failure node recover
its function and reduce manpower
Expensive;
Hard to choosing important nodes
Refiguring the topology of network It can achieve the purpose of
enhancing network reliability
It is not suitable for
the existing network
Adding intra-links in systems Simple;
More choices
Increase cost
Adjusting dependency link allocation The amount that needs to
be exchanged is relatively small
The inter-link’s distance between
nodes is longer than intra-link

Swapping the relationship of inter-links does not affect the existing intra-links distribution. Therefore, the topology of the system will not change much. According to the above point of view, swapping inter-links is a better way to enhance system robustness.

3. The Model

In reality, interdependent sensor networks have been widely used in our society. All of the Internet of Vehicles, the Intelligent factory, and Smart medical are regarded as sensor networks. They depend on the controlling of a sensor network of the cloud calculating or data transportation. As shown in Figure 1, these application scenarios show the extensiveness of interdependent sensor networks based on heterogeneous CPS architecture, which always consists of all kinds of networks, usually represented by coupled cyber networks and physical networks. In this section, we review different correspondence relationships and processes of cascading failure in interdependent sensor networks. To briefly describe the cascading failure in sensor networks composed of a heterogeneous CPS model, we construct a simple model to perform the cascading failure’s processes in detail.

Figure 1.

Figure 1

Application scenarios of interdependent sensor networks based on heterogeneous Cyber-Physical System (CPS) architecture.

3.1. Interdependent Networks Model

The ‘one-to-one correspondence’ model is suggested by Buldyrev to represent the cascading failure between networks [14]. These coupled two networks are named A and B in the correspondence model. Based on the ‘one-to-one correspondence’ relationship between networks, each node in network A has an inter-link with one node from network B, and vice versa. For this reason, the number of nodes in two networks that establish the ‘one-to-one correspondence’ model is the same.

To improve the unity of the ‘one-to-one correspondence’ model, Shao et al. [33,40,41] build a ‘multiple-to-multiple correspondence’ model to imitate the real-world networks. This correspondence relationship implies that a node in network A operates depending on several nodes from network B, and vice versa. ‘Multiple-to-multiple correspondence’ can better display some characteristics of realistic networks.

‘One-to-multiple correspondence’ model [17,40,42,43] is different to ‘one-to-one correspondence’ and the ‘multiple-to-multiple correspondence’ model. It combines some features of the above two models. Firstly, it increases the singularity of inter-links connection relationships of the ‘one-to-one correspondence’ model. It then improves the overcomplexity of the ‘multiple-to multiple correspondence’ model, which is difficult to explore in studying research. The ‘one-to-multiple correspondence’ model can well simulate the connection of equipment in the smart power grid. One power station can provide power for multiple devices, but one control device only controls one power station. According to this correspondence relationship, the ‘one-to-multiple correspondence’ model is widely used in power grid model simulation.

3.2. Cascading Failures Model

Buldyrev et al. study the robustness of the ‘one-to-one correspondence’ model, and they put forward two conditions that must be met at the same time when one node in interdependent networks can normally work [14]:

  1. This node must belong to the giant component of its network;

  2. The node must have at least one inter-link from other networks.

They derive the theoretical formula of final nodes number after cascade failures and verify its correctness through experimental simulation:

x=gA(y)py=gB(x)p (1)

where gA(y)(gB(x)) means the fraction of nodes that belong to the giant component of the network A(B). p is the remaining fraction of nodes at the initial attacking stage. They give the derivation formula of the critical value pc, which means the maximum value of p when CPS is not collapsed completely:

1=p2dgAdx[pgB(x)]dgBdx(x)x=xc,x=pc (2)

Equation (1) in ER networks will transform to:

x=p[1fA]y=p[1fB] (3)

where

fA=exp[ay(fA1)]fA=exp[bx(fB1)] (4)

In SF networks, Equation (1) is changing into:

x=pkA[pκ˜AkB(κ˜Bx)1/(3λB)]1/(3λA) (5)

κ˜A(κ˜B) is the number of normal working nodes in the network A(B) after the first stage in the cascading failure. kA(kB) is the average degree value of the network A(B). λA(λB) is the parameter of SF network A(B).

These conditions have been extensively studied and used in network theory. In this study, we use the above conclusions to measure the number of normal working nodes. Failed nodes trigger cascading failures in either network A or B. The proportion of the initially failed nodes is usually denoted by 1p. All symbols in the above equations are detailed and represented in Table 2.

Table 2.

Key notations in the analysis of cascading failures functions.

Symbol Meaning
1p The fraction of attacked nodes at the first stage
NAi, NBi The fraction of nodes in the giant component of network A, B in stage i
NAi, NBi The number of nodes remaining in network A, B in stage i
μi The fraction of remaining in network nodes
μi The fraction of normal operation nodes in network
gA, gB The generating functions of network A, B
x, y The final stage nodes’ number of network A, B

We assume that the (1p)|NA| number of failed nodes initially appears in the network A. The number of nodes in network A and B is denoted by NA and NB. All links of the failed nodes are removed, and network A splits into several components. According to the second of the above nodes’ normal working conditions, all nodes in network A except the giant component will be removed. In the next stage, network B starts to fragment into components since several nodes lost their inter-links from network A. A certain amount of nodes separated from the giant component of network B are considered as failed nodes and removed all links. Thus, some nodes cannot operate due to a violation of condition I. This will cause the failure to spread from network B to network A. The nodes that are not following the above two conditions will be removed with their links. The cascading failure occurs recursively in the two networks until the failure stops in one of the following two conditions:

  1. All nodes are removed, and the interdependent networks are completely collapsing;

  2. The rest of the nodes both obey conditions I and II. These nodes will not continue to fail nor propagate failures. In this case, the interdependent networks achieve a steady state.

In Figure 2, we give the processes of cascading failures in a simple CPS model. In the interdependent networks model, the ratio of inter-links is 3:1. We intercept the connection of some nodes in the model. We assume that the model links relationships shown in the figure. Ten nodes in network A and five nodes in network B in the initial stage. Initially, there are ten nodes and five nodes in network A and B. The random attack upon network A causes failure of node A7. In the initial stage (Figure 2b), we remove all intra-links and inter-links that are linked to node A7 (node is shown in the red circle, and links are shown in solid red lines). Thus, A6 and A7 (shown in yellow circles) are departed from the giant component of network A. In stage 2, A6 and A7 are removed with all links (shown in yellow dotted lines in (b)). Consequently, two network nodes B fail, while node B1 (red square) is excluded from the giant component, and B0 (yellow square) loses inter-links. In this way, in stage 3, node B0, B1 and their links are deleted, network B fragments into components. Node A0 (red circle) fails because it does not have a supporting link from network B. In the final stage (Figure 2e), the normal working nodes of this system reach a stable stage and cascading failures will not occur. As the cascading failure stops, there are five nodes in network A and three nodes in network B can operate normally.

Figure 2.

Figure 2

The cascading failure in interdependent networks.

4. The Method

This section introduces six kinds of swapping inter-links strategies that we apply in our CPS models. To clarify the difference in operation between different strategies, we will exchange inter-links by a low degree swapping strategy and a high degree swapping strategy on the model shown in Figure 2a. After the swapping operations, the inter-links relationships of the CPS will be changed, as shown in Figure 3c and Figure 4c.

Figure 3.

Figure 3

The entire low degree (LD) swapping inter-links strategy processes in interdependent networks.

Figure 4.

Figure 4

The full high-degree (HD) swapping inter-links strategy processes in interdependent networks.

At first, we apply NONE as a comparative experiment in our paper. NONE is the behavior of not performing any operations. It means that we use the original network system to suffer random attacks.

4.1. Strategy 1: Low Degree (LD)

Degree centrality is one of the most essential and most straightforward metrics to reflect the importance of one node locality in one network [14,36,44]. The LD swapping strategy is calculating all nodes’ degree values and ranking nodes in an increasing order to construct a new interdependent network model. One inter-link is swapped of the two nodes, which have the lowest degree centrality values in these two networks. We must ensure that the total number of inter-links and the number of each nodes’ inter-links in the entire model remain unchanged. For example, node B2 has two inter-links with network A, and the total number of inter-links is 10 in Figure 2a. We must maintain two inter-links with node B2 and the number of inter-links in the entire system is ten after swapping processes. The swapping operations are repeated until the demanding number of nodes’ inter-links are swapped.

In Figure 3a initial stage, we calculate the degree value of a node by determining the number of intra-links within it. Based on the initial system shown in (a), the nodes with the lowest degree value in network A are A0, A3, A6, A8, A9. These nodes all have the same value of degrees, and the value is 1. In network B, the lowest degree value nodes are B1, B3, B4 and the degree value is 1. According to the LD strategy requirements, we must ensure that the number of inter-links in nodes does not change. In the model, A0 connects B1 with an inter-link and A3 links B1 by one inter-link. All inter-links of A0, A3 and B1 are connected to the nodes with the lowest degree, so no swapping operations are required. A6 node depends on B0 node while B3 depends on nodes A1 and A7. The degree value of node A7 is smaller than the node A1. For this reason, we swap inter-links among A6, B0, A7, and B3 as indicated in (b) by green dotted lines. The inter-links’ relationship after a successful LD swapping strategy in the system is shown in Figure 3c by green solid lines. After the above operations, we complete the swapping inter-link operation once.

4.2. Strategy 2: High Degree (HD)

High degree (HD) swapping strategy is described as the following: calculating all nodes degree values and ranking nodes in decreasing order by degrees. An inter-link is swapped between two nodes, which have the highest degree centrality values in their networks. We ensure that the total number of inter-links and each node’s inter-links in the entire model remain unchanged. The swapping operation is repeated a demanded number of times.

Next, we swap one inter-link in Figure 4a model by HD strategy. The highest degree of network A is node A1 and network B is node B2. Therefore, we swap the existing inter-links between A1, B3, A2 and B2, as shown in Figure 4b. The relationship of inter-links of the initial system is that A1 links B3, A2 depends on B2. It is shown that A1 links B3 by an inter-link and B2 depends on node A2 and A5. To realize the connection between A1 and B2, we need to directly select one node between A2 and A5 as the swapping inter-link choice. The degree values of node A2 and A5 are the same and we select A5 as swapping nodes (we also can choose A2 as one selection). We choose these nodes’ inter-links to complete the swapping operation (green dotted lines in (b)). After swapping operations, the system relationship of inter-links is shown in (c). The green solid lines indicate the dependent relationship after the successful swap of inter-links. The CPS model after completing one time of HD swapping operation is shown in Figure 4c.

4.3. Strategy 3: Low Betweenness (LB)

Betweenness centrality is a metric to evaluate nodes’ importance by paths [36,45]. The betweenness centrality values of nodes can be calculated by the following equation:

B(v)=ijσij(v)σij (6)

where σij is the number of the shortest paths going from node i to node j and σij(v) is the number of shortest paths going from node i to node j through node v [36,44,46].

LB swapping strategy is the following: calculating all nodes betweenness centrality values and ranking nodes to increase order with degree values. An inter-link is swapped between two nodes, which have the lowest betweenness centrality values. We have to ensure that the total number of inter-links and the number of each nodes’ inter-links in the entire model remain unchanged. The swapping operation is repeated until the specified number of nodes’ inter-links is swapped.

4.4. Strategy 4: High Betweenness (HB)

The HB swapping strategy is described as calculating all nodes betweenness centrality values and ranking nodes in descending order. An inter-link is swapped between two nodes, which have the highest betweenness centrality values. We have to ensure that the total number of inter-links and the number of each nodes’ inter-links in the entire model remain unchanged. The swapping operation is repeated until a demanded number of nodes’ inter-links are swapped.

4.5. Strategy 5: Low Eigenvector Centrality (LEC)

The eigenvector centrality is a metric to measure the nodes’ importance, and it is an extension of degree centrality [46]. The eigenvector centrality fully considers both of the importance of nodes’ neighbors and the number of neighbors. If one node’s neighbor is essential, this node will be considered significant, too [44].

To calculate all nodes’ eigenvector centrality values, we need to construct an all nodes’ adjacency matrix A and Aij is an element of this matrix. xi is the eigenvector centrality value of node i. We set the value of the initial xi as 1. Then we use the initial xi to calculate a new value of xi. The value of xi is the sum of the neighbors, eigenvector centrality values of node i’s: [44,46]:

xi=κ11jAijxj (7)

where κ1 is the largest eigenvector value of A.

The LEC swapping strategy operates as follows: calculating all node eigenvector centrality values and ranking nodes in increasing order. An inter-link is swapped of the two nodes, which have the lowest eigenvector centrality values. We have to ensure that the total number of inter-links and the number of each nodes’ inter-links in the entire model remain unchanged. The swapping operation is repeated until the demanded number of nodes’ inter-links are swapped.

4.6. Strategy 6: High Eigenvector Centrality (HEC)

The HEC swapping strategy operates as follows: calculating all nodes’ eigenvector centrality values and ranking them in descending order by eigenvector centrality values. An inter-link is swapped between two nodes, which hold the highest eigenvector centrality values. We make sure that the total number of inter-links in the entire model and each of the nodes’ inter-links remains unchanged. The swapping operation is repeated until the specified number of nodes’ inter-links are swapped.

5. Simulation Results and Analysis

In Section 5, we simulate the interdependent sensor networks models. By modeling the processes of cascading failures in models, we obtain the conclusions of which strategies have the best influences in enhancing interdependent network reliability. In [39], scholars have studied system reliability in ‘one-to-one correspondence’ and ‘one-to-multiple correspondence’ under the HB swapping strategy. Their models are built by BA networks. More swapping strategies are simulated in the ‘one-to-one correspondence’ system in [44]. To study how six kinds of swapping strategies affect the robustness of the ‘one-to-multiple correspondence’ system, we conduct the following simulations.

To get more universal conclusions, we build four kinds of CPS models. Erdös and Rényi constructs the network models ER network. The scale-free network (SF network) is used in our model, too. The average degree is k=4 in all networks that we build. The parameter λ=3 in the SF network. According to the current state of an interdependent network such as the smart power grid, we regard ‘one-to-multiple correspondence’ as the dependence relationship of two networks in our simulation models. We set NA and NB as 15,000 and 5000, and the connection ratio of the dependency relationship is 3:1. The graph of the CPS is unweighted and undirected, so the intra-links and inter-links are bidirectional.

Then we use different swapping strategies to change the randomly connected inter-links in these models. Due to constraints such as economic conditions and operational complexity, we define the fraction of swapping inter-links between nodes fN as:

fN=NSNA (8)

where NS is the total number of inter-links that are swapped by strategies. NA is the node number of network A, which is the same as the number of inter-links.

After swapping inter-links operations, we introduce random attacks into the model as attacks on the network. We implement an accidental removal of the network A node with the ratio (1p) as the failed node under random attacks. To reduce the experimental results’ error, we simulate 20 times for each 1p under one certain swapping strategy and fN. The parameters that we use in our simulation have been detailed and represented in Table 3. We take the average of these results as the final simulation results. We take G, which means the proportion of nodes in the giant component, to measure the CPS’s reliability. G can be calculated as:

G=NA+NBNA+NB (9)

NA(NB) is the number of normal working nodes at the final steady-state. To measure maximum tolerant ability against random failure, we observe the values of pc in the following figures.

Table 3.

The parameters of our simulation models.

Symbol Values
NA 15,000
NB 5000
k 4
λ 3
simulation times of each 1p 20

We conduct performance comparisons among the six swapping strategies discussed in Section 4. The values of fN in Figure 5, Figure 6 and Figure 7 are 30%, 50% and 70%. In all figures, we plot the relationship between G, pc and 1p under no swapping operation (NONE) as a contrast experiment for other strategies. From Figure 5, Figure 6 and Figure 7, we can obtain the following situations and get several conclusions:

  1. All swapping strategies perform better than NONE in improving G and pc. The values of G are clearly bigger in swapping strategies than NONE when 1p increases. For example, the values of G in NONE are lower than the other strategies when (1p)>0.58 in Figure 5a. When (1p)>0.5, the value of G in NONE is lower than other strategies in Figure 6b. This situation can be observed in all four subfigures in Figure 5, Figure 6 and Figure 7.

    The value of pc is increasing with fN increases. For instance, the values of pc in Figure 5a, Figure 6a and Figure 7a are getting closer and closer to 0.7, and the pc values are closer to 0.75 among Figure 5c, Figure 6c and Figure 7c.

  2. In Figure 5, Figure 6 and Figure 7, all curves can be divided into three categories. The first is NONE, which shows the worst performance in improving system reliability. The second is swapping inter-links by low centrality values, which are LD, LB, and LEC strategies. Although they show better performance than NONE in enhancing G and pc, they are not the best choices to achieve more robust systems. The last category is swapping inter-links with high centrality values. High centrality swapping strategies increase the values of G and pc. We should adopt a high centrality value swapping strategy for improving system reliability. This finding is the same conclusion as in [39,44].

  3. The sharp drop of G gets relief under all swapping strategies. This phenomenon is best reflected in Figure 5d, Figure 6d and Figure 7d. When 1p gets close to pc, the G value of NONE is sharply decreased. The stark contrast is the G value under the HB strategy in the SF–SF system, which is smoother. This finding means that swapping inter-links in a CPS combined by SF networks is more sensitive in enhancing reliability than combining by ER networks. This conclusion is also found in the ‘one-to-one correspondence’ model [44].

  4. From all subfigures, we plot in Figure 5, Figure 6 and Figure 7. We conclude that the HB swapping strategy can be the first choice in improving G and HEC is the first choice in improving pc values. HB strategy shows the best performance in improving the value of G, and the HEC strategy is better in enhancing pc values. The values of pc in Figure 5a–d figures under the HEC strategy are 0.66, 0.69, 0.73 and 0.84, in Figure 6a–d are 0.68, 0.69, 0.75 and 0.85, and in Figure 7a–d are 0.68, 0.7, 0.78 and 0.82. This conclusion is more significant in the SF–SF CPS model. In Figure 5d, the value of pc under HEC is close to 0.8. The value of pc with HEC is more than 0.8 in Figure 6d. This finding is different from [39,44]. We reveal that network construction plays a vital role in system reliability.

Figure 5.

Figure 5

The fraction of function nodes in systems when fN = 30% in ER–ER, ER–SF, SF–ER, and SF–SF systems, which is shown in (ad), respectively.

Figure 6.

Figure 6

The fraction of function nodes in systems when fN = 50% in ER–ER, ER–SF, SF–ER, and SF–SF systems, which are shown in (ad), respectively.

Figure 7.

Figure 7

The fraction of function nodes in systems when fN = 70%. (ad) are the systems that are being combined with ER–ER, ER–SF, SF–ER, and SF–SF, respectively.

6. Conclusions and Future Work

To analyze the security of interdependent sensor networks, this paper first constructs a heterogeneous CPS system model with one fixed ratio. On this basis, the security enhancement algorithm of interdependent sensor networks under different swapping link strategies is realized. Next, we analyze the security of interdependent sensor networks by calculating the ratio of the giant component weight of G to the maximum resistance to random attacks pc after cascading failures. Finally, through comparative analysis of simulation experiments, better system security can be obtained through a higher central value swapping link method. The experiments results represent the high betweenness centrality swapping strategy is more effective in improving G, and the high eigenvector centrality swapping strategy is a better choice in improving pc than other simulation strategies. At the same time, another important conclusion is that the SF network is more sensitive to the security of the system by exchanging internal links than in the ER network.

However, the model proposed in this paper still has some limitations. In the next step, we should build a better, more complex, and interdependent empirical model of sensor networks to simulate actual network systems. In addition, in the next step, we need to find more security enhancement strategies or artificial intelligence optimization algorithms to optimize the security enhancement strategies proposed in this article.

Author Contributions

Formal analysis, H.P.; Writing and original draft, C.L.; Project administration, D.Z.; Data curation, J.H.; Software, Z.H. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported in part by the National Natural Science Foundation of China under grant No. 62072412, No. 61902359, No. 61702148 and No. 61672468, in part by the Opening Project of Shanghai Key Laboratory of Integrated Administration Technologies for Information Security under grant AGK2018001.

Conflicts of Interest

The authors declare no conflict of interest.

Footnotes

Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

References

  • 1.Zhu Y.H., Li E., Chi K., Tian X. Designing prefix code to save energy for wirelessly powered wireless sensor networks. IET Commun. 2018;12:2137–2144. doi: 10.1049/iet-com.2018.5055. [DOI] [Google Scholar]
  • 2.Casado-Vara R., Novais P., Gil A.B., Prieto J., Corchado J.M. Distributed continuous-time fault estimation control for multiple devices in IoT networks. IEEE Access. 2019;7:11972–11984. doi: 10.1109/ACCESS.2019.2892905. [DOI] [Google Scholar]
  • 3.Cheng C.F., Wang C.W. The target-barrier coverage problem in wireless sensor networks. IEEE Trans. Mob. Comput. 2017;17:1216–1232. doi: 10.1109/TMC.2017.2751040. [DOI] [Google Scholar]
  • 4.Gao H., Duan Y., Shao L., Sun X. Transformation-based processing of typed resources for multimedia sources in the IoT environment. Wirel. Netw. 2019:1–17. doi: 10.1007/s11276-019-02200-6. [DOI] [Google Scholar]
  • 5.Liu X., Lin P., Liu T., Wang T., Liu A., Xu W. Objective-variable tour planning for mobile data collection in partitioned sensor networks. IEEE Ann. Hist. Comput. 2020:1. doi: 10.1109/TMC.2020.3003004. [DOI] [Google Scholar]
  • 6.Wang W., Liu Q.H., Liang J., Hu Y., Zhou T. Coevolution spreading in complex networks. Phys. Rep. 2019;820:1–51. doi: 10.1016/j.physrep.2019.07.001. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 7.Koc H., Shaik S.S., Madupu P.P. Reliability Modeling and Analysis for Cyber Physical Systems; Proceedings of the 2019 IEEE 9th Annual Computing and Communication Workshop and Conference (CCWC); Las Vegas, NV, USA. 7–9 January 2019; pp. 7–9. [Google Scholar]
  • 8.Jazdi N. Cyber physical systems in the context of Industry 4.0; Proceedings of the 2014 IEEE International Conference on Automation, Quality and Testing, Robotics; Cluj-Napoca, Romania. 22–24 May 2014; pp. 1–4. [Google Scholar]
  • 9.Wang T., Luo H., Zeng X., Yu Z., Liu A., Sangaiah A.K. Mobility based trust evaluation for heterogeneous electric vehicles network in smart cities. IEEE Trans. Intell. Transp. Syst. 2020:1–10. doi: 10.1109/TITS.2020.2997377. [DOI] [Google Scholar]
  • 10.Zhang J., Yeh E., Modiano E. Robustness of interdependent random geometric networks. IEEE Trans. Netw. Sci. Eng. 2018;6:474–487. doi: 10.1109/TNSE.2018.2846720. [DOI] [Google Scholar]
  • 11.Pennekamp J., Henze M., Schmidt S., Niemietz P., Fey M., Trauth D., Bergs T., Brecher C., Wehrle K. Dataflow Challenges in an Internet of Production: A Security & Privacy Perspective; Proceedings of the ACM Workshop on Cyber-Physical Systems Security & Privacy; London, UK. 11 November 2019; pp. 27–38. [Google Scholar]
  • 12.Mihalache S.F., Pricop E., Fattahi J. Resilience Enhancement of Cyber-Physical Systems: A Review. In: Mahdavi Tabatabaei N., Najafi Ravadanegh S., Bizon N., editors. Power Systems Resilience. Springer; Berlin/Heidelberg, Germany: 2019. pp. 269–287. [Google Scholar]
  • 13.Zikria Y.B., Afzal M.K., Kim S.W. Internet of Multimedia Things (IoMT): Opportunities, Challenges and Solutions. Sensors. 2020;20:2234. doi: 10.3390/s20082334. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 14.Buldyrev S.V., Parshani R., Paul G., Stanley H.E., Havlin S. Catastrophic cascade of failures in interdependent networks. Nature. 2010;464:1025–1028. doi: 10.1038/nature08932. [DOI] [PubMed] [Google Scholar]
  • 15.Gao J., Buldyrev S.V., Stanley H.E., Havlin S. Networks formed from interdependent networks. Nat. Phys. 2012;8:40. doi: 10.1038/nphys2180. [DOI] [PubMed] [Google Scholar]
  • 16.Wu Y., Huang H., Wu Q., Liu A., Wang T. A risk defense method based on microscopic state prediction with partial information observations in social networks. J. Parallel Distr. Com. 2019;131:189–199. doi: 10.1016/j.jpdc.2019.04.007. [DOI] [Google Scholar]
  • 17.Huang Z., Wang C., Stojmenovic M., Nayak A. Characterization of cascading failures in interdependent cyber-physical systems. IEEE Trans. Comput. 2014;64:2158–2168. doi: 10.1109/TC.2014.2360537. [DOI] [Google Scholar]
  • 18.Dibaji S.M., Pirani M., Flamholz D.B., Annaswamy A.M., Johansson K.H., Chakrabortty A. A systems and control perspective of CPS security. Annu. Rev. Control. 2019;47:394–411. doi: 10.1016/j.arcontrol.2019.04.011. [DOI] [Google Scholar]
  • 19.Prathiba A., Bhaaskaran V.K. Hardware footprints of S-box in lightweight symmetric block ciphers for IoT and CPS information security systems. Integration. 2019;69:266–278. doi: 10.1016/j.vlsi.2019.05.003. [DOI] [Google Scholar]
  • 20.Tippenhauer N.O., Wool A. CPS-SPC 2019: Fifth Workshop on Cyber-Physical Systems Security and PrivaCy; Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security; New York, NY, USA. 11–15 November 2019; pp. 2695–2696. [Google Scholar]
  • 21.Gardiner J., Craggs B., Green B., Rashid A. Oops I did it again: Further adventures in the land of ICS security testbeds; Proceedings of the ACM Workshop on Cyber-Physical Systems Security & Privacy; London, UK. 11 November 2019; pp. 75–86. [Google Scholar]
  • 22.Zhang J., Yang A., Hu Q., Hancke G.P. Security Implications of Implementing Multistate Distance-Bounding Protocols; Proceedings of the ACM Workshop on Cyber-Physical Systems Security & Privacy; London, UK. 11 November 2019; pp. 99–108. [Google Scholar]
  • 23.Romagnoli R., Krogh B.H., Sinopoli B. Design of software rejuvenation for cps security using invariant sets; Proceedings of the 2019 American Control Conference (ACC); Philadelphia, PA, USA. 10–12 July 2019; pp. 3740–3745. [Google Scholar]
  • 24.Castellanos J.H., Zhou J. A modular hybrid learning approach for black-box security testing of cps. In: Deng R., Gauthier-Umaña V., Ochoa M., Yung M., editors. Applied Cryptography and Network Security. Springer; Berlin/Heidelberg, Germany: 2019. pp. 196–216. [Google Scholar]
  • 25.Wang T., Cao Z., Wang S., Wang J., Qi L., Liu A., Xie M., Li X. Privacy-enhanced data collection based on deep learning for Internet of vehicles. IEEE Trans. Industr. Inform. 2020;16:6663–6672. doi: 10.1109/TII.2019.2962844. [DOI] [Google Scholar]
  • 26.Zikria Y.B., Afzal M.K., Kim S.W., Marin A., Guizani M. Deep learning for intelligent IoT: Opportunities, challenges and solutions. Elsevier. 2020;164:50–53. doi: 10.1016/j.comcom.2020.08.017. [DOI] [Google Scholar]
  • 27.Zhang F., Shi Z., Mukhopadhyay S. Robustness analysis for battery-supported cyber-physical systems. ACM Trans. Reconfigurable Technol. Syst. 2013;12:69. doi: 10.1145/2442116.2442119. [DOI] [Google Scholar]
  • 28.Wang Z., Scaglione A., Thomas R.J. Generating statistically correct random topologies for testing smart grid communication and control networks. IEEE Trans. Smart Grid. 2010;1:28–39. doi: 10.1109/TSG.2010.2044814. [DOI] [Google Scholar]
  • 29.Derler P., Lee E.A., Vincentelli A.S. Modeling cyber–physical systems. Proc. IEEE Inst. Electr. Electron. Eng. 2011;100:13–28. doi: 10.1109/JPROC.2011.2160929. [DOI] [Google Scholar]
  • 30.Tu H., Xia Y., Iu H.H.C., Chen X. Optimal robustness in power grids from a network science perspective. IEEE Trans. Circuits Syst. II Express Briefs. 2018;66:126–130. doi: 10.1109/TCSII.2018.2832850. [DOI] [Google Scholar]
  • 31.Ruj S., Pal A. Analyzing cascading failures in smart grids under random and targeted attacks; Proceedings of the 2014 IEEE 28th International Conference on Advanced Information Networking and Applications; Victoria, BC, Canada. 13–16 May 2014; pp. 226–233. [Google Scholar]
  • 32.Nguyen D.T., Shen Y., Thai M.T. Detecting Critical Nodes in Interdependent Power Networks for Vulnerability Assessment. IEEE Trans. Smart Grid. 2013;4:151–159. doi: 10.1109/TSG.2012.2229398. [DOI] [Google Scholar]
  • 33.Shao J., Buldyrev S.V., Havlin S., Stanley H.E. Cascade of failures in coupled network systems with multiple support-dependence relations. Phys. Rev. E. 2011;83:036116. doi: 10.1103/PhysRevE.83.036116. [DOI] [PubMed] [Google Scholar]
  • 34.Cui P., Zhu P., Wang K., Xun P., Xia Z. Enhancing robustness of interdependent network by adding connectivity and dependence links. Physica A. 2018;497:185–197. [Google Scholar]
  • 35.Kamran K., Zhang J., Yeh E., Modiano E. Robustness of interdependent geometric networks under inhomogeneous failures; Proceedings of the 2018 16th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt); Shanghai, China. 7–11 May 2018; May 7–11, pp. 1–6. [Google Scholar]
  • 36.Ji X., Wang B., Liu D., Chen G., Tang F., Wei D., Tu L. Improving interdependent networks robustness by adding connectivity links. Physica A. 2016;444:9–19. doi: 10.1016/j.physa.2015.10.010. [DOI] [Google Scholar]
  • 37.Beygelzimer A., Grinstein G., Linsker R., Rish I. Improving network robustness by edge modification. Physica A. 2005;357:593–612. doi: 10.1016/j.physa.2005.03.040. [DOI] [Google Scholar]
  • 38.Kazawa Y., Tsugawa S. Robustness of networks with skewed degree distributions under strategic node protection; Proceedings of the 2016 IEEE 40th Annual Computer Software and Applications Conference (COMPSAC) 2016; Atlanta, GA, USA. 10–14 June 2016; pp. 14–19. [Google Scholar]
  • 39.Chattopadhyay S., Dai H., Hosseinalipour S. Designing optimal interlink patterns to maximize robustness of interdependent networks against cascading failures. IEEE Trans. Commun. 2017;65:3847–3862. doi: 10.1109/TCOMM.2017.2709302. [DOI] [Google Scholar]
  • 40.Chen L., Yue D., Dou C., Cheng Z., Chen J. Robustness of cyber-physical power systems in cascading failure: Survival of interdependent clusters. Int. J. Electr. Power Energy Syst. 2020;114:105374. doi: 10.1016/j.ijepes.2019.06.032. [DOI] [Google Scholar]
  • 41.Huang Z., Wang C., Ruj S., Stojmenovic M., Nayak A. Modeling cascading failures in smart power grid using interdependent complex networks and percolation theory; Proceedings of the 2013 IEEE 8th Conference on Industrial Electronics and Applications (ICIEA); Melbourne, VIC, Australia. 19–21 June 2013; pp. 1023–1028. [Google Scholar]
  • 42.Dong G., Chen Y., Wang F., Du R., Tian L., Stanley H.E. Robustness on interdependent networks with a multiple-to-multiple dependent relationship. J. Nonlinear Sci. 2019;29:073107. doi: 10.1063/1.5093074. [DOI] [PubMed] [Google Scholar]
  • 43.Chen L., Yue D., Dou C. Optimization on vulnerability analysis and redundancy protection in interdependent networks. Physica A. 2019;523:1216–1226. doi: 10.1016/j.physa.2019.04.235. [DOI] [Google Scholar]
  • 44.Peng H., Liu C., Zhao D., Ye H., Fang Z., Wang W. Security Analysis of CPS Systems under Different Swapping Strategies in IoT Environments. IEEE Access. 2020;8:63567–63576. doi: 10.1109/ACCESS.2020.2983335. [DOI] [Google Scholar]
  • 45.Kumari P., Singh A. Approximation and Updation of Betweenness Centrality in Dynamic Complex Networks. In: Verma N., Ghosh A., editors. Computational Intelligence: Theories, Applications and Future Directions-Volume I. Springer; Singapore: 2019. pp. 25–37. [Google Scholar]
  • 46.Newman M. Networks. Oxford University Press; Oxford, UK: 2018. [Google Scholar]

Articles from Sensors (Basel, Switzerland) are provided here courtesy of Multidisciplinary Digital Publishing Institute (MDPI)

RESOURCES