SlideShare a Scribd company logo
1 of 8
MODELING AND OPTIMIZING THE PERFORMANCE-
SECURITY TRADEOFF ON D-NCS USING THE
COEVOLUTIONARY PARADIGM
ABSTRACT:
Distributed networked control systems (D-NCS) are vulnerable to various network attacks when the network is
not secured; thus, D-NCS must be well protected with security mechanisms (e.g., cryptography), which may
adversely affect the dynamic performance of the D-NCS because of limited system resources.
This paper addresses the tradeoff between D-NCS security and its real-time performance and uses the
Intelligent Space (iSpace) for illustration. A tradeoff model for a system’s dynamic performance and its security
is presented. This model can be used to allocate system resources to provide sufficient protection and to satisfy
the D-NCS’s real-time dynamic performance requirements simultaneously.
We propose a paradigm of the performance-security tradeoff optimization based on the co-evolutionary genetic
algorithm (CGA) for D-NCS. A Simulink-based test-bed is implemented to illustrate the effectiveness of this
paradigm. The results of the simulation show that the CGA can efficiently find the optimal values in a
performance-security tradeoff model for D-NCS.
GLOBALSOFT TECHNOLOGIES
IEEE PROJECTS & SOFTWARE DEVELOPMENTS
IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE
BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS
CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401
Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmail.com
EXISTING SYSTEM:
Therefore, important to implement D-NCS with security controls that make reliable, safe, and flexible
performance possible. In addition, a wireless medium is easily susceptible to interception, which may pose
increasing concerns about the security of communications on the D-NCS. To reduce operational costs and
improve performance, D-NCS were transitioned to less expensive standardized technologies, operating systems,
and protocols that are currently prevalent. As a result, real-time monitoring and control information is readily
and easily accessible to a large number of people on the Internet. This also increases the vulnerability of the D-
NCS to malicious network attacks. However, adding more security may adversely affect system performance
because of limited system resources. The impact of the security mechanisms on system performance has not
been addressed thoroughly. Security requirements are often in competition with performance requirements, such
as real-time dynamic performance that is limited by system resources and the extra time delay imposed by
additional security. Thus, there
is a tradeoff between the D-NCS’s performance and its security measures.
DISADVANTAGES:
how to achieve the optimized balance between performance and security on D-NCS is an open question
As a fast-developing optimization algorithm, the coevolutionary genetic algorithm (CGA) is an
extension of conventional evolutionary algorithms. It models an ecosystem consisting of two or more
species.
The local minima and nonlinear nature of the optimization problems being considered in this paper.
Thus, the CGA is a prime candidate to solve the performance and security tradeoff for D-NCS.
PROPOSED SYSTEM:
We proposed tradeoff model can be used to simultaneously adjust system resources to provide sufficient
protection and satisfy real-time performance requirements for D-NCS, while the CGA is an effective approach
for this tradeoff analysis and optimization. The problem of secure control in cyber-physical systems (CPS) and
proposed a set of challenges that need to be addressed to improve the CPS’s ability to survive. Also gave an
overview on the challenges and ongoing efforts in the field of cyber-physical security with specific emphasis on
a smart grid infrastructure. A distributed scheme to detect and isolate the cyber attacks in the communication
network of the D-NCS using observers and discussed how to reduce the number of observer nodes while
maintaining the coverage of the entire network. As we can see, the optimal bandwidth allocation using the CGA
has an impressive improvement in performance metrics while it still maintains the same security level compared
to the other settings. From the simulation results, we conclude that the proposed CGA paradigm provides a
satisfactory modeling and optimization scheme for the multiagent performance and security tradeoff problem on
D-NCS.
ADVANTAGES:
The works referenced above deal with the security issues of the D-NCS from the prevention and
detection perspectives. However, there is also a growing demand for studying the impact of the security
additions on the systems’ performance and the tradeoff between them.
The D-NCS in this paper is composed of multiple UGVs controlled by iSpace that move between
locations tracking a path that avoids obstacles in a secured network environment.
To track the reference point, the path-tracking controller finds a QC that passes through the reference
point and has its vertex located at the UGV. The system must provide the necessary bandwidth for the
security mechanisms in the communication channels.
HARDWARE & SOFTWARE REQUIREMENTS:
HARDWARE REQUIREMENT:
 Processor - Pentium –IV
 Speed - 1.1 GHz
 RAM - 256 MB (min)
 Hard Disk - 20 GB
 Floppy Drive - 1.44 MB
 Key Board - Standard Windows Keyboard
 Mouse - Two or Three Button Mouse
 Monitor - SVGA
SOFTWARE REQUIREMENTS:
 Operating System : Windows XP
 Front End : Visual Studio 2008 .NET
 Scripts : C# Script.
MODULES:
1. PATH-TRACKING CONTROLLER
2. SECURITY MANAGER
3. BANDWIDTH ALLOCATION
4. SECURITY METRIC
5. TEST-BED DESCRIPTION
6. SIMULATION CONDITIONS
MODULES DESCRIPTION:
PATH-TRACKING CONTROLLER:
The quadratic curve (QC) path-tracking controller defined in the feedback preprocessor (FP), and the predictive
control gain scheduling middleware (PCGSM) are used to control the UGVs. The path-tracking controller
calculates a path defined by a set of consecutive waypoints on the ground for each UGV to follow as , where
and are sets of the world frame and coordinates, respectively. The QC path-tracking algorithm will determine a
look-ahead distance based on previous UGV control. A reference point ahead of the UGV is constrained to
move along. The location of the reference point is determined by finding the nearest point on the path to the
UGV and looking ahead on the path a variable distance defined by using the methods.
SECURITY MANAGER:
To protect iSpace from malicious network attack, this paper focuses on the confidentiality aspect of the security
service using secret key cryptography. The secret key algorithm of the Advanced Encryption Standard (AES) is
a symmetric cipher considered secure for wireless systems. It works with 128 bits of block size with key sizes
of 128 or more. As Electronic Code Book (ECB) is considered to be the fastest mode of operations, it is used
frequently in real-time systems. Thus, in this paper, the AES with an ECB mode is integrated with the
application to encrypt and decrypt the information flow along the communication network. Thus, the system
must provide the necessary bandwidth for the security mechanisms in the communication channels.
BANDWIDTH ALLOCATION:
The bandwidth allocation algorithm used in this paper allocates the bandwidth according to the request of each
UGV proportionally. Each UGV should have a feasible safety region along the path. Outside of this region, the
UGV may oscillate, out of control and collidewith otherUGVs. Therefore,UGVs must remain within the safety
region to maintain stability.
SECURITY METRIC:
We proposed qualitative metrics classify various security mechanisms to several discrete levels, such as low,
medium, and high. Security mechanisms in the higher level can provide better protection than those in the lower
levels. But it’s impossible to compare security mechanisms within the same security level. Furthermore,
qualitative metrics are too coarse for fine control of the tradeoff between dynamic performance and security in
D-NCS. Thus, a quantitative metric that generates a security strength value for each security mechanism is used
in this paper and, hence, is more suitable for a quantitative comparison of the security strength of any two
security mechanisms.
TEST-BED DESCRIPTION:
The differential drive mobile robot used in this platform has been constructed out of modular off-the-shelf
LEGO Mindstorms NXT, which provides an easy-to-use set of pieces and convenient motors with encoders.
The robot has a wheel radius of 0.0286 meters (m) and a distance between wheels of 0.095 m. With the gearing
of the NXT motors, the maximum speed for this UGV is approximately 0.4 meters per second (m/s).
SIMULATION CONDITIONS:
The UGVs will be commanded to follow test paths using average bandwidth allocation and CGA-based
bandwidth allocation with varying network delays, as characterized in Fig. 6. We compare the effects of
roundtrip time delays of 60, 200, 400, and 600 ms. In order to facilitate testing, a software-based delay
generator was also implemented. This delay generator acts on control signals and feedback to replicate the
effects of network delay. To characterize the delay in this system, the UGV was pinged repeatedly with
different delay settings for the delay generator. With the delay generator turned to 200 ms, it will add 200 ms of
delay to each direction of communications.
FLOW DIAGRAM
CONCLUSIONS:
This paper addresses and defines the performance and security tradeoff problem of D-NCS and proposes a
tradeoff model for performance and security in the D-NCS, as well as a paradigm for multiagent tradeoff
optimization based on the CGA. Simulations show that the CGA paradigm provides satisfactory modeling and
optimization results for the performance-security tradeoff on the iSpace system. Thus, the coevolutionary
paradigm presented in this paper is an effective approach for performance- security tradeoff analysis and
optimization on D-NCS. Future works include how to improve the tradeoff model when other security
mechanisms are involved, quality of service (QoS) and intrusion detections.
REFERENCES:
[1] R. Gupta and M.-Y. Chow, “Networked control system: Overview and research trends,” IEEE Trans. Ind.
Electron., vol. 57, no. 7, pp. 2527–2535, Jul. 2010.
[2] A. Ulusoy, O. Gurbuz, and A. Onat, “Wireless model-based predictive networked control system over
cooperative wireless network,” IEEE Trans. Ind. Informat., vol. 7, no. 1, pp. 41–51, Feb. 2011.
[3] “Common cyber security vulnerabilities observed in control system assessments by the INL NSTB
program,” U.S. Department of Energy Office of Electricity, Delivery, and Energy Reliability, Washington, DC ,
2008 [Online]. Available: http://www.controlsystemsroadmap. net/pdfs/INL_Common_Vulnerabilties.pdf
[4] M. Lin, L. Xu, L. T. Yang, X. Qin, N. Zheng, Z. Wu, and M. Qiu, “Static security optimization for real-time
systems,” IEEE Trans. Ind. Informat., vol. 5, no. 1, pp. 22–37, Feb. 2009.
[5] W.Granzer, F. Praus, andW. Kastner, “Security in building automation systems,” IEEE Trans. Ind.
Electron., vol. 57, no. 11, pp. 3622–3630, Nov. 2010.
[6] P. Marti, C. Lin, S. A. Brandt, M. Velasco, and J. M. Fuertes, “Draco: Efficient resourcemanagement for
resource-constrained control tasks,” IEEE Trans. Comput., vol. 58, no. 1, pp. 90–105, Jan. 2009.
[7] C. K. Goh and K. C. Tan, “A competitive-cooperative coevolutionary paradigmfor dynamicmultiobjective
optimization,” IEEE Trans. Evol. Comput., vol. 13, no. 1, pp. 103–127, Feb 2009.
[8] M. A. Potter and K. A. De Jong, “Cooperative coevolution: An architecture for evolving coadapted
subcomponents,” J. Evol. Comput., vol. 8, no. 1, pp. 1–29, 2000.

More Related Content

More from IEEEGLOBALSOFTTECHNOLOGIES

DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Distributed cooperative caching in s...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Distributed cooperative caching in s...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Distributed cooperative caching in s...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Distributed cooperative caching in s...IEEEGLOBALSOFTTECHNOLOGIES
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Delay optimal broadcast for multihop...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Delay optimal broadcast for multihop...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Delay optimal broadcast for multihop...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Delay optimal broadcast for multihop...IEEEGLOBALSOFTTECHNOLOGIES
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Dcim distributed cache invalidation ...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Dcim distributed cache invalidation ...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Dcim distributed cache invalidation ...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Dcim distributed cache invalidation ...IEEEGLOBALSOFTTECHNOLOGIES
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Cooperative packet delivery in hybri...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Cooperative packet delivery in hybri...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Cooperative packet delivery in hybri...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Cooperative packet delivery in hybri...IEEEGLOBALSOFTTECHNOLOGIES
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Content sharing over smartphone base...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Content sharing over smartphone base...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Content sharing over smartphone base...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Content sharing over smartphone base...IEEEGLOBALSOFTTECHNOLOGIES
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Community aware opportunistic routin...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Community aware opportunistic routin...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Community aware opportunistic routin...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Community aware opportunistic routin...IEEEGLOBALSOFTTECHNOLOGIES
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Capacity of hybrid wireless mesh net...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Capacity of hybrid wireless mesh net...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Capacity of hybrid wireless mesh net...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Capacity of hybrid wireless mesh net...IEEEGLOBALSOFTTECHNOLOGIES
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Adaptive position update for geograp...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Adaptive position update for geograp...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Adaptive position update for geograp...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Adaptive position update for geograp...IEEEGLOBALSOFTTECHNOLOGIES
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for m...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for m...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for m...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for m...IEEEGLOBALSOFTTECHNOLOGIES
 
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Attribute based access to scalable me...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Attribute based access to scalable me...DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Attribute based access to scalable me...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Attribute based access to scalable me...IEEEGLOBALSOFTTECHNOLOGIES
 
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Attribute based access to scalable me...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Attribute based access to scalable me...DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Attribute based access to scalable me...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Attribute based access to scalable me...IEEEGLOBALSOFTTECHNOLOGIES
 
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of person...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of person...DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of person...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of person...IEEEGLOBALSOFTTECHNOLOGIES
 
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Qos ranking prediction for cloud serv...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Qos ranking prediction for cloud serv...DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Qos ranking prediction for cloud serv...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Qos ranking prediction for cloud serv...IEEEGLOBALSOFTTECHNOLOGIES
 
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving public auditing fo...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving public auditing fo...DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving public auditing fo...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving public auditing fo...IEEEGLOBALSOFTTECHNOLOGIES
 
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Facilitating document annotation usin...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Facilitating document annotation usin...DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Facilitating document annotation usin...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Facilitating document annotation usin...IEEEGLOBALSOFTTECHNOLOGIES
 
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Error tolerant resource allocation an...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Error tolerant resource allocation an...DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Error tolerant resource allocation an...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Error tolerant resource allocation an...IEEEGLOBALSOFTTECHNOLOGIES
 
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Dynamic resource allocation using vir...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Dynamic resource allocation using vir...DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Dynamic resource allocation using vir...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Dynamic resource allocation using vir...IEEEGLOBALSOFTTECHNOLOGIES
 
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Collaboration in multicloud computing...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Collaboration in multicloud computing...DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Collaboration in multicloud computing...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Collaboration in multicloud computing...IEEEGLOBALSOFTTECHNOLOGIES
 
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Cloud mov cloud based mobile social tv
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Cloud mov cloud based mobile social tvDOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Cloud mov cloud based mobile social tv
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Cloud mov cloud based mobile social tvIEEEGLOBALSOFTTECHNOLOGIES
 
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT An adaptive cloud downloading service
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT An adaptive cloud downloading serviceDOTNET 2013 IEEE CLOUDCOMPUTING PROJECT An adaptive cloud downloading service
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT An adaptive cloud downloading serviceIEEEGLOBALSOFTTECHNOLOGIES
 

More from IEEEGLOBALSOFTTECHNOLOGIES (20)

DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Distributed cooperative caching in s...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Distributed cooperative caching in s...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Distributed cooperative caching in s...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Distributed cooperative caching in s...
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Delay optimal broadcast for multihop...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Delay optimal broadcast for multihop...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Delay optimal broadcast for multihop...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Delay optimal broadcast for multihop...
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Dcim distributed cache invalidation ...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Dcim distributed cache invalidation ...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Dcim distributed cache invalidation ...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Dcim distributed cache invalidation ...
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Cooperative packet delivery in hybri...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Cooperative packet delivery in hybri...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Cooperative packet delivery in hybri...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Cooperative packet delivery in hybri...
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Content sharing over smartphone base...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Content sharing over smartphone base...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Content sharing over smartphone base...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Content sharing over smartphone base...
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Community aware opportunistic routin...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Community aware opportunistic routin...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Community aware opportunistic routin...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Community aware opportunistic routin...
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Capacity of hybrid wireless mesh net...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Capacity of hybrid wireless mesh net...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Capacity of hybrid wireless mesh net...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Capacity of hybrid wireless mesh net...
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Adaptive position update for geograp...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Adaptive position update for geograp...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Adaptive position update for geograp...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Adaptive position update for geograp...
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for m...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for m...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for m...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for m...
 
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Attribute based access to scalable me...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Attribute based access to scalable me...DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Attribute based access to scalable me...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Attribute based access to scalable me...
 
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Attribute based access to scalable me...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Attribute based access to scalable me...DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Attribute based access to scalable me...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Attribute based access to scalable me...
 
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of person...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of person...DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of person...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of person...
 
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Qos ranking prediction for cloud serv...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Qos ranking prediction for cloud serv...DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Qos ranking prediction for cloud serv...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Qos ranking prediction for cloud serv...
 
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving public auditing fo...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving public auditing fo...DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving public auditing fo...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving public auditing fo...
 
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Facilitating document annotation usin...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Facilitating document annotation usin...DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Facilitating document annotation usin...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Facilitating document annotation usin...
 
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Error tolerant resource allocation an...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Error tolerant resource allocation an...DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Error tolerant resource allocation an...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Error tolerant resource allocation an...
 
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Dynamic resource allocation using vir...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Dynamic resource allocation using vir...DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Dynamic resource allocation using vir...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Dynamic resource allocation using vir...
 
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Collaboration in multicloud computing...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Collaboration in multicloud computing...DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Collaboration in multicloud computing...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Collaboration in multicloud computing...
 
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Cloud mov cloud based mobile social tv
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Cloud mov cloud based mobile social tvDOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Cloud mov cloud based mobile social tv
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Cloud mov cloud based mobile social tv
 
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT An adaptive cloud downloading service
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT An adaptive cloud downloading serviceDOTNET 2013 IEEE CLOUDCOMPUTING PROJECT An adaptive cloud downloading service
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT An adaptive cloud downloading service
 

Recently uploaded

Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 

Recently uploaded (20)

Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 

DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Modeling and optimizing the performance security tradeoff on d-ncs using the coevolutionary paradigm

  • 1. MODELING AND OPTIMIZING THE PERFORMANCE- SECURITY TRADEOFF ON D-NCS USING THE COEVOLUTIONARY PARADIGM ABSTRACT: Distributed networked control systems (D-NCS) are vulnerable to various network attacks when the network is not secured; thus, D-NCS must be well protected with security mechanisms (e.g., cryptography), which may adversely affect the dynamic performance of the D-NCS because of limited system resources. This paper addresses the tradeoff between D-NCS security and its real-time performance and uses the Intelligent Space (iSpace) for illustration. A tradeoff model for a system’s dynamic performance and its security is presented. This model can be used to allocate system resources to provide sufficient protection and to satisfy the D-NCS’s real-time dynamic performance requirements simultaneously. We propose a paradigm of the performance-security tradeoff optimization based on the co-evolutionary genetic algorithm (CGA) for D-NCS. A Simulink-based test-bed is implemented to illustrate the effectiveness of this paradigm. The results of the simulation show that the CGA can efficiently find the optimal values in a performance-security tradeoff model for D-NCS. GLOBALSOFT TECHNOLOGIES IEEE PROJECTS & SOFTWARE DEVELOPMENTS IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401 Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmail.com
  • 2. EXISTING SYSTEM: Therefore, important to implement D-NCS with security controls that make reliable, safe, and flexible performance possible. In addition, a wireless medium is easily susceptible to interception, which may pose increasing concerns about the security of communications on the D-NCS. To reduce operational costs and improve performance, D-NCS were transitioned to less expensive standardized technologies, operating systems, and protocols that are currently prevalent. As a result, real-time monitoring and control information is readily and easily accessible to a large number of people on the Internet. This also increases the vulnerability of the D- NCS to malicious network attacks. However, adding more security may adversely affect system performance because of limited system resources. The impact of the security mechanisms on system performance has not been addressed thoroughly. Security requirements are often in competition with performance requirements, such as real-time dynamic performance that is limited by system resources and the extra time delay imposed by additional security. Thus, there is a tradeoff between the D-NCS’s performance and its security measures. DISADVANTAGES: how to achieve the optimized balance between performance and security on D-NCS is an open question As a fast-developing optimization algorithm, the coevolutionary genetic algorithm (CGA) is an extension of conventional evolutionary algorithms. It models an ecosystem consisting of two or more species. The local minima and nonlinear nature of the optimization problems being considered in this paper. Thus, the CGA is a prime candidate to solve the performance and security tradeoff for D-NCS. PROPOSED SYSTEM: We proposed tradeoff model can be used to simultaneously adjust system resources to provide sufficient protection and satisfy real-time performance requirements for D-NCS, while the CGA is an effective approach for this tradeoff analysis and optimization. The problem of secure control in cyber-physical systems (CPS) and proposed a set of challenges that need to be addressed to improve the CPS’s ability to survive. Also gave an overview on the challenges and ongoing efforts in the field of cyber-physical security with specific emphasis on a smart grid infrastructure. A distributed scheme to detect and isolate the cyber attacks in the communication network of the D-NCS using observers and discussed how to reduce the number of observer nodes while
  • 3. maintaining the coverage of the entire network. As we can see, the optimal bandwidth allocation using the CGA has an impressive improvement in performance metrics while it still maintains the same security level compared to the other settings. From the simulation results, we conclude that the proposed CGA paradigm provides a satisfactory modeling and optimization scheme for the multiagent performance and security tradeoff problem on D-NCS. ADVANTAGES: The works referenced above deal with the security issues of the D-NCS from the prevention and detection perspectives. However, there is also a growing demand for studying the impact of the security additions on the systems’ performance and the tradeoff between them. The D-NCS in this paper is composed of multiple UGVs controlled by iSpace that move between locations tracking a path that avoids obstacles in a secured network environment. To track the reference point, the path-tracking controller finds a QC that passes through the reference point and has its vertex located at the UGV. The system must provide the necessary bandwidth for the security mechanisms in the communication channels. HARDWARE & SOFTWARE REQUIREMENTS: HARDWARE REQUIREMENT:  Processor - Pentium –IV  Speed - 1.1 GHz  RAM - 256 MB (min)  Hard Disk - 20 GB  Floppy Drive - 1.44 MB  Key Board - Standard Windows Keyboard  Mouse - Two or Three Button Mouse  Monitor - SVGA
  • 4. SOFTWARE REQUIREMENTS:  Operating System : Windows XP  Front End : Visual Studio 2008 .NET  Scripts : C# Script.
  • 5. MODULES: 1. PATH-TRACKING CONTROLLER 2. SECURITY MANAGER 3. BANDWIDTH ALLOCATION 4. SECURITY METRIC 5. TEST-BED DESCRIPTION 6. SIMULATION CONDITIONS MODULES DESCRIPTION: PATH-TRACKING CONTROLLER: The quadratic curve (QC) path-tracking controller defined in the feedback preprocessor (FP), and the predictive control gain scheduling middleware (PCGSM) are used to control the UGVs. The path-tracking controller calculates a path defined by a set of consecutive waypoints on the ground for each UGV to follow as , where and are sets of the world frame and coordinates, respectively. The QC path-tracking algorithm will determine a look-ahead distance based on previous UGV control. A reference point ahead of the UGV is constrained to move along. The location of the reference point is determined by finding the nearest point on the path to the UGV and looking ahead on the path a variable distance defined by using the methods. SECURITY MANAGER: To protect iSpace from malicious network attack, this paper focuses on the confidentiality aspect of the security service using secret key cryptography. The secret key algorithm of the Advanced Encryption Standard (AES) is a symmetric cipher considered secure for wireless systems. It works with 128 bits of block size with key sizes of 128 or more. As Electronic Code Book (ECB) is considered to be the fastest mode of operations, it is used frequently in real-time systems. Thus, in this paper, the AES with an ECB mode is integrated with the application to encrypt and decrypt the information flow along the communication network. Thus, the system must provide the necessary bandwidth for the security mechanisms in the communication channels.
  • 6. BANDWIDTH ALLOCATION: The bandwidth allocation algorithm used in this paper allocates the bandwidth according to the request of each UGV proportionally. Each UGV should have a feasible safety region along the path. Outside of this region, the UGV may oscillate, out of control and collidewith otherUGVs. Therefore,UGVs must remain within the safety region to maintain stability. SECURITY METRIC: We proposed qualitative metrics classify various security mechanisms to several discrete levels, such as low, medium, and high. Security mechanisms in the higher level can provide better protection than those in the lower levels. But it’s impossible to compare security mechanisms within the same security level. Furthermore, qualitative metrics are too coarse for fine control of the tradeoff between dynamic performance and security in D-NCS. Thus, a quantitative metric that generates a security strength value for each security mechanism is used in this paper and, hence, is more suitable for a quantitative comparison of the security strength of any two security mechanisms. TEST-BED DESCRIPTION: The differential drive mobile robot used in this platform has been constructed out of modular off-the-shelf LEGO Mindstorms NXT, which provides an easy-to-use set of pieces and convenient motors with encoders. The robot has a wheel radius of 0.0286 meters (m) and a distance between wheels of 0.095 m. With the gearing of the NXT motors, the maximum speed for this UGV is approximately 0.4 meters per second (m/s). SIMULATION CONDITIONS: The UGVs will be commanded to follow test paths using average bandwidth allocation and CGA-based bandwidth allocation with varying network delays, as characterized in Fig. 6. We compare the effects of roundtrip time delays of 60, 200, 400, and 600 ms. In order to facilitate testing, a software-based delay generator was also implemented. This delay generator acts on control signals and feedback to replicate the effects of network delay. To characterize the delay in this system, the UGV was pinged repeatedly with different delay settings for the delay generator. With the delay generator turned to 200 ms, it will add 200 ms of delay to each direction of communications.
  • 7. FLOW DIAGRAM CONCLUSIONS: This paper addresses and defines the performance and security tradeoff problem of D-NCS and proposes a tradeoff model for performance and security in the D-NCS, as well as a paradigm for multiagent tradeoff optimization based on the CGA. Simulations show that the CGA paradigm provides satisfactory modeling and optimization results for the performance-security tradeoff on the iSpace system. Thus, the coevolutionary paradigm presented in this paper is an effective approach for performance- security tradeoff analysis and optimization on D-NCS. Future works include how to improve the tradeoff model when other security mechanisms are involved, quality of service (QoS) and intrusion detections. REFERENCES: [1] R. Gupta and M.-Y. Chow, “Networked control system: Overview and research trends,” IEEE Trans. Ind. Electron., vol. 57, no. 7, pp. 2527–2535, Jul. 2010.
  • 8. [2] A. Ulusoy, O. Gurbuz, and A. Onat, “Wireless model-based predictive networked control system over cooperative wireless network,” IEEE Trans. Ind. Informat., vol. 7, no. 1, pp. 41–51, Feb. 2011. [3] “Common cyber security vulnerabilities observed in control system assessments by the INL NSTB program,” U.S. Department of Energy Office of Electricity, Delivery, and Energy Reliability, Washington, DC , 2008 [Online]. Available: http://www.controlsystemsroadmap. net/pdfs/INL_Common_Vulnerabilties.pdf [4] M. Lin, L. Xu, L. T. Yang, X. Qin, N. Zheng, Z. Wu, and M. Qiu, “Static security optimization for real-time systems,” IEEE Trans. Ind. Informat., vol. 5, no. 1, pp. 22–37, Feb. 2009. [5] W.Granzer, F. Praus, andW. Kastner, “Security in building automation systems,” IEEE Trans. Ind. Electron., vol. 57, no. 11, pp. 3622–3630, Nov. 2010. [6] P. Marti, C. Lin, S. A. Brandt, M. Velasco, and J. M. Fuertes, “Draco: Efficient resourcemanagement for resource-constrained control tasks,” IEEE Trans. Comput., vol. 58, no. 1, pp. 90–105, Jan. 2009. [7] C. K. Goh and K. C. Tan, “A competitive-cooperative coevolutionary paradigmfor dynamicmultiobjective optimization,” IEEE Trans. Evol. Comput., vol. 13, no. 1, pp. 103–127, Feb 2009. [8] M. A. Potter and K. A. De Jong, “Cooperative coevolution: An architecture for evolving coadapted subcomponents,” J. Evol. Comput., vol. 8, no. 1, pp. 1–29, 2000.