SlideShare a Scribd company logo
1 of 1
Download to read offline
ECWAY TECHNOLOGIES
IEEE PROJECTS & SOFTWARE DEVELOPMENTS
OUR OFFICES @ CHENNAI / TRICHY / KARUR / ERODE / MADURAI / SALEM / COIMBATORE
CELL: +91 98949 17187, +91 875487 2111 / 3111 / 4111 / 5111 / 6111
VISIT: www.ecwayprojects.com MAIL TO: ecwaytechnologies@gmail.com

MODELING AND OPTIMIZING THE PERFORMANCE- SECURITY TRADEOFF ON
D-NCS USING THE COEVOLUTIONARY PARADIGM

ABSTRACT:

Distributed networked control systems (D-NCS) are vulnerable to various network attacks when
the network is not secured; thus, D-NCS must be well protected with security mechanisms (e.g.,
cryptography), which may adversely affect the dynamic performance of the D-NCS because of
limited system resources.

This paper addresses the tradeoff between D-NCS security and its real-time performance and
uses the Intelligent Space (iSpace) for illustration. A tradeoff model for a system’s dynamic
performance and its security is presented. This model can be used to allocate system resources to
provide sufficient protection and to satisfy the D-NCS’s real-time dynamic performance
requirements simultaneously.

We propose a paradigm of the performance-security tradeoff optimization based on the
coevolutionary genetic algorithm (CGA) for D-NCS. A Simulink-based test-bed is implemented
to illustrate the effectiveness of this paradigm. The results of the simulation show that the CGA
can efficiently find the optimal values in a performance-security tradeoff model for D-NCS.

More Related Content

What's hot

What's hot (14)

Using distributed firewalls in securing LANs
Using distributed firewalls in securing LANsUsing distributed firewalls in securing LANs
Using distributed firewalls in securing LANs
 
Reliable and error detection architectures of pomaranch for false alarm-sensi...
Reliable and error detection architectures of pomaranch for false alarm-sensi...Reliable and error detection architectures of pomaranch for false alarm-sensi...
Reliable and error detection architectures of pomaranch for false alarm-sensi...
 
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Designing an efficient image encr...
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS  Designing an efficient image encr...IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS  Designing an efficient image encr...
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Designing an efficient image encr...
 
Claremont Report on Database Research: Research Directions (Anastasia Ailamaki)
Claremont Report on Database Research: Research Directions (Anastasia Ailamaki)Claremont Report on Database Research: Research Directions (Anastasia Ailamaki)
Claremont Report on Database Research: Research Directions (Anastasia Ailamaki)
 
Hydra pitchdeck
Hydra pitchdeckHydra pitchdeck
Hydra pitchdeck
 
Fault Diagnosis Schemes for Low-Energy Block Cipher Midori Benchmarked on FPGA
Fault Diagnosis Schemes for Low-Energy Block Cipher Midori Benchmarked on FPGAFault Diagnosis Schemes for Low-Energy Block Cipher Midori Benchmarked on FPGA
Fault Diagnosis Schemes for Low-Energy Block Cipher Midori Benchmarked on FPGA
 
TraNS PhD Research Thesis Assistance
TraNS PhD Research Thesis Assistance TraNS PhD Research Thesis Assistance
TraNS PhD Research Thesis Assistance
 
NECST @ Microsoft
NECST @ Microsoft NECST @ Microsoft
NECST @ Microsoft
 
36
3636
36
 
International journal on soft computing
International journal on soft computingInternational journal on soft computing
International journal on soft computing
 
International journal on soft computing
International journal on soft computing International journal on soft computing
International journal on soft computing
 
International journal on soft computing
International journal on soft computing International journal on soft computing
International journal on soft computing
 
International journal on soft computing
International journal on soft computingInternational journal on soft computing
International journal on soft computing
 
Intrusion Prevention through Optimal Stopping
Intrusion Prevention through Optimal StoppingIntrusion Prevention through Optimal Stopping
Intrusion Prevention through Optimal Stopping
 

Viewers also liked

Praveen Pandey_9526_LinkedIn
Praveen Pandey_9526_LinkedInPraveen Pandey_9526_LinkedIn
Praveen Pandey_9526_LinkedIn
pandaypraveen
 
Mapa mental de la lectura y diapositivas de las normas de incontec
Mapa mental de la lectura y diapositivas de las normas de incontecMapa mental de la lectura y diapositivas de las normas de incontec
Mapa mental de la lectura y diapositivas de las normas de incontec
Nanita Pacasira
 
Topology abstraction service for ip vp ns
Topology abstraction service for ip vp nsTopology abstraction service for ip vp ns
Topology abstraction service for ip vp ns
Ecwayt
 
Dotnet strategies for energy-efficient resource management of hybrid program...
Dotnet  strategies for energy-efficient resource management of hybrid program...Dotnet  strategies for energy-efficient resource management of hybrid program...
Dotnet strategies for energy-efficient resource management of hybrid program...
Ecwaytech
 
Livro go pro_eric_worre pdf
Livro go pro_eric_worre pdfLivro go pro_eric_worre pdf
Livro go pro_eric_worre pdf
Cicero galvao
 
Dotnet idm an indirect dissemination mechanism for spatial voice interaction...
Dotnet  idm an indirect dissemination mechanism for spatial voice interaction...Dotnet  idm an indirect dissemination mechanism for spatial voice interaction...
Dotnet idm an indirect dissemination mechanism for spatial voice interaction...
Ecwaytech
 
disablitynadchildsupportletter.
disablitynadchildsupportletter.disablitynadchildsupportletter.
disablitynadchildsupportletter.
Mark Bizzelle
 
Dotnet localization-based radio model calibration for fault-tolerant wireles...
Dotnet  localization-based radio model calibration for fault-tolerant wireles...Dotnet  localization-based radio model calibration for fault-tolerant wireles...
Dotnet localization-based radio model calibration for fault-tolerant wireles...
Ecwaytech
 

Viewers also liked (19)

Virus y vacunas
Virus y vacunasVirus y vacunas
Virus y vacunas
 
Tramas phillips
Tramas phillipsTramas phillips
Tramas phillips
 
Praveen Pandey_9526_LinkedIn
Praveen Pandey_9526_LinkedInPraveen Pandey_9526_LinkedIn
Praveen Pandey_9526_LinkedIn
 
Mapa mental de la lectura y diapositivas de las normas de incontec
Mapa mental de la lectura y diapositivas de las normas de incontecMapa mental de la lectura y diapositivas de las normas de incontec
Mapa mental de la lectura y diapositivas de las normas de incontec
 
Neucon mailer-progressive-r1
Neucon mailer-progressive-r1Neucon mailer-progressive-r1
Neucon mailer-progressive-r1
 
Topology abstraction service for ip vp ns
Topology abstraction service for ip vp nsTopology abstraction service for ip vp ns
Topology abstraction service for ip vp ns
 
Dotnet strategies for energy-efficient resource management of hybrid program...
Dotnet  strategies for energy-efficient resource management of hybrid program...Dotnet  strategies for energy-efficient resource management of hybrid program...
Dotnet strategies for energy-efficient resource management of hybrid program...
 
воспитатель
воспитательвоспитатель
воспитатель
 
KARUNA-SHECHEN 3rd quaterly report 2014
KARUNA-SHECHEN 3rd quaterly report 2014KARUNA-SHECHEN 3rd quaterly report 2014
KARUNA-SHECHEN 3rd quaterly report 2014
 
Livro go pro_eric_worre pdf
Livro go pro_eric_worre pdfLivro go pro_eric_worre pdf
Livro go pro_eric_worre pdf
 
Dotnet idm an indirect dissemination mechanism for spatial voice interaction...
Dotnet  idm an indirect dissemination mechanism for spatial voice interaction...Dotnet  idm an indirect dissemination mechanism for spatial voice interaction...
Dotnet idm an indirect dissemination mechanism for spatial voice interaction...
 
Bankinter vivienda
Bankinter viviendaBankinter vivienda
Bankinter vivienda
 
disablitynadchildsupportletter.
disablitynadchildsupportletter.disablitynadchildsupportletter.
disablitynadchildsupportletter.
 
Refleksi stanislavky
Refleksi stanislavkyRefleksi stanislavky
Refleksi stanislavky
 
Dotnet localization-based radio model calibration for fault-tolerant wireles...
Dotnet  localization-based radio model calibration for fault-tolerant wireles...Dotnet  localization-based radio model calibration for fault-tolerant wireles...
Dotnet localization-based radio model calibration for fault-tolerant wireles...
 
Psicopedagogìa
PsicopedagogìaPsicopedagogìa
Psicopedagogìa
 
Comercioelectronico
ComercioelectronicoComercioelectronico
Comercioelectronico
 
Página 19
Página 19Página 19
Página 19
 
Página 13
Página 13Página 13
Página 13
 

Similar to Dotnet modeling and optimizing the performance- security tradeoff on d-ncs using the coevolutionary paradigm

Dotnet modeling and optimizing the performance- security tradeoff on d-ncs u...
Dotnet  modeling and optimizing the performance- security tradeoff on d-ncs u...Dotnet  modeling and optimizing the performance- security tradeoff on d-ncs u...
Dotnet modeling and optimizing the performance- security tradeoff on d-ncs u...
Ecway Technologies
 
Java modeling and optimizing the performance- security tradeoff on d-ncs usi...
Java  modeling and optimizing the performance- security tradeoff on d-ncs usi...Java  modeling and optimizing the performance- security tradeoff on d-ncs usi...
Java modeling and optimizing the performance- security tradeoff on d-ncs usi...
ecwayerode
 
Modeling and optimizing the performance security tradeoff on d-ncs using the...
Modeling and optimizing the performance  security tradeoff on d-ncs using the...Modeling and optimizing the performance  security tradeoff on d-ncs using the...
Modeling and optimizing the performance security tradeoff on d-ncs using the...
ecway
 
Modeling and optimizing the performance security tradeoff on d-ncs using the...
Modeling and optimizing the performance  security tradeoff on d-ncs using the...Modeling and optimizing the performance  security tradeoff on d-ncs using the...
Modeling and optimizing the performance security tradeoff on d-ncs using the...
Ecway Technologies
 
Convolutional neural network based key generation for security of data throug...
Convolutional neural network based key generation for security of data throug...Convolutional neural network based key generation for security of data throug...
Convolutional neural network based key generation for security of data throug...
IJECEIAES
 

Similar to Dotnet modeling and optimizing the performance- security tradeoff on d-ncs using the coevolutionary paradigm (20)

Dotnet modeling and optimizing the performance- security tradeoff on d-ncs u...
Dotnet  modeling and optimizing the performance- security tradeoff on d-ncs u...Dotnet  modeling and optimizing the performance- security tradeoff on d-ncs u...
Dotnet modeling and optimizing the performance- security tradeoff on d-ncs u...
 
Java modeling and optimizing the performance- security tradeoff on d-ncs usi...
Java  modeling and optimizing the performance- security tradeoff on d-ncs usi...Java  modeling and optimizing the performance- security tradeoff on d-ncs usi...
Java modeling and optimizing the performance- security tradeoff on d-ncs usi...
 
Modeling and optimizing the performance security tradeoff on d-ncs using the...
Modeling and optimizing the performance  security tradeoff on d-ncs using the...Modeling and optimizing the performance  security tradeoff on d-ncs using the...
Modeling and optimizing the performance security tradeoff on d-ncs using the...
 
Modeling and optimizing the performance security tradeoff on d-ncs using the...
Modeling and optimizing the performance  security tradeoff on d-ncs using the...Modeling and optimizing the performance  security tradeoff on d-ncs using the...
Modeling and optimizing the performance security tradeoff on d-ncs using the...
 
4.report (cryptography & computer network)
4.report (cryptography & computer network)4.report (cryptography & computer network)
4.report (cryptography & computer network)
 
Drops division and replication of data in cloud for optimal performance and s...
Drops division and replication of data in cloud for optimal performance and s...Drops division and replication of data in cloud for optimal performance and s...
Drops division and replication of data in cloud for optimal performance and s...
 
22
2222
22
 
Security and risk analysis in the cloud with software defined networking arch...
Security and risk analysis in the cloud with software defined networking arch...Security and risk analysis in the cloud with software defined networking arch...
Security and risk analysis in the cloud with software defined networking arch...
 
Convolutional neural network based key generation for security of data throug...
Convolutional neural network based key generation for security of data throug...Convolutional neural network based key generation for security of data throug...
Convolutional neural network based key generation for security of data throug...
 
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Harnessing the cloud for securely outso...
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Harnessing the cloud for securely outso...JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Harnessing the cloud for securely outso...
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Harnessing the cloud for securely outso...
 
Harnessing the cloud for securely outsourcing large scale systems of linear e...
Harnessing the cloud for securely outsourcing large scale systems of linear e...Harnessing the cloud for securely outsourcing large scale systems of linear e...
Harnessing the cloud for securely outsourcing large scale systems of linear e...
 
Tinysec
TinysecTinysec
Tinysec
 
Tinysec
TinysecTinysec
Tinysec
 
59
5959
59
 
Harnessing the cloud for securely outsourcing large scale systems of linear e...
Harnessing the cloud for securely outsourcing large scale systems of linear e...Harnessing the cloud for securely outsourcing large scale systems of linear e...
Harnessing the cloud for securely outsourcing large scale systems of linear e...
 
Harnessing the cloud for securely outsourcing large
Harnessing the cloud for securely outsourcing largeHarnessing the cloud for securely outsourcing large
Harnessing the cloud for securely outsourcing large
 
JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT Harnessing the Cloud for Securely...
JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT Harnessing the Cloud for Securely...JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT Harnessing the Cloud for Securely...
JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT Harnessing the Cloud for Securely...
 
Double Key Encryption Method (DKEM) Algorithms Using ANN for Data Storing and...
Double Key Encryption Method (DKEM) Algorithms Using ANN for Data Storing and...Double Key Encryption Method (DKEM) Algorithms Using ANN for Data Storing and...
Double Key Encryption Method (DKEM) Algorithms Using ANN for Data Storing and...
 
Performance Analysis of Wireless Trusted Software Defined Networks
Performance Analysis of Wireless Trusted Software Defined NetworksPerformance Analysis of Wireless Trusted Software Defined Networks
Performance Analysis of Wireless Trusted Software Defined Networks
 
Protecting the movable Endeavor with Network-Based validation and Virtual Com...
Protecting the movable Endeavor with Network-Based validation and Virtual Com...Protecting the movable Endeavor with Network-Based validation and Virtual Com...
Protecting the movable Endeavor with Network-Based validation and Virtual Com...
 

Dotnet modeling and optimizing the performance- security tradeoff on d-ncs using the coevolutionary paradigm

  • 1. ECWAY TECHNOLOGIES IEEE PROJECTS & SOFTWARE DEVELOPMENTS OUR OFFICES @ CHENNAI / TRICHY / KARUR / ERODE / MADURAI / SALEM / COIMBATORE CELL: +91 98949 17187, +91 875487 2111 / 3111 / 4111 / 5111 / 6111 VISIT: www.ecwayprojects.com MAIL TO: ecwaytechnologies@gmail.com MODELING AND OPTIMIZING THE PERFORMANCE- SECURITY TRADEOFF ON D-NCS USING THE COEVOLUTIONARY PARADIGM ABSTRACT: Distributed networked control systems (D-NCS) are vulnerable to various network attacks when the network is not secured; thus, D-NCS must be well protected with security mechanisms (e.g., cryptography), which may adversely affect the dynamic performance of the D-NCS because of limited system resources. This paper addresses the tradeoff between D-NCS security and its real-time performance and uses the Intelligent Space (iSpace) for illustration. A tradeoff model for a system’s dynamic performance and its security is presented. This model can be used to allocate system resources to provide sufficient protection and to satisfy the D-NCS’s real-time dynamic performance requirements simultaneously. We propose a paradigm of the performance-security tradeoff optimization based on the coevolutionary genetic algorithm (CGA) for D-NCS. A Simulink-based test-bed is implemented to illustrate the effectiveness of this paradigm. The results of the simulation show that the CGA can efficiently find the optimal values in a performance-security tradeoff model for D-NCS.