SlideShare a Scribd company logo
MODELING AND OPTIMIZING THE PERFORMANCE- SECURITY TRADEOFF ON
D-NCS USING THE COEVOLUTIONARY PARADIGM
ABSTRACT:
Distributed networked control systems (D-NCS) are vulnerable to various network attacks when
the network is not secured; thus, D-NCS must be well protected with security mechanisms (e.g.,
cryptography), which may adversely affect the dynamic performance of the D-NCS because of
limited system resources.
This paper addresses the tradeoff between D-NCS security and its real-time performance and
uses the Intelligent Space (iSpace) for illustration. A tradeoff model for a system’s dynamic
performance and its security is presented. This model can be used to allocate system resources to
provide sufficient protection and to satisfy the D-NCS’s real-time dynamic performance
requirements simultaneously.
We propose a paradigm of the performance-security tradeoff optimization based on the
coevolutionary genetic algorithm (CGA) for D-NCS. A Simulink-based test-bed is implemented
to illustrate the effectiveness of this paradigm. The results of the simulation show that the CGA
can efficiently find the optimal values in a performance-security tradeoff model for D-NCS.
ECWAY TECHNOLOGIES
IEEE PROJECTS & SOFTWARE DEVELOPMENTS
OUR OFFICES @ CHENNAI / TRICHY / KARUR / ERODE / MADURAI / SALEM / COIMBATORE
CELL: +91 98949 17187, +91 875487 2111 / 3111 / 4111 / 5111 / 6111
VISIT: www.ecwayprojects.com MAIL TO: ecwaytechnologies@gmail.com

More Related Content

What's hot

Scalable constrained spectral clustering
Scalable constrained spectral clusteringScalable constrained spectral clustering
Scalable constrained spectral clustering
Nishanth Harapanahalli
 
Scalable constrained spectral clustering
Scalable constrained spectral clusteringScalable constrained spectral clustering
Scalable constrained spectral clustering
ieeepondy
 
The Impact of Cloud Computing on Predictive Analytics 7-29-09 v5
The Impact of Cloud Computing on Predictive Analytics 7-29-09 v5The Impact of Cloud Computing on Predictive Analytics 7-29-09 v5
The Impact of Cloud Computing on Predictive Analytics 7-29-09 v5
Robert Grossman
 
Min max a counter-based algorithm for regular expression matching
Min max a counter-based algorithm for regular expression matchingMin max a counter-based algorithm for regular expression matching
Min max a counter-based algorithm for regular expression matching
Ecway Technologies
 
Closeness through-microaggregation-strict-privacy-with-enhanced-utility-prese...
Closeness through-microaggregation-strict-privacy-with-enhanced-utility-prese...Closeness through-microaggregation-strict-privacy-with-enhanced-utility-prese...
Closeness through-microaggregation-strict-privacy-with-enhanced-utility-prese...
Pvrtechnologies Nellore
 
Advanced topics in artificial neural networks
Advanced topics in artificial neural networksAdvanced topics in artificial neural networks
Advanced topics in artificial neural networks
swapnac12
 
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Adaptive algorithm for minimizing clo...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Adaptive algorithm for minimizing clo...IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Adaptive algorithm for minimizing clo...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Adaptive algorithm for minimizing clo...
IEEEGLOBALSOFTSTUDENTPROJECTS
 
NEURAL NETWORK-BASED MODEL DESIGN FOR SHORT-TERM LOAD FORECAST IN DISTRIBUTIO...
NEURAL NETWORK-BASED MODEL DESIGN FOR SHORT-TERM LOAD FORECAST IN DISTRIBUTIO...NEURAL NETWORK-BASED MODEL DESIGN FOR SHORT-TERM LOAD FORECAST IN DISTRIBUTIO...
NEURAL NETWORK-BASED MODEL DESIGN FOR SHORT-TERM LOAD FORECAST IN DISTRIBUTIO...
I3E Technologies
 
Harnessing the cloud for securely outsourcing
Harnessing the cloud for securely outsourcingHarnessing the cloud for securely outsourcing
Harnessing the cloud for securely outsourcing
IMPULSE_TECHNOLOGY
 
Spectral Clustering
Spectral ClusteringSpectral Clustering
Spectral Clustering
ssusered887b
 
Design of Power and Area Efficient Approximate Multipliers
Design of Power and Area Efficient Approximate MultipliersDesign of Power and Area Efficient Approximate Multipliers
Design of Power and Area Efficient Approximate Multipliers
JAYAPRAKASH JPINFOTECH
 
A modeling approach for cloud infrastructure planning considering dependabili...
A modeling approach for cloud infrastructure planning considering dependabili...A modeling approach for cloud infrastructure planning considering dependabili...
A modeling approach for cloud infrastructure planning considering dependabili...
ieeepondy
 
17
1717
Matlab reversible data hiding with optimal value transfer
Matlab  reversible data hiding with optimal value transferMatlab  reversible data hiding with optimal value transfer
Matlab reversible data hiding with optimal value transfer
Ecway Technologies
 

What's hot (14)

Scalable constrained spectral clustering
Scalable constrained spectral clusteringScalable constrained spectral clustering
Scalable constrained spectral clustering
 
Scalable constrained spectral clustering
Scalable constrained spectral clusteringScalable constrained spectral clustering
Scalable constrained spectral clustering
 
The Impact of Cloud Computing on Predictive Analytics 7-29-09 v5
The Impact of Cloud Computing on Predictive Analytics 7-29-09 v5The Impact of Cloud Computing on Predictive Analytics 7-29-09 v5
The Impact of Cloud Computing on Predictive Analytics 7-29-09 v5
 
Min max a counter-based algorithm for regular expression matching
Min max a counter-based algorithm for regular expression matchingMin max a counter-based algorithm for regular expression matching
Min max a counter-based algorithm for regular expression matching
 
Closeness through-microaggregation-strict-privacy-with-enhanced-utility-prese...
Closeness through-microaggregation-strict-privacy-with-enhanced-utility-prese...Closeness through-microaggregation-strict-privacy-with-enhanced-utility-prese...
Closeness through-microaggregation-strict-privacy-with-enhanced-utility-prese...
 
Advanced topics in artificial neural networks
Advanced topics in artificial neural networksAdvanced topics in artificial neural networks
Advanced topics in artificial neural networks
 
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Adaptive algorithm for minimizing clo...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Adaptive algorithm for minimizing clo...IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Adaptive algorithm for minimizing clo...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Adaptive algorithm for minimizing clo...
 
NEURAL NETWORK-BASED MODEL DESIGN FOR SHORT-TERM LOAD FORECAST IN DISTRIBUTIO...
NEURAL NETWORK-BASED MODEL DESIGN FOR SHORT-TERM LOAD FORECAST IN DISTRIBUTIO...NEURAL NETWORK-BASED MODEL DESIGN FOR SHORT-TERM LOAD FORECAST IN DISTRIBUTIO...
NEURAL NETWORK-BASED MODEL DESIGN FOR SHORT-TERM LOAD FORECAST IN DISTRIBUTIO...
 
Harnessing the cloud for securely outsourcing
Harnessing the cloud for securely outsourcingHarnessing the cloud for securely outsourcing
Harnessing the cloud for securely outsourcing
 
Spectral Clustering
Spectral ClusteringSpectral Clustering
Spectral Clustering
 
Design of Power and Area Efficient Approximate Multipliers
Design of Power and Area Efficient Approximate MultipliersDesign of Power and Area Efficient Approximate Multipliers
Design of Power and Area Efficient Approximate Multipliers
 
A modeling approach for cloud infrastructure planning considering dependabili...
A modeling approach for cloud infrastructure planning considering dependabili...A modeling approach for cloud infrastructure planning considering dependabili...
A modeling approach for cloud infrastructure planning considering dependabili...
 
17
1717
17
 
Matlab reversible data hiding with optimal value transfer
Matlab  reversible data hiding with optimal value transferMatlab  reversible data hiding with optimal value transfer
Matlab reversible data hiding with optimal value transfer
 

Similar to Dotnet modeling and optimizing the performance- security tradeoff on d-ncs using the coevolutionary paradigm

Dotnet modeling and optimizing the performance- security tradeoff on d-ncs u...
Dotnet  modeling and optimizing the performance- security tradeoff on d-ncs u...Dotnet  modeling and optimizing the performance- security tradeoff on d-ncs u...
Dotnet modeling and optimizing the performance- security tradeoff on d-ncs u...
Ecwaytech
 
SECURITY OPTIMIZATION OF DYNAMIC NETWORKS WITH PROBABILISTIC GRAPH MODELING A...
SECURITY OPTIMIZATION OF DYNAMIC NETWORKS WITH PROBABILISTIC GRAPH MODELING A...SECURITY OPTIMIZATION OF DYNAMIC NETWORKS WITH PROBABILISTIC GRAPH MODELING A...
SECURITY OPTIMIZATION OF DYNAMIC NETWORKS WITH PROBABILISTIC GRAPH MODELING A...
I3E Technologies
 
36
3636
M.E Computer Science Secure Computing Projects
M.E Computer Science Secure Computing ProjectsM.E Computer Science Secure Computing Projects
M.E Computer Science Secure Computing Projects
Vijay Karan
 
Parallel and distributed system projects for java and dot net
Parallel and distributed system projects for java and dot netParallel and distributed system projects for java and dot net
Parallel and distributed system projects for java and dot net
redpel dot com
 
Ieee transactions on 2018 network and service management
Ieee transactions on 2018 network and service managementIeee transactions on 2018 network and service management
Ieee transactions on 2018 network and service management
tsysglobalsolutions
 
IEEE 2014 C# Projects
IEEE 2014 C# ProjectsIEEE 2014 C# Projects
IEEE 2014 C# Projects
Vijay Karan
 
IEEE 2014 C# Projects
IEEE 2014 C# ProjectsIEEE 2014 C# Projects
IEEE 2014 C# Projects
Vijay Karan
 
M phil-computer-science-secure-computing-projects
M phil-computer-science-secure-computing-projectsM phil-computer-science-secure-computing-projects
M phil-computer-science-secure-computing-projects
Vijay Karan
 
M phil-computer-science-secure-computing-projects
M phil-computer-science-secure-computing-projectsM phil-computer-science-secure-computing-projects
M phil-computer-science-secure-computing-projects
Vijay Karan
 
M phil-computer-science-secure-computing-projects
M phil-computer-science-secure-computing-projectsM phil-computer-science-secure-computing-projects
M phil-computer-science-secure-computing-projects
Vijay Karan
 
M.Phil Computer Science Secure Computing Projects
M.Phil Computer Science Secure Computing ProjectsM.Phil Computer Science Secure Computing Projects
M.Phil Computer Science Secure Computing Projects
Vijay Karan
 
IEEE 2014 NS2 Projects
IEEE 2014 NS2 ProjectsIEEE 2014 NS2 Projects
IEEE 2014 NS2 Projects
Vijay Karan
 
IEEE 2014 NS2 Projects
IEEE 2014 NS2 ProjectsIEEE 2014 NS2 Projects
IEEE 2014 NS2 Projects
Vijay Karan
 
DETECTING THE SECURITY LEVEL OF VARIOUS CRYPTOSYSTEMS USING MACHINE LEARNING ...
DETECTING THE SECURITY LEVEL OF VARIOUS CRYPTOSYSTEMS USING MACHINE LEARNING ...DETECTING THE SECURITY LEVEL OF VARIOUS CRYPTOSYSTEMS USING MACHINE LEARNING ...
DETECTING THE SECURITY LEVEL OF VARIOUS CRYPTOSYSTEMS USING MACHINE LEARNING ...
IRJET Journal
 
22
2222
22
2222
Compressive Sensing Based Simultaneous Data Compression and Convergent Encryp...
Compressive Sensing Based Simultaneous Data Compression and Convergent Encryp...Compressive Sensing Based Simultaneous Data Compression and Convergent Encryp...
Compressive Sensing Based Simultaneous Data Compression and Convergent Encryp...
IJCSIS Research Publications
 
2014 IEEE JAVA NETWORKING PROJECT Secure continuous aggregation in wireless s...
2014 IEEE JAVA NETWORKING PROJECT Secure continuous aggregation in wireless s...2014 IEEE JAVA NETWORKING PROJECT Secure continuous aggregation in wireless s...
2014 IEEE JAVA NETWORKING PROJECT Secure continuous aggregation in wireless s...
IEEEFINALSEMSTUDENTSPROJECTS
 
IEEE 2014 JAVA NETWORKING PROJECTS Secure continuous aggregation in wireless ...
IEEE 2014 JAVA NETWORKING PROJECTS Secure continuous aggregation in wireless ...IEEE 2014 JAVA NETWORKING PROJECTS Secure continuous aggregation in wireless ...
IEEE 2014 JAVA NETWORKING PROJECTS Secure continuous aggregation in wireless ...
IEEEGLOBALSOFTSTUDENTPROJECTS
 

Similar to Dotnet modeling and optimizing the performance- security tradeoff on d-ncs using the coevolutionary paradigm (20)

Dotnet modeling and optimizing the performance- security tradeoff on d-ncs u...
Dotnet  modeling and optimizing the performance- security tradeoff on d-ncs u...Dotnet  modeling and optimizing the performance- security tradeoff on d-ncs u...
Dotnet modeling and optimizing the performance- security tradeoff on d-ncs u...
 
SECURITY OPTIMIZATION OF DYNAMIC NETWORKS WITH PROBABILISTIC GRAPH MODELING A...
SECURITY OPTIMIZATION OF DYNAMIC NETWORKS WITH PROBABILISTIC GRAPH MODELING A...SECURITY OPTIMIZATION OF DYNAMIC NETWORKS WITH PROBABILISTIC GRAPH MODELING A...
SECURITY OPTIMIZATION OF DYNAMIC NETWORKS WITH PROBABILISTIC GRAPH MODELING A...
 
36
3636
36
 
M.E Computer Science Secure Computing Projects
M.E Computer Science Secure Computing ProjectsM.E Computer Science Secure Computing Projects
M.E Computer Science Secure Computing Projects
 
Parallel and distributed system projects for java and dot net
Parallel and distributed system projects for java and dot netParallel and distributed system projects for java and dot net
Parallel and distributed system projects for java and dot net
 
Ieee transactions on 2018 network and service management
Ieee transactions on 2018 network and service managementIeee transactions on 2018 network and service management
Ieee transactions on 2018 network and service management
 
IEEE 2014 C# Projects
IEEE 2014 C# ProjectsIEEE 2014 C# Projects
IEEE 2014 C# Projects
 
IEEE 2014 C# Projects
IEEE 2014 C# ProjectsIEEE 2014 C# Projects
IEEE 2014 C# Projects
 
M phil-computer-science-secure-computing-projects
M phil-computer-science-secure-computing-projectsM phil-computer-science-secure-computing-projects
M phil-computer-science-secure-computing-projects
 
M phil-computer-science-secure-computing-projects
M phil-computer-science-secure-computing-projectsM phil-computer-science-secure-computing-projects
M phil-computer-science-secure-computing-projects
 
M phil-computer-science-secure-computing-projects
M phil-computer-science-secure-computing-projectsM phil-computer-science-secure-computing-projects
M phil-computer-science-secure-computing-projects
 
M.Phil Computer Science Secure Computing Projects
M.Phil Computer Science Secure Computing ProjectsM.Phil Computer Science Secure Computing Projects
M.Phil Computer Science Secure Computing Projects
 
IEEE 2014 NS2 Projects
IEEE 2014 NS2 ProjectsIEEE 2014 NS2 Projects
IEEE 2014 NS2 Projects
 
IEEE 2014 NS2 Projects
IEEE 2014 NS2 ProjectsIEEE 2014 NS2 Projects
IEEE 2014 NS2 Projects
 
DETECTING THE SECURITY LEVEL OF VARIOUS CRYPTOSYSTEMS USING MACHINE LEARNING ...
DETECTING THE SECURITY LEVEL OF VARIOUS CRYPTOSYSTEMS USING MACHINE LEARNING ...DETECTING THE SECURITY LEVEL OF VARIOUS CRYPTOSYSTEMS USING MACHINE LEARNING ...
DETECTING THE SECURITY LEVEL OF VARIOUS CRYPTOSYSTEMS USING MACHINE LEARNING ...
 
22
2222
22
 
22
2222
22
 
Compressive Sensing Based Simultaneous Data Compression and Convergent Encryp...
Compressive Sensing Based Simultaneous Data Compression and Convergent Encryp...Compressive Sensing Based Simultaneous Data Compression and Convergent Encryp...
Compressive Sensing Based Simultaneous Data Compression and Convergent Encryp...
 
2014 IEEE JAVA NETWORKING PROJECT Secure continuous aggregation in wireless s...
2014 IEEE JAVA NETWORKING PROJECT Secure continuous aggregation in wireless s...2014 IEEE JAVA NETWORKING PROJECT Secure continuous aggregation in wireless s...
2014 IEEE JAVA NETWORKING PROJECT Secure continuous aggregation in wireless s...
 
IEEE 2014 JAVA NETWORKING PROJECTS Secure continuous aggregation in wireless ...
IEEE 2014 JAVA NETWORKING PROJECTS Secure continuous aggregation in wireless ...IEEE 2014 JAVA NETWORKING PROJECTS Secure continuous aggregation in wireless ...
IEEE 2014 JAVA NETWORKING PROJECTS Secure continuous aggregation in wireless ...
 

Dotnet modeling and optimizing the performance- security tradeoff on d-ncs using the coevolutionary paradigm

  • 1. MODELING AND OPTIMIZING THE PERFORMANCE- SECURITY TRADEOFF ON D-NCS USING THE COEVOLUTIONARY PARADIGM ABSTRACT: Distributed networked control systems (D-NCS) are vulnerable to various network attacks when the network is not secured; thus, D-NCS must be well protected with security mechanisms (e.g., cryptography), which may adversely affect the dynamic performance of the D-NCS because of limited system resources. This paper addresses the tradeoff between D-NCS security and its real-time performance and uses the Intelligent Space (iSpace) for illustration. A tradeoff model for a system’s dynamic performance and its security is presented. This model can be used to allocate system resources to provide sufficient protection and to satisfy the D-NCS’s real-time dynamic performance requirements simultaneously. We propose a paradigm of the performance-security tradeoff optimization based on the coevolutionary genetic algorithm (CGA) for D-NCS. A Simulink-based test-bed is implemented to illustrate the effectiveness of this paradigm. The results of the simulation show that the CGA can efficiently find the optimal values in a performance-security tradeoff model for D-NCS. ECWAY TECHNOLOGIES IEEE PROJECTS & SOFTWARE DEVELOPMENTS OUR OFFICES @ CHENNAI / TRICHY / KARUR / ERODE / MADURAI / SALEM / COIMBATORE CELL: +91 98949 17187, +91 875487 2111 / 3111 / 4111 / 5111 / 6111 VISIT: www.ecwayprojects.com MAIL TO: ecwaytechnologies@gmail.com