Affiliation:
1. North-Caucasus Federal University
Abstract
Objective. The purpose of the work is to increase the efficiency of the functioning of agents of a cyber-physical system in the presence of agents with incorrect or malicious behavior. The goal is achieved by establishing a trusted interaction between agents and quick detection of malicious impact.Method. Trusted interaction is carried out using distributed ledger technology and agent confidence indicators. The novelty of the proposed solution lies in the fact that information about the actions of agents is stored and aggregated using smart contracts at specified time intervals. Each agent keeps a local copy of the agent interaction chain. If several agents interact with each other, then they exchange information stored in their copies of the ledger.Result. To test the proposed method, we implemented it in C++. For the experiments, the scenario of collective perception by agents of a decentralized cyber-physical environment in a specialized simulation program Contiki Cooja was used.Conclusion. The method implemented using the solutions proposed in this work showed higher efficiency than the method based on the dynamic calculation of the confidence index. The proposed solutions can be applied not only in cyber-physical systems, but also in any other systems with decentralized control.
Publisher
FSB Educational Establishment of Higher Education Daghestan State Technical University
Subject
Polymers and Plastics,General Environmental Science
Reference15 articles.
1. Alguliyev R.М., Imamverdiyev Ya.N., Sukhostat L.V. Cyber-Physical Systems: Basic Concepts and Security Issues. Information technologies. 2017; 23(7): 517–528. (In Russ)
2. Lee E.A., Cheng A.M.K. The Past, Present and Future of Cyber-Physical Systems: A Focus on Models. Multidisciplinary Digital Publishing Institute. 2015; 15(3): 4837–4869.
3. Zakirove Yu.M., Myshlyaeva А.А.Zakieva, E.S. Cyber-Physical Systems: Opportunities and Threats // Technological innovation in the modern world, 2019, 64–68. (In Russ)
4. Lamport L., Shostak R., Pease M. The Byzantine Generals Problem. C. Trans. Program. Lang. Syst. 1982; 4(3): 382–401.
5. Sicari, A. Rizzardi, L.A. Grieco, A. Coen-Porisini. Security, privacy and trust in Internet of Things: The road ahead. Comput. Networks. Elsevier, 2015; 76: 146–164.