Open Access

Resilient and Secure Time-Sensitive Architectures for Safety-Critical Cyber-Physical Systems: Integrating Predictability, Networking Standards, And Fault-Tolerant Design

4 Department of Computer Engineering, University of Zurich, Switzerland

Abstract

 

The rapid evolution of safety-critical cyber-physical systems (CPS), particularly within industrial automation and automotive domains, has intensified the need for architectures that simultaneously guarantee timing predictability, functional safety, and cybersecurity resilience. This paper presents a comprehensive theoretical investigation into the intersection of real-time scheduling, time-sensitive networking (TSN), precision clock synchronization, and fault-tolerant embedded system design. Drawing upon foundational and contemporary literature, the study synthesizes insights from real-time systems theory, component-based software engineering, and emerging networking standards such as IEEE TSN and precision time protocol (PTP). The analysis reveals that while deterministic communication and scheduling frameworks have matured significantly, their integration with robust security mechanisms remains incomplete, especially under adversarial conditions targeting synchronization protocols. Furthermore, the study explores the implications of model-driven architecture (MDA) and component-based design paradigms in enhancing system modularity and certification processes. The methodological approach is qualitative and analytical, relying on cross-referencing established theoretical frameworks and empirical studies to derive architectural principles. The findings indicate that achieving end-to-end resilience requires a co-design approach encompassing hardware redundancy, network determinism, and adaptive security layers. Additionally, emerging automotive zonal architectures and lockstep processing techniques are evaluated as promising directions for achieving fault tolerance in distributed CPS. The discussion highlights key limitations in current standards, including insufficient threat modeling and scalability challenges, and outlines future research avenues such as adaptive scheduling under uncertainty and secure-by-design synchronization mechanisms. This work contributes to the ongoing discourse by providing an integrative perspective that bridges traditionally siloed domains, offering a foundation for the next generation of resilient, secure, and predictable cyber-physical systems.

Keywords

References

📄 Mubeen S., Lisova E., Feljan A.V. Timing predictability and security in safety-critical industrial cyber-physical systems: A position paper. Applied Sciences, 10 (2020), pp. 1-17.
📄 Navet N., Simonot-Lion F. In-Vehicle Communication Networks - a Historical Perspective and Review: Technical Report. University of Luxembourg (2013).
📄 Mubeen S., Mäki-Turja J., Sjödin M. Integrating mixed transmission and practical limitations with the worst-case response-time analysis for Controller Area Network. Journal of Systems and Software, 99 (2015), pp. 66-84.
📄 Nasrallah A., Thyagaturu A.S., Alharbi Z., Wang C., Shao X., Reisslein M., ElBakoury H. Ultra-low latency networks: The IEEE TSN and IETF detnet standards and related 5G ULL research. IEEE Communications Surveys and Tutorials, 21 (1) (2019), pp. 88-145.
📄 Henzinger T.A., Sifakis J. The embedded systems design challenge. Proceedings of the 14th International Symposium on Formal Methods (2006).
📄 Bezivin J., Gerbe O. Towards a precise definition of the OMG/MDA framework. Proceedings of the 16th Annual International Conference on Automated Software Engineering (2001), pp. 273–280.
📄 Vale T., Crnkovic I., de Almeida E.S., da Mota Silveira Neto P.A., Cavalcanti Y.C., de Lemos Meira S.R. Twenty-eight years of component-based software engineering. Journal of Systems and Software, 111 (2016), pp. 128-148.
📄 Sha L., Abdelzaher T., Årzén K.-E., Cervin A., Baker T.P., Burns A., Buttazzo G., Caccamo M., Lehoczky J.P., Mok A.K. Real-time scheduling theory: A historical perspective. Real-Time Systems, 28 (2/3) (2004), pp. 101-155.
📄 Önal C., Kirrmann H. Security improvements for IEEE 1588 Annex K: implementation and comparison of authentication codes. Proceedings of the IEEE ISPCS, San Francisco, USA (2012).
📄 Itkin E., Wool A. A security analysis and revised security extension for the precision time protocol. IEEE Transactions on Dependable and Secure Computing, 17 (1) (2020), pp. 22-34.
📄 IEEE Standard for a precision clock synchronization protocol for networked measurement and control systems. IEEE 1588 (2020).
📄 Alghamd W., Schukat M. A detection model against precision time protocol attacks. Proceedings of ICCAIS, Riyadh (2020).
📄 Alghamdi W., Schukat M. Slave clock responses to precision time protocol attacks: a case study. International Conference on Cyber Security and Protection of Digital Services (2020).
📄 Lisova E., Uhlemann E., Steiner W., Åkerberg J., Björkman M. Risk evaluation of an ARP poisoning attack on clock synchronization for industrial applications. Proceedings of the IEEE ICIT, Taipei (2016).
📄 IEEE Standard for Local and Metropolitan Area Networks--Bridges and Bridged Networks, Amendment 28: Per-Stream Filtering and Policing (2017).
📄 IEEE Standard for Local and Metropolitan Area Networks--Bridges and Bridged Networks, Amendment 29: Cyclic Queuing and Forwarding (2017).
📄 IEEE Standard for Local and Metropolitan Area Networks--Bridges and Bridged Networks, Amendment 34: Asynchronous Traffic Shaping (2020).
📄 IEEE Standard for Local and Metropolitan Area Networks, Frame Replication and Elimination for Reliability (2017).
📄 P802.1DG TSN Profile for Automotive In-Vehicle Ethernet Communications (2020).
📄 Committee VCSE. Cybersecurity Guidebook for cyber-physical vehicle systems. SAE International (2016).
📄 Committee VCSE. Road vehicles - cybersecurity engineering. SAE International (2020).
📄 UNECE. Working Party on Automated/Autonomous and Connected Vehicles (2020).
📄 Abdul Salam Abdul Karim. (2023). Fault-Tolerant Dual-Core Lockstep Architecture for Automotive Zonal Controllers Using NXP S32G Processors. International Journal of Intelligent Systems and Applications in Engineering, 11(11s), 877–885. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/7749

Similar Articles

1-10 of 60

You may also start an advanced similarity search for this article.