{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,3]],"date-time":"2026-02-03T17:37:53Z","timestamp":1770140273582,"version":"3.49.0"},"reference-count":45,"publisher":"MDPI AG","issue":"8","license":[{"start":{"date-parts":[[2021,4,14]],"date-time":"2021-04-14T00:00:00Z","timestamp":1618358400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>Recently, vast investments have been made worldwide in developing Cyber-Physical Systems (CPS) as solutions to key socio-economic challenges. The Internet-of-Things (IoT) has also enjoyed widespread adoption, mostly for its ability to add \u201csensing\u201d and \u201cactuation\u201d capabilities to existing CPS infrastructures. However, attention must be paid to the impact of IoT protocols on the dependability of CPS infrastructures. We address the issues of CPS dependability by using an epidemic model of the underlying dynamics within the CPS\u2019 IoT subsystem (CPS-IoT) and an interference-aware routing reconfiguration. These help to efficiently monitor CPS infrastructure\u2014avoiding routing oscillation, while improving its safety. The contributions of this paper are threefold. Firstly, a CPS orchestration model is proposed that relies upon: (i) Inbound surveillance and outbound actuation to improve dependability and (ii) a novel information diffusion model that uses epidemic states and diffusion sets to produce diffusion patterns across the CPS-IoT. Secondly, the proposed CPS orchestration model is numerically analysed to show its dependability for both sensitive and non-sensitive applications. Finally, a novel interference-aware clustering protocol called \u201cINMP\u201d, which enables network reconfiguration through migration of nodes across clusters, is proposed. It is then bench-marked against prominent IoT protocols to assess its impact on the dependability of the CPS.<\/jats:p>","DOI":"10.3390\/s21082761","type":"journal-article","created":{"date-parts":[[2021,4,14]],"date-time":"2021-04-14T15:30:39Z","timestamp":1618414239000},"page":"2761","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":26,"title":["Cyber Physical Systems Dependability Using CPS-IOT Monitoring"],"prefix":"10.3390","volume":"21","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0774-5251","authenticated-orcid":false,"given":"Antoine","family":"Bagula","sequence":"first","affiliation":[{"name":"Department of Computer Science, University of the Western Cape, Bellville, Cape Town 7535, South Africa"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6583-3749","authenticated-orcid":false,"given":"Olasupo","family":"Ajayi","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of the Western Cape, Bellville, Cape Town 7535, South Africa"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8972-0167","authenticated-orcid":false,"given":"Hloniphani","family":"Maluleke","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of the Western Cape, Bellville, Cape Town 7535, South Africa"}]}],"member":"1968","published-online":{"date-parts":[[2021,4,14]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1109\/TDSC.2004.2","article-title":"Basic concepts and taxonomy of dependable and secure computing","volume":"1","author":"Avizienis","year":"2004","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Song, J., Han, S., Mok, A., Chen, D., Lucas, M., Nixon, M., and Pratt, W. (2008, January 22\u201324). WirelessHART: Applying wireless technology in real-time industrial process control. Proceedings of the 2008 IEEE Real-Time and Embedded Technology and Applications Symposium, St. Louis, MO, USA.","DOI":"10.1109\/RTAS.2008.15"},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Bagula, A., Djenouri, D., and Karbab, E. (2013, January 8\u201311). Ubiquitous sensor network management: The least interference beaconing model. Proceedings of the 2013 IEEE 24th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), London, UK.","DOI":"10.1109\/PIMRC.2013.6666538"},{"key":"ref_4","unstructured":"Bagula, A., and Erasmus, Z. (2015, January 16\u201327). IoT emulation with cooja. Proceedings of the ICTP-IoT Workshop, Trieste, Italy."},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Gnawali, O., Fonseca, R., Jamieson, K., Moss, D., and Levis, P. (2009, January 4\u20136). Collection Tree Protocol. Proceedings of the ACM SenSys09, Berkeley, CA, USA.","DOI":"10.1145\/1644038.1644040"},{"key":"ref_6","first-page":"1","article-title":"RPL: IPv6 Routing protocol for Low-Power and Lossy Networks","volume":"6550","author":"Winter","year":"2012","journal-title":"RFC"},{"key":"ref_7","first-page":"459","article-title":"Taxonomy of Attacks in RPL-based Internet of Things","volume":"18","author":"Badonnel","year":"2016","journal-title":"Int. J. Netw. Secur."},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Tuyishimire, E., and Bagula, A. (2020, January 11\u201312). A novel management model for dynamic sensor networks using diffusion sets. Proceedings of the 2020 Conference on Information Communications Technology and Society (ICTAS), Durban, South Africa.","DOI":"10.1109\/ICTAS47918.2020.233985"},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"700","DOI":"10.1098\/rspa.1927.0118","article-title":"A contribution to the mathematical theory of epidemics","volume":"115","author":"Kermack","year":"1927","journal-title":"Proc. R. Soc. Lond. Ser. A"},{"key":"ref_10","first-page":"33","article-title":"Contributions to the mathematical theory of epidemics\u2014I. 1927","volume":"53","author":"Kermack","year":"1991","journal-title":"Bull. Math. Biol."},{"key":"ref_11","first-page":"149","article-title":"Differential epidemic model of virus and worms in computer network","volume":"14","author":"Mishra","year":"2012","journal-title":"IJ Netw. Secur."},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Sotoodeh, H., Safaei, F., Sanei, A., and Daei, E. (2013). A general stochastic information diffusion model in social networks based on epidemic diseases. arXiv.","DOI":"10.5121\/ijcnc.2013.5512"},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Tang, S., and Mark, B. (2009, January 25\u201328). Analysis of virus spread in wireless sensor networks: An epidemic model. Proceedings of the 2009 7th International Workshop on Design of Reliable Communication Networks, Washington, DC, USA.","DOI":"10.1109\/DRCN.2009.5340022"},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"2867","DOI":"10.1016\/j.comnet.2006.11.028","article-title":"Performance modelling of epidemic routing","volume":"51","author":"Zhang","year":"2007","journal-title":"Comput. Netw."},{"key":"ref_15","first-page":"309","article-title":"A simple model for COVID-19","volume":"5","author":"Arino","year":"2020","journal-title":"Infect. Dis. Model."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"855","DOI":"10.1038\/s41591-020-0883-7","article-title":"Modelling the COVID-19 epidemic and implementation of population-wide interventions in Italy","volume":"26","author":"Giordano","year":"2020","journal-title":"Nat. Med."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"165","DOI":"10.21037\/jtd.2020.02.64","article-title":"Modified SEIR and AI prediction of the epidemics trend of COVID-19 in China under public health interventions","volume":"12","author":"Yang","year":"2020","journal-title":"J. Thorac. Dis."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"2708","DOI":"10.3934\/mbe.2020148","article-title":"A mathematical model for the novel coronavirus epidemic in Wuhan, China","volume":"17","author":"Yang","year":"2020","journal-title":"Math. Biosci. Eng."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"92","DOI":"10.1186\/s13662-021-03248-5","article-title":"On an SE(Is)(Ih)AR epidemic model with combined vaccination and antiviral controls for COVID-19 pandemic","volume":"2021","author":"Ibeas","year":"2021","journal-title":"Adv. Differ. Equ."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"345","DOI":"10.1186\/s12967-020-02513-7","article-title":"Mathematical models for devising the optimal SARS CoV 2 strategy for eradication in China, South Korea, and Italy","volume":"18","author":"Jiang","year":"2020","journal-title":"J.Transl. Med."},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Etxeberria-Etxaniz, M., Alonso-Quesada, S., and de la Sen, M. (2020). On an SEIR Epidemic Model with Vaccination of Newborns and Periodic Impulsive Vaccination with Eventual On-Line Adapted Vaccination Strategies to the Varying Levels of the Susceptible Subpopulation. Appl. Sci., 10.","DOI":"10.3390\/app10228296"},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"626","DOI":"10.1007\/s00285-004-0301-7","article-title":"Differential susceptibility epidemic models","volume":"50","author":"Hyman","year":"2005","journal-title":"J. Math. Biol."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"873","DOI":"10.1098\/rsif.2009.0386","article-title":"The construction of next-generation matrices for compartmental epidemic models","volume":"7","author":"Diekmann","year":"2010","journal-title":"J. R. Soc. Interface"},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"281","DOI":"10.1098\/rsif.2005.0042","article-title":"Perspectives on the basic reproductive ratio","volume":"2","author":"Hellernan","year":"2005","journal-title":"J. R. Soc. Interface"},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"413","DOI":"10.1109\/TMC.2008.115","article-title":"An Epidemic Theoretic Framework for Vulnerability Analysis of Broadcast Protocols in Wireless Sensor Networks","volume":"8","author":"De","year":"2009","journal-title":"IEEE Trans. Mobile Comput."},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Wang, T., Wu, Q., Wen, S., Cai, Y., Tian, H., Chen, Y., and Wang, B. (2017). Propagation Modeling and Defending of a Mobile Sensor Worm in Wireless Sensor and Actuator Networks. Sensors, 17.","DOI":"10.3390\/s17010139"},{"key":"ref_27","first-page":"229","article-title":"Design and Analysis of Modified SIQRS Model for Performance Study of Wireless Sensor Network","volume":"18","author":"Ojha","year":"2017","journal-title":"Scalable Comput. Pract. Exp."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3185510","article-title":"Holistic Cyber-Physical Management for Dependable Wireless Control Systems","volume":"3","author":"Ma","year":"2018","journal-title":"ACM Trans. Cyber-Phys. Syst."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"67","DOI":"10.1016\/j.micpro.2015.11.021","article-title":"An approach to model dependability of cyber-physical systems","volume":"41","author":"Sanislav","year":"2016","journal-title":"Microprocess. Microsyst."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"273","DOI":"10.1016\/j.compind.2016.05.006","article-title":"Design, modelling, simulation and integration of cyber physical systems: Methods and applications","volume":"82","author":"Hehenbergera","year":"2016","journal-title":"Comput. Comput. Ind."},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Casta\u00f1o, F., Strzelczak, S., Villalonga, A., Haber, R.E., and Kossakowska, J. (2019). Sensor Reliability in Cyber-Physical Systems Using Internet-of-Things Data: A Review and Case Study. Remote Sens., 11.","DOI":"10.3390\/rs11192252"},{"key":"ref_32","first-page":"463","article-title":"Supporting Cyber-Physical Systems with Wireless Sensor Networks: An Outlook of software and services","volume":"93","author":"Misra","year":"2013","journal-title":"J. Indian Inst. Sci."},{"key":"ref_33","unstructured":"IBM Corporation (2005). An Architectural Blueprint for Autonomic Computing, IBM. [3rd ed.]. IBM White Paper."},{"key":"ref_34","doi-asserted-by":"crossref","unstructured":"Lee, E., Seo, Y.D., and Kim, Y.G. (2019). Self-Adaptive Framework Based on MAPE Loop for Internet of Things. Sensors, 19.","DOI":"10.3390\/s19132996"},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"174","DOI":"10.1145\/3126501","article-title":"HiCH: Hierarchical Fog-Assisted Computing Architecture for Healthcare IoT","volume":"16","author":"Azimi","year":"2017","journal-title":"ACM Trans. Embed. Comput. Syst."},{"key":"ref_36","doi-asserted-by":"crossref","unstructured":"Lee, E. (2008, January 5\u20137). Cyber physical systems: Design challenges. Proceedings of the 2008 11th IEEE International Symposium on Object and Component-Oriented Real-Time Distributed Computing (ISORC), Orlando, FL, USA.","DOI":"10.1109\/ISORC.2008.25"},{"key":"ref_37","doi-asserted-by":"crossref","unstructured":"Park, S., and Park, S. (2019). A Cloud-based Middleware for Self-Adaptive IoT-Collaboration Services. Sensors, 19.","DOI":"10.3390\/s19204559"},{"key":"ref_38","doi-asserted-by":"crossref","unstructured":"Bagula, A., Djenouri, E., and Karbab, D. (2013). On the relevance of using interference and service differentiation routing in the internet-of-things. Internet of Things, Smart Spaces, and Next Generation Networking, Springer.","DOI":"10.1007\/978-3-642-40316-3_3"},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"101316","DOI":"10.1016\/j.pmcj.2020.101316","article-title":"Distributed algorithms based on proximity for self-organizing fog computing systems","volume":"71","author":"Karagiannis","year":"2021","journal-title":"Pervasive Mob. Comput."},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"44","DOI":"10.1016\/j.future.2020.07.032","article-title":"Partitioned integration and coordination via the self-organising coordination regions pattern","volume":"114","author":"Pianini","year":"2021","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_41","unstructured":"Hu, J., and Tang, H. (2003). Numerical Methods for Differential Equations, City University."},{"key":"ref_42","unstructured":"Dunkels, A., Gronvall, B., and Voigt, T. (2004, January 16\u201318). Contiki\u2014A lightweight and flexible operating system for tiny networked sensors. Proceedings of the 29th Annual IEEE International Conference on Local Computer Networks, Tampa, FL, USA."},{"key":"ref_43","doi-asserted-by":"crossref","unstructured":"Bagula, A., Abidoye, A.P., and Zodi, G.L. (2016). Service-aware clustering: An energy-efficient model for the internet-of-things. Sensors, 16.","DOI":"10.3390\/s16010009"},{"key":"ref_44","unstructured":"Han, J. (2014). Cyber-Physical Systems with Multi-Unmanned Aerial Vehicle-Based Cooperative Source Seeking and Contour Mapping. [Ph.D. Thesis, Utah State University]."},{"key":"ref_45","doi-asserted-by":"crossref","unstructured":"Tuyishimire, E., Bagula, A., Rekhis, S., and Boudriga, N. (2017, January 3\u20136). Cooperative data muling from ground sensors to base stations using UAVs. Proceedings of the 2017 IEEE Symposium on Computers and Communications (ISCC), Heraklion, Greece.","DOI":"10.1109\/ISCC.2017.8024501"}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/21\/8\/2761\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T05:47:52Z","timestamp":1760161672000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/21\/8\/2761"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,4,14]]},"references-count":45,"journal-issue":{"issue":"8","published-online":{"date-parts":[[2021,4]]}},"alternative-id":["s21082761"],"URL":"https:\/\/doi.org\/10.3390\/s21082761","relation":{},"ISSN":["1424-8220"],"issn-type":[{"value":"1424-8220","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,4,14]]}}}