会议论文详细信息
13th European Workshop on Advanced Control and Diagnosis
Attack-tolerant networked control system: an approach for detection the controller stealthy hijacking attack
Yaseen, Amer Atta^1 ; Bayart, Mireille^1
Univ. Lille, CNRS UMR 9189 CRIStAL, Centre de Recherche en Informatique Signal et Automatique de Lille, Bât Polytech-Lille, Villeneuve d'Ascq Cedex
59655, France^1
关键词: Data encryption standard;    Message digests;    New approaches;    PI Controller;    Security elements;    Stuxnet;    Time-stamp;   
Others  :  https://iopscience.iop.org/article/10.1088/1742-6596/783/1/012022/pdf
DOI  :  10.1088/1742-6596/783/1/012022
来源: IOP
PDF
【 摘 要 】

In this work, a new approach will be introduced as a development for the attack-tolerant scheme in the Networked Control System (NCS). The objective is to be able to detect an attack such as the Stuxnet case where the controller is reprogrammed and hijacked. Besides the ability to detect the stealthy controller hijacking attack, the advantage of this approach is that there is no need for a priori mathematical model of the controller. In order to implement the proposed scheme, a specific detector for the controller hijacking attack is designed. The performance of this scheme is evaluated be connected the detector to NCS with basic security elements such as Data Encryption Standard (DES), Message Digest (MD5), and timestamp. The detector is tested along with networked PI controller under stealthy hijacking attack. The test results of the proposed method show that the hijacked controller can be significantly detected and recovered.

【 预 览 】
附件列表
Files Size Format View
Attack-tolerant networked control system: an approach for detection the controller stealthy hijacking attack 892KB PDF download
  文献评价指标  
  下载次数:9次 浏览次数:30次