Skip to main content

2017 | OriginalPaper | Buchkapitel

Analysis of Cyber Physical Systems Security Issue via Uncertainty Approaches

verfasst von : Hui Ge, Dong Yue, Xiang-peng Xie, Song Deng, Song-lin Hu

Erschienen in: Advanced Computational Methods in Life System Modeling and Simulation

Verlag: Springer Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

From security perspective, cyber physical system (CPS) security issue is investigated in this note. Based on a double-loop security control structure, the typical cyber attack called information disclosure, denial-of-service (DoS), deception attack and stealth attack are analyzed from uncertainty perspective. The performance of these attacks are formulated, meaningful models are proposed meanwhile. According to aforementioned attacks, security control scenarios are obtained via the character of each kind cyber attack. And some novel results are obtained via a well designed double closed loop structure. At last, from traditional standpoint, uncertainties of a separately excited DC motor is taken as an example to demonstrate the problem.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Sandberg, H., Amin, S., Johansson, K.: Cyberphysical security in networked control systems: an introduction to the issue. IEEE Control Syst. 35(1), 20–23 (2015)MathSciNetCrossRef Sandberg, H., Amin, S., Johansson, K.: Cyberphysical security in networked control systems: an introduction to the issue. IEEE Control Syst. 35(1), 20–23 (2015)MathSciNetCrossRef
2.
Zurück zum Zitat How, J.P.: Cyberphysical security in networked control systems [about this issue]. IEEE Control Syst. 35(1), 8–12 (2015)MathSciNetCrossRef How, J.P.: Cyberphysical security in networked control systems [about this issue]. IEEE Control Syst. 35(1), 8–12 (2015)MathSciNetCrossRef
3.
Zurück zum Zitat Cárdenas, A.A., Amin, S., Sinopoli, B., Perrig, A., Sastry, S.: Challenges for securing cyber physical systems. In: First Workshop on Cyber-Physical Systems Security, pp. 363–369 (2006) Cárdenas, A.A., Amin, S., Sinopoli, B., Perrig, A., Sastry, S.: Challenges for securing cyber physical systems. In: First Workshop on Cyber-Physical Systems Security, pp. 363–369 (2006)
4.
Zurück zum Zitat Neuman, D.C.: Challenges in security for cyber-physical systems. In: Proceedings of S&T Workshop Future Directions Cyber-Physical System Security, No. 1, pp. 1–2 (2009) Neuman, D.C.: Challenges in security for cyber-physical systems. In: Proceedings of S&T Workshop Future Directions Cyber-Physical System Security, No. 1, pp. 1–2 (2009)
5.
Zurück zum Zitat Zhu, Q., Basar, T.: Game-theoretic methods for robustness, security, and resilience of cyberphysical control systems: games-in-games principle for optimal cross-layer resilient control systems. IEEE Control Syst. 35(1), 46–65 (2015)MathSciNetCrossRef Zhu, Q., Basar, T.: Game-theoretic methods for robustness, security, and resilience of cyberphysical control systems: games-in-games principle for optimal cross-layer resilient control systems. IEEE Control Syst. 35(1), 46–65 (2015)MathSciNetCrossRef
6.
Zurück zum Zitat Yue, D., Tian, E., Han, Q.L.: A delay system method for designing event-triggered controllers of networked control systems. IEEE Trans. Autom. Control 58(2), 475–481 (2013)MathSciNetCrossRef Yue, D., Tian, E., Han, Q.L.: A delay system method for designing event-triggered controllers of networked control systems. IEEE Trans. Autom. Control 58(2), 475–481 (2013)MathSciNetCrossRef
7.
Zurück zum Zitat Householder, A., Manion, A., Pesante, L., Weaver, G.: Managing the threat of denial-of-service attacks. CERT Coord. Center 33(4), 99–110 (2001) Householder, A., Manion, A., Pesante, L., Weaver, G.: Managing the threat of denial-of-service attacks. CERT Coord. Center 33(4), 99–110 (2001)
8.
Zurück zum Zitat Smith, R.S.: Covert misappropriation of networked control systems: presenting a feedback structure. IEEE Control Syst. 35(1), 82–92 (2015)MathSciNetCrossRef Smith, R.S.: Covert misappropriation of networked control systems: presenting a feedback structure. IEEE Control Syst. 35(1), 82–92 (2015)MathSciNetCrossRef
9.
Zurück zum Zitat Pasqualetti, F., Dorfler, F., Bullo, F.: Attack detection and identification in cyber-physical systems. IEEE Trans. Autom. Control 58(11), 2715–2729 (2013)MathSciNetCrossRef Pasqualetti, F., Dorfler, F., Bullo, F.: Attack detection and identification in cyber-physical systems. IEEE Trans. Autom. Control 58(11), 2715–2729 (2013)MathSciNetCrossRef
10.
Zurück zum Zitat Zhou, K., Doyle, J.C., Glover, K.: Robust and Optimal Control. Prentice-Hall, Inc., Upper Saddle River (1996)MATH Zhou, K., Doyle, J.C., Glover, K.: Robust and Optimal Control. Prentice-Hall, Inc., Upper Saddle River (1996)MATH
11.
Zurück zum Zitat Ding, S.: Model-Based Fault Diagnosis Techniques: Design Schemes, Algorithms, and Tools. Springer Science & Business Media, Heidelberg (2008) Ding, S.: Model-Based Fault Diagnosis Techniques: Design Schemes, Algorithms, and Tools. Springer Science & Business Media, Heidelberg (2008)
12.
Zurück zum Zitat Knapp, E.D.: Industrial Network Security: Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems. Syngress, Rockland (2011) Knapp, E.D.: Industrial Network Security: Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems. Syngress, Rockland (2011)
13.
Zurück zum Zitat Zhou, J., Wang, Y., Zhou, R.: Global speed control of separately excited DC motor. In: Power Engineering Society Winter Meeting, vol. 3, pp. 1425–1430 (2001) Zhou, J., Wang, Y., Zhou, R.: Global speed control of separately excited DC motor. In: Power Engineering Society Winter Meeting, vol. 3, pp. 1425–1430 (2001)
Metadaten
Titel
Analysis of Cyber Physical Systems Security Issue via Uncertainty Approaches
verfasst von
Hui Ge
Dong Yue
Xiang-peng Xie
Song Deng
Song-lin Hu
Copyright-Jahr
2017
Verlag
Springer Singapore
DOI
https://doi.org/10.1007/978-981-10-6370-1_42