Skip to main content
Top
Published in: Artificial Life and Robotics 4/2020

13-10-2020 | Original Article

Tamper-resistant controller using neural network and time-varying quantization

Authors: Fangyuan Xu, Ryo Ariizumi, Shun-ichi Azuma, Toru Asai

Published in: Artificial Life and Robotics | Issue 4/2020

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

In this paper, we consider a tamper-resistant control system aiming at protecting the knowledge of the controller from attackers. In this control system, the controller operates normally only for a limited number of time-varying specific states; otherwise, it outputs an incorrect value. We propose to realize the tamper-resistant controller by employing a neural network and time-varying quantization. Furthermore, we make it possible for only one trained neural network to be used for all quantization based on the local approximation linearity of the trained neural network. Without this approach, the neural network needs to be trained for every possible quantization, which leads to huge computation. We provide simulations to demonstrate the security and feasibility of the proposed method.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Appendix
Available only for authorised users
Literature
1.
go back to reference Sandberg H, Amin S, Johansson KH (2015) Cyberphysical security in networked control systems: an introduction to the issue. IEEE Control Syst Mag 35(1):20–23MathSciNetCrossRef Sandberg H, Amin S, Johansson KH (2015) Cyberphysical security in networked control systems: an introduction to the issue. IEEE Control Syst Mag 35(1):20–23MathSciNetCrossRef
2.
go back to reference Kaustubh I, Steve H, Gonzalo S, Kyzer D, Chidambaram A (2018) Understanding session border controllers: comprehensive guide to designing, deploying, troubleshooting, and maintaining Cisco Unified Border Element (CUBE) Solutions. Cisco Press, Indianapolis Kaustubh I, Steve H, Gonzalo S, Kyzer D, Chidambaram A (2018) Understanding session border controllers: comprehensive guide to designing, deploying, troubleshooting, and maintaining Cisco Unified Border Element (CUBE) Solutions. Cisco Press, Indianapolis
3.
go back to reference Kogiso K, Fujita T (2015) Cyber-security enhancement of networked control systems using homomorphic encryption. In: IEEE conference on decision and control, pp 6836–6843, Osaka Kogiso K, Fujita T (2015) Cyber-security enhancement of networked control systems using homomorphic encryption. In: IEEE conference on decision and control, pp 6836–6843, Osaka
4.
go back to reference Rivest RL, Shamir A, Adleman L (1978) A method for obtaining digital signatures and public-key cryptosystem. Commun ACM 21(2):120–126MathSciNetCrossRef Rivest RL, Shamir A, Adleman L (1978) A method for obtaining digital signatures and public-key cryptosystem. Commun ACM 21(2):120–126MathSciNetCrossRef
5.
go back to reference ElGamal T (1985) A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans Inf Theory 31(4):469–472MathSciNetCrossRef ElGamal T (1985) A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans Inf Theory 31(4):469–472MathSciNetCrossRef
6.
go back to reference Kim J, Lee C, Shim H et al (2016) Encrypting controller using fully homomorphic encryption for security of cyber-physical systems. IFAC PapersOnLine 49(22):175–180CrossRef Kim J, Lee C, Shim H et al (2016) Encrypting controller using fully homomorphic encryption for security of cyber-physical systems. IFAC PapersOnLine 49(22):175–180CrossRef
7.
go back to reference Takayama T, Ariizumi R, Azuma S, Asai T, Tanemura M (2019) Tamper resistant controller with neural network. In: The 63rd annual conference of the institute of systems, control and information engineers, Osaka (in Japanese) Takayama T, Ariizumi R, Azuma S, Asai T, Tanemura M (2019) Tamper resistant controller with neural network. In: The 63rd annual conference of the institute of systems, control and information engineers, Osaka (in Japanese)
8.
go back to reference Ohtsuka T, Zanma T, Liu KZ (2014) State estimation in quantized feedback control system. In: 2014 IEEE 13th international workshop on advanced motion control, pp 746–751, Japan Ohtsuka T, Zanma T, Liu KZ (2014) State estimation in quantized feedback control system. In: 2014 IEEE 13th international workshop on advanced motion control, pp 746–751, Japan
9.
go back to reference Almakhles D, Swain AK, Nasiri A et al (2017) An adaptive two-level quantizer for networked control systems. IEEE Trans Control Syst Technol 259(3):1084–1091CrossRef Almakhles D, Swain AK, Nasiri A et al (2017) An adaptive two-level quantizer for networked control systems. IEEE Trans Control Syst Technol 259(3):1084–1091CrossRef
10.
go back to reference Zhao Q, Xu H, Jagannathan S (2015) Optimal control of uncertain quantized linear discretetime systems. Int J Adapt Control Signal Process 29(3):325–345CrossRef Zhao Q, Xu H, Jagannathan S (2015) Optimal control of uncertain quantized linear discretetime systems. Int J Adapt Control Signal Process 29(3):325–345CrossRef
11.
go back to reference Roger WB, Daniel L (2000) Quantized feedback stabilization of linear systems. IEEE Trans Autom Control 45(7):1279–1289MathSciNetCrossRef Roger WB, Daniel L (2000) Quantized feedback stabilization of linear systems. IEEE Trans Autom Control 45(7):1279–1289MathSciNetCrossRef
12.
go back to reference Isakov M, Bu L, Cheng H et al (2018) Preventing neural network model exfiltration in machine learning hardware accelerators. In: 2018 Asian hardware oriented security and trust symposium, pp 62–67, Hong Kong Isakov M, Bu L, Cheng H et al (2018) Preventing neural network model exfiltration in machine learning hardware accelerators. In: 2018 Asian hardware oriented security and trust symposium, pp 62–67, Hong Kong
Metadata
Title
Tamper-resistant controller using neural network and time-varying quantization
Authors
Fangyuan Xu
Ryo Ariizumi
Shun-ichi Azuma
Toru Asai
Publication date
13-10-2020
Publisher
Springer Japan
Published in
Artificial Life and Robotics / Issue 4/2020
Print ISSN: 1433-5298
Electronic ISSN: 1614-7456
DOI
https://doi.org/10.1007/s10015-020-00647-x

Other articles of this Issue 4/2020

Artificial Life and Robotics 4/2020 Go to the issue