Skip to main content
Erschienen in:
Buchtitelbild

2016 | OriginalPaper | Buchkapitel

Event-Triggered Watermarking Control to Handle Cyber-Physical Integrity Attacks

verfasst von : Jose Rubio-Hernan, Luca De Cicco, Joaquin Garcia-Alfaro

Erschienen in: Secure IT Systems

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The use of control-theoretic solutions to detect attacks against cyber-physical systems is a growing area of research. Traditional literature proposes the use of control strategies to retain, f.i., satisfactory closed-loop performance, as well as safety properties, when a communication network connects the distributed components of a physical system (e.g., sensors, actuators, and controllers). However, the adaptation of these strategies to handle security incidents, is an ongoing challenge. In this paper, we analyze the use of a watermark-based detector that handles integrity attacks. We show that (1) the detector is able to work properly under the presence of adversaries using non-parametric methods to escape detection; but (2) it fails at detecting adversaries using parametric identification methods to escape detection. We propose a new strategy that complements the watermark-based detector in order to detect both adversaries. We validate the detection efficiency of the new strategy via numeric simulations.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Arvani, A., Rao, V.S.: Detection and protection against intrusions on smart grid systems. Int. J. Cyber Secur. Digit. Forensics 3, 38 (2014) Arvani, A., Rao, V.S.: Detection and protection against intrusions on smart grid systems. Int. J. Cyber Secur. Digit. Forensics 3, 38 (2014)
2.
Zurück zum Zitat Barenthin Syberg, M.: Complexity issues, validation and input design for control in system identification (2008) Barenthin Syberg, M.: Complexity issues, validation and input design for control in system identification (2008)
3.
Zurück zum Zitat Brumback, B., Srinath, M.: A chi-square test for fault-detection in Kalman filters. IEEE Trans. Autom. Control 32(6), 552–554 (1987)CrossRefMATH Brumback, B., Srinath, M.: A chi-square test for fault-detection in Kalman filters. IEEE Trans. Autom. Control 32(6), 552–554 (1987)CrossRefMATH
4.
Zurück zum Zitat Corman, D., Pillitteri, V., Tousley, S., Tehranipoor, U.: Lindqvist: NITRD cyber-physical security panel. In: 35th Symposium on Security and Privacy (2014) Corman, D., Pillitteri, V., Tousley, S., Tehranipoor, U.: Lindqvist: NITRD cyber-physical security panel. In: 35th Symposium on Security and Privacy (2014)
5.
Zurück zum Zitat Do, V.L., Fillatre, L., Nikiforov, I.: A statistical method for detecting cyber/physical attacks on scada systems. In: Proceedings of IEEE Control Applications (2014) Do, V.L., Fillatre, L., Nikiforov, I.: A statistical method for detecting cyber/physical attacks on scada systems. In: Proceedings of IEEE Control Applications (2014)
6.
Zurück zum Zitat Falliere, N., Murchu, L.O., Chien, E.: W32. stuxnet dossier. White paper, Symantec Corp., Security Response, 5 (2011) Falliere, N., Murchu, L.O., Chien, E.: W32. stuxnet dossier. White paper, Symantec Corp., Security Response, 5 (2011)
7.
Zurück zum Zitat Han, D., Mo, Y., Wu, J., Weerakkody, S., Sinopoli, B., Shi, L.: Stochastic event-triggered sensor schedule for remote state estimation. IEEE Trans. Autom. Control 60(10), 2661–2675 (2015)MathSciNetCrossRef Han, D., Mo, Y., Wu, J., Weerakkody, S., Sinopoli, B., Shi, L.: Stochastic event-triggered sensor schedule for remote state estimation. IEEE Trans. Autom. Control 60(10), 2661–2675 (2015)MathSciNetCrossRef
8.
Zurück zum Zitat Heemels, W., Donkers, M., Teel, A.R.: Periodic event-triggered control for linear systems. IEEE Trans. Autom. Control 58(4), 847–861 (2013)MathSciNetCrossRefMATH Heemels, W., Donkers, M., Teel, A.R.: Periodic event-triggered control for linear systems. IEEE Trans. Autom. Control 58(4), 847–861 (2013)MathSciNetCrossRefMATH
9.
Zurück zum Zitat Hespanha, J.P., Naghshtabrizi, P., Xu, Y.: A survey of recent results in networked control systems. Proc. IEEE 95(1), 138 (2007)CrossRef Hespanha, J.P., Naghshtabrizi, P., Xu, Y.: A survey of recent results in networked control systems. Proc. IEEE 95(1), 138 (2007)CrossRef
10.
Zurück zum Zitat Ke-You, Y., Li-Hua, X.: Survey of recent progress in networked control systems. Acta Autom. Sinica 39(2), 101–117 (2013)MathSciNetCrossRef Ke-You, Y., Li-Hua, X.: Survey of recent progress in networked control systems. Acta Autom. Sinica 39(2), 101–117 (2013)MathSciNetCrossRef
11.
Zurück zum Zitat Kim, K.-D., Kumar, P.R.: Cyber-physical systems: a perspective at the centennial. Proc. IEEE 100(Special Centennial Issue), 1287–1308 (2012)CrossRef Kim, K.-D., Kumar, P.R.: Cyber-physical systems: a perspective at the centennial. Proc. IEEE 100(Special Centennial Issue), 1287–1308 (2012)CrossRef
12.
Zurück zum Zitat Mo, Y., Garone, E., Casavola, A., Sinopoli, B.: False data injection attacks against state estimation in wireless sensor networks. In: 2010 49th IEEE Conference on Decision and Control (CDC), pp. 5967–5972. IEEE (2010) Mo, Y., Garone, E., Casavola, A., Sinopoli, B.: False data injection attacks against state estimation in wireless sensor networks. In: 2010 49th IEEE Conference on Decision and Control (CDC), pp. 5967–5972. IEEE (2010)
13.
Zurück zum Zitat Mo, Y., Weerakkody, S., Sinopoli, B.: Physical authentication of control systems: designing watermarked control inputs to detect counterfeit sensor outputs. IEEE Control Syst. 35(1), 93–109 (2015)MathSciNetCrossRef Mo, Y., Weerakkody, S., Sinopoli, B.: Physical authentication of control systems: designing watermarked control inputs to detect counterfeit sensor outputs. IEEE Control Syst. 35(1), 93–109 (2015)MathSciNetCrossRef
14.
Zurück zum Zitat Natke, H.: System identification: Torsten Söderström and Petre Stoica. Automatica 28(5), 1069–1071 (1992)CrossRef Natke, H.: System identification: Torsten Söderström and Petre Stoica. Automatica 28(5), 1069–1071 (1992)CrossRef
15.
Zurück zum Zitat Pasqualetti, F., Dorfler, F., Bullo, F.: Cyber-physical security via geometric control: distributed monitoring and malicious attacks. In: 2012 IEEE 51st Annual Conference on Decision and Control, pp. 3418–3425. IEEE (2012) Pasqualetti, F., Dorfler, F., Bullo, F.: Cyber-physical security via geometric control: distributed monitoring and malicious attacks. In: 2012 IEEE 51st Annual Conference on Decision and Control, pp. 3418–3425. IEEE (2012)
16.
Zurück zum Zitat Rubio-Hernan, J., De Cicco, L., Garcia-Alfaro, J.: Revisiting a watermark-based detection scheme to handle cyber-physical attacks. In: 11th International Conference on Availability, Reliability and Security, Salzburg, Austria. IEEE (2016) Rubio-Hernan, J., De Cicco, L., Garcia-Alfaro, J.: Revisiting a watermark-based detection scheme to handle cyber-physical attacks. In: 11th International Conference on Availability, Reliability and Security, Salzburg, Austria. IEEE (2016)
17.
Zurück zum Zitat Salt, J., Casanova, V., Cuenca, A., Pizá, R.: Sistemas de control basados en red modelado y diseño de estructuras de control. Rev. Iberoamericana de Autom. e Informática Ind. RIAI 5(3), 5–20 (2008)CrossRef Salt, J., Casanova, V., Cuenca, A., Pizá, R.: Sistemas de control basados en red modelado y diseño de estructuras de control. Rev. Iberoamericana de Autom. e Informática Ind. RIAI 5(3), 5–20 (2008)CrossRef
18.
Zurück zum Zitat Smith, R.: Covert misappropriation of networked control systems: presenting a feedback structure. IEEE Control Syst. 35(1), 82–92 (2015)MathSciNetCrossRef Smith, R.: Covert misappropriation of networked control systems: presenting a feedback structure. IEEE Control Syst. 35(1), 82–92 (2015)MathSciNetCrossRef
19.
Zurück zum Zitat Teixeira, A., Shames, I., Sandberg, H., Johansson, K.H.: A secure control framework for resource-limited adversaries. Automatica 51, 135–148 (2015)MathSciNetCrossRefMATH Teixeira, A., Shames, I., Sandberg, H., Johansson, K.H.: A secure control framework for resource-limited adversaries. Automatica 51, 135–148 (2015)MathSciNetCrossRefMATH
20.
Zurück zum Zitat Tripathi, S., Ikbal, M.A.: Step size optimization of lms algorithm using aunt colony optimization and its comparison with particle swarm optimization algorithm in system identification (2015) Tripathi, S., Ikbal, M.A.: Step size optimization of lms algorithm using aunt colony optimization and its comparison with particle swarm optimization algorithm in system identification (2015)
21.
Zurück zum Zitat Weerakkody, S., Mo, Y., Sinopoli, B.: Detecting integrity attacks on control systems using robust physical watermarking. In: Proceedings of Decision and Control (2014) Weerakkody, S., Mo, Y., Sinopoli, B.: Detecting integrity attacks on control systems using robust physical watermarking. In: Proceedings of Decision and Control (2014)
Metadaten
Titel
Event-Triggered Watermarking Control to Handle Cyber-Physical Integrity Attacks
verfasst von
Jose Rubio-Hernan
Luca De Cicco
Joaquin Garcia-Alfaro
Copyright-Jahr
2016
DOI
https://doi.org/10.1007/978-3-319-47560-8_1

Premium Partner