Model verification of fallback control system under cyberattacks via UPPAAL

被引:5
作者
Sakata, Kousei [1 ]
Fujita, Shintaro [2 ]
Sawada, Kenji [2 ]
Iwasawa, Hiroshi [1 ]
Endoh, Hiromichi [1 ]
Matsumoto, Noritaka [1 ]
机构
[1] Hitachi Ltd, Res & Dev Grp, Ibaraki, Japan
[2] Univ Electrocommun, Dept Mech Engn & Intelligent Syst, Tokyo, Japan
关键词
Control system security; fallback control system; model verification; UPPAAL;
D O I
10.1080/01691864.2022.2134737
中图分类号
TP24 [机器人技术];
学科分类号
080202 ; 1405 ;
摘要
Industrial control systems (ICS) are required to be operated safely under cyberattacks. Fallback control is necessary for the safe operation of ICS. As one of fallback control systems, we develop a resilient third-party monitoring system. This system consists of Programmable Logic Controllers (PLCs) for normal control and for fallback control. The normal PLC controls field devices, and the fallback PLC takes over the control after the normal PLC is attacked. The fallback control of this paper is the control takeover of a robot arm control system. To quickly transition to this fallback control, it is necessary to incorporate a supervisor function to manage each PLC function in an integrated manner. This paper aims to propose a modeling method of ICS functions and its analysis method to ensure that the supervisor can work properly under cyberattacks. For modeling, we use UPPAAL, specializing in formal verification by timed automata. We implement the models of each PLC and supervisor on UPPAAL. To quantitatively analyze whether the supervisor can really realize the incident response during cyberattacks, we give the specifications necessary for fallback control to the supervisor model using Timed Computation Tree Logic (TCTL) and verify its feasibility.
引用
收藏
页码:156 / 168
页数:13
相关论文
共 24 条
[1]   Analysis of Machine Learning Methods in EtherCAT-Based Anomaly Detection [J].
Akpinar, Kevser Ovaz ;
Ozcelik, Ibrahim .
IEEE ACCESS, 2019, 7 :184365-184374
[2]   A THEORY OF TIMED AUTOMATA [J].
ALUR, R ;
DILL, DL .
THEORETICAL COMPUTER SCIENCE, 1994, 126 (02) :183-235
[3]   MODEL-CHECKING IN DENSE REAL-TIME [J].
ALUR, R ;
COURCOUBETIS, C ;
DILL, D .
INFORMATION AND COMPUTATION, 1993, 104 (01) :2-34
[4]  
[Anonymous], FALLBACK CONTROL DOS
[5]  
DRAGOS INC. CRASHOVERRIDE, AN THREAT EL GRID OP
[6]  
Hata K, 2018, IEEE IND ELEC, P5963, DOI 10.1109/IECON.2018.8592923
[7]  
Kuze N., 2020, ICCPS, P194
[8]   The 2015 Ukraine Blackout: Implications for False Data Injection Attacks [J].
Liang, Gaoqi ;
Weller, Steven R. ;
Zhao, Junhua ;
Luo, Fengji ;
Dong, Zhao Yang .
IEEE TRANSACTIONS ON POWER SYSTEMS, 2017, 32 (04) :3317-3318
[9]   Optimal Secret Protections in Discrete-Event Systems [J].
Ma, Ziyue ;
Cai, Kai .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2022, 67 (06) :2816-2828
[10]  
Matsui S., 2021, J SOC INSTR CONTROL, V60, P14