Alternative Actuation Paths for Ship Applications in the Presence of Cyber-Attacks

被引:0
|
作者
Croteau, Brien [1 ]
Robucci, Ryan [1 ]
Patel, Chintan [1 ]
Banerjee, Nilanjan [1 ]
Kiriakidis, Kiriakos [2 ]
Severson, Tracie [2 ]
Rodriguez-Seda, Erick [2 ]
机构
[1] Univ Maryland Baltimore Cty, Dept Comp Sci & Elect Engn, Baltimore, MD 21228 USA
[2] US Naval Acad, Dept Weap Robot & Control Engn, Annapolis, MD 21402 USA
来源
2019 RESILIENCE WEEK (RWS) | 2019年
关键词
PHYSICAL SYSTEMS;
D O I
10.1109/rws47064.2019.8972006
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Safety-critical Cyber-Physical Systems (CPS) always need to maintain operational normalcy, which may include reconfiguring the control system in response to cyber threats. This paper studies three different approaches to determine when redundancies in control and actuation exist and identify alternative actuation paths that keep the system operating safely in the event of an attack to the primary actuation path. The first two approaches use classical control tools in system identification to determine potential inputs based on the desired force traces, while the third employs a supervised learning algorithm. The three methods are then experimentally compared on a small-scale naval ship testbed. The testbed, although compact, allows the easy and fast evaluation of different control routines for CPS. Laboratory experimental results, when the rudder has been attacked, demonstrate the accuracy of all three approaches in determining correct alternative actuation paths and comparisons among the strategies are drawn.
引用
收藏
页码:91 / 97
页数:7
相关论文
共 50 条
  • [31] Identification and Localization of Cyber-Attacks in Industrial Facilities
    Reibelt, Kathrin
    Matthes, Joerg
    Keller, Hubert B.
    Hagenmeyer, Veit
    30TH EUROPEAN SYMPOSIUM ON COMPUTER AIDED PROCESS ENGINEERING, PTS A-C, 2020, 48 : 1741 - 1746
  • [32] Modeling cyber-attacks on Industrial Control Systems
    Paliath, Vivin
    Shakarian, Paulo
    IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS: CYBERSECURITY AND BIG DATA, 2016, : 316 - 318
  • [33] Autonomous Vehicle Cyber-Attacks Classification Framework
    Aref, Yazan
    Ouda, Abdelkader
    2023 15TH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS & NETWORKS, COMSNETS, 2023,
  • [34] Cyber-attacks on health-care systems
    Devi, Sharmila
    LANCET ONCOLOGY, 2023, 24 (04): : 148 - 148
  • [35] Social Engineering Based Cyber-Attacks in Kenya
    Obuhuma, James
    Zivuku, Shingai
    2020 IST-AFRICA CONFERENCE (IST-AFRICA), 2020,
  • [36] Analysis of Cyber-Attacks on IEC 61850 Networks
    Elgargouri, Ahmed
    Elmusrati, Mohammed
    2017 11TH IEEE INTERNATIONAL CONFERENCE ON APPLICATION OF INFORMATION AND COMMUNICATION TECHNOLOGIES (AICT 2017), 2017, : 252 - 255
  • [37] Defending Against Cyber-Attacks on the Internet of Things
    Abdalrahman, Ghazi Abdalla
    Varol, Hacer
    2019 7TH INTERNATIONAL SYMPOSIUM ON DIGITAL FORENSICS AND SECURITY (ISDFS), 2019,
  • [38] Detection of Cyber-Attacks in Collaborative Intersection Control
    Keijzer, Twan
    Jarmolowitz, Fabian
    Ferrari, Riccardo M. G.
    2021 EUROPEAN CONTROL CONFERENCE (ECC), 2021, : 62 - 67
  • [39] On Cyber-attacks Mitigation for Distributed Trajectory Generators
    Al-Rawashdeh, Yazan M.
    Al Janaideh, Mohammad
    2023 IEEE/RSJ INTERNATIONAL CONFERENCE ON INTELLIGENT ROBOTS AND SYSTEMS (IROS), 2023, : 9205 - 9210
  • [40] Resilient Distributed Optimization Against Cyber-Attacks
    Gusrialdi, Azwirman
    Qu, Zhihua
    IEEE CONTROL SYSTEMS LETTERS, 2023, 7 : 3956 - 3961