Detection of Cyber Attacks in Encrypted Control Systems

被引:6
作者
Fauser, Moritz [1 ]
Zhang, Ping [1 ]
机构
[1] Univ Kaiserslautern, Inst Automat Control, D-67653 Kaiserslautern, Germany
来源
IEEE CONTROL SYSTEMS LETTERS | 2022年 / 6卷
关键词
Cryptography; Resilience; Control systems; Quantization (signal); Additives; Homomorphic encryption; Process control; Fault detection; networked control systems; control over communications; SECURE;
D O I
10.1109/LCSYS.2022.3155263
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recently a resilient homomorphic encryption (RHE) scheme has been proposed in [1], which allows not only to carry out the evaluation process of an output feedback controller in an encrypted environment but also can neutralize the effect of additive attacks injected into the ciphertexts. However, the resilience to additive attacks has its limits. In this letter, at first it will be shown that the resilience range of the RHE scheme to additive attacks is indeed much larger than shown in [1]. Then, a detection approach is proposed to give a twofold protection to control systems encrypted by the RHE scheme. A warning signal is triggered as soon as an additive attack is injected into the ciphertexts transmitted over the network, while an alarm signal is triggered when the attack is outside of the resilience range. This is achieved by exploiting the symmetric property of the inner product. Therefore, the RHE scheme can be combined with the proposed detection approach to ensure the integrity of the signals obtained after decryption in case of additive attacks. A simulation example of the well-established quadruple-tank benchmark process is used to demonstrate the proposed detection approach for encrypted control systems.
引用
收藏
页码:2365 / 2370
页数:6
相关论文
共 18 条
[1]  
Abdalla M, 2001, LECT NOTES COMPUT SC, V2020, P143
[2]  
Andress J, 2014, BASICS INFORM SECURI
[3]  
[Anonymous], 2001, P CRYPTOGRAPHY CODIN
[4]  
Baba R., 2018, P SICE ANN C, P244
[5]   Toward a Secure Drone System: Flying With Real-Time Homomorphic Authenticated Encryption [J].
Cheon, Jung Hee ;
Han, Kyoohyung ;
Hong, Seong-Min ;
Kim, Hyoun Jin ;
Kim, Junsoo ;
Kim, Suseong ;
Seo, Hosung ;
Shim, Hyungbo ;
Song, Yongsoo .
IEEE ACCESS, 2018, 6 :24325-24339
[6]  
Chong MS, 2019, 2019 18TH EUROPEAN CONTROL CONFERENCE (ECC), P968, DOI [10.23919/ecc.2019.8795652, 10.23919/ECC.2019.8795652]
[7]   Encrypted Cooperative Control Based on Structured Feedback [J].
Darup, Moritz Schulze ;
Redder, Adrian ;
Quevedo, Daniel E. .
IEEE CONTROL SYSTEMS LETTERS, 2019, 3 (01) :37-42
[8]   Practical homomorphic encryption over the integers for secure computation in the cloud [J].
Dyer, James ;
Dyer, Martin ;
Xu, Jie .
INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2019, 18 (05) :549-579
[9]   A PUBLIC KEY CRYPTOSYSTEM AND A SIGNATURE SCHEME BASED ON DISCRETE LOGARITHMS [J].
ELGAMAL, T .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1985, 31 (04) :469-472
[10]   Secure and private control using semi-homomorphic encryption [J].
Farokhi, Farhad ;
Shames, Iman ;
Batterham, Nathan .
CONTROL ENGINEERING PRACTICE, 2017, 67 :13-20