Detection of Cyber Attacks in Encrypted Control Systems

被引:6
作者
Fauser, Moritz [1 ]
Zhang, Ping [1 ]
机构
[1] Univ Kaiserslautern, Inst Automat Control, D-67653 Kaiserslautern, Germany
来源
IEEE CONTROL SYSTEMS LETTERS | 2022年 / 6卷
关键词
Cryptography; Resilience; Control systems; Quantization (signal); Additives; Homomorphic encryption; Process control; Fault detection; networked control systems; control over communications; SECURE;
D O I
10.1109/LCSYS.2022.3155263
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recently a resilient homomorphic encryption (RHE) scheme has been proposed in [1], which allows not only to carry out the evaluation process of an output feedback controller in an encrypted environment but also can neutralize the effect of additive attacks injected into the ciphertexts. However, the resilience to additive attacks has its limits. In this letter, at first it will be shown that the resilience range of the RHE scheme to additive attacks is indeed much larger than shown in [1]. Then, a detection approach is proposed to give a twofold protection to control systems encrypted by the RHE scheme. A warning signal is triggered as soon as an additive attack is injected into the ciphertexts transmitted over the network, while an alarm signal is triggered when the attack is outside of the resilience range. This is achieved by exploiting the symmetric property of the inner product. Therefore, the RHE scheme can be combined with the proposed detection approach to ensure the integrity of the signals obtained after decryption in case of additive attacks. A simulation example of the well-established quadruple-tank benchmark process is used to demonstrate the proposed detection approach for encrypted control systems.
引用
收藏
页码:2365 / 2370
页数:6
相关论文
共 18 条
[11]  
Fauser M., DETECTION CYBER ATTA, P2022, DOI [10.36227/techrxiv.19071125, DOI 10.36227/TECHRXIV.19071125]
[12]  
Fauser M., 2021, P 60 IEEE C DEC CONT, P5634
[13]  
Gentry Craig, 2009, FULLY HOMOMORPHIC EN
[14]   The quadruple-tank process: A multivariable laboratory process with an adjustable zero [J].
Johansson, KH .
IEEE TRANSACTIONS ON CONTROL SYSTEMS TECHNOLOGY, 2000, 8 (03) :456-465
[15]  
Kogiso K, 2015, IEEE DECIS CONTR P, P6836, DOI 10.1109/CDC.2015.7403296
[16]   Discrete event models: Getting the semantics right [J].
Lee, Edward A. .
Proceedings of the 2006 Winter Simulation Conference, Vols 1-5, 2006, :1-1
[17]   Invariant approximations of the minimal robust. positively invariant set [J].
Rakovic, SV ;
Kerrigan, EC ;
Kouramas, KI ;
Mayne, DQ .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2005, 50 (03) :406-410
[18]   Secure and Privacy-Preserving Consensus [J].
Ruan, Minghao ;
Gao, Huan ;
Wang, Yongqiang .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2019, 64 (10) :4035-4049