Analysis of Cyber Physical Systems Security Via Networked Attacks

被引:0
作者
Ge, Hui [1 ,2 ]
Yue, Dong [1 ,2 ]
Xie, Xiang-peng [2 ]
Deng, Song [2 ]
Zhang, Yan [3 ]
机构
[1] Nanjing Univ Posts & Telecommun, Sch Automat Engn, Nanjing 210023, Jiangsu, Peoples R China
[2] Nanjing Univ Posts & Telecommun, Inst Adv Technol, Nanjing 210023, Jiangsu, Peoples R China
[3] Nanjing Univ Posts & Telecommun, Sch Elect Sci & Engn, Nanjing 210023, Jiangsu, Peoples R China
来源
PROCEEDINGS OF THE 36TH CHINESE CONTROL CONFERENCE (CCC 2017) | 2017年
关键词
Cyber Physical Systems; Networked Control System; Security Control; Denial-of-service; Stealth Attack;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, cyber physical system is analyzed from security perspective. A double closed-loop security control structure and algorithm with defense functions is proposed. From this structure, the features of several cyber attacks are considered respectively. By this structure, the models of information disclosure, denial-of-service (DoS) and Man-in-the-Middle Attack (MITM) are proposed. According to each kind attack, different models are obtained and analyzed, then reduce to the unified models. Based on this, system security conditions are obtained, and a defense scenario with detail algorithm is design to illustrate the implementation of this program.
引用
收藏
页码:4266 / 4272
页数:7
相关论文
共 26 条
[1]   A Methodological Approach for Assessing Amplified Reflection Distributed Denial of Service on the Internet of Things [J].
Costa Gondim, Joao Jose ;
Albuquerque, Robson de Oliveira ;
Alves Nascimento, Anderson Clayton ;
Garcia Villalba, Luis Javier ;
Kim, Tai-Hoon .
SENSORS, 2016, 16 (11)
[2]  
De Persis C., 2014, IFAC P, V47, P134, DOI DOI 10.3182/20140824-6-ZA-1003.02184
[3]   Input-to-State Stabilizing Control Under Denial-of-Service [J].
De Persis, Claudio ;
Tesi, Pietro .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2015, 60 (11) :2930-2944
[4]  
Ding S., 2008, MODEL BASED FAULT DI
[5]  
Dolk V., 2015, EVENT BASED CONTROL, P1
[6]   Cyberphysical Security in Networked Control Systems [J].
How, Jonathan P. .
IEEE CONTROL SYSTEMS MAGAZINE, 2015, 35 (01) :8-12
[7]   A Survey of Fault Detection, Isolation, and Reconfiguration Methods [J].
Hwang, Inseok ;
Kim, Sungwan ;
Kim, Youdan ;
Seah, Chze Eng .
IEEE TRANSACTIONS ON CONTROL SYSTEMS TECHNOLOGY, 2010, 18 (03) :636-653
[8]  
Knapp E., 2011, Industrial Network Security: Securing critical infrastructure networks for smart grid, SCADA, and other Industrial Control Systems
[9]  
Li H. B., 2008, P 17 WORLD C INT FED, P12575
[10]   PHYSICAL AUTHENTICATION OF CONTROL SYSTEMS DESIGNING WATERMARKED CONTROL INPUTS TO DETECT COUNTERFEIT SENSOR OUTPUTS [J].
Mo, Yilin ;
Weerakkody, Sean ;
Sinopoli, Bruno .
IEEE CONTROL SYSTEMS MAGAZINE, 2015, 35 (01) :93-109