Encrypted Control for Networked Systems AN ILLUSTRATIVE INTRODUCTION AND CURRENT CHALLENGES

被引:74
作者
Darup, Moritz Schulze [1 ]
Alexandru, Andreea B. [2 ]
Quevedo, Daniel E. [3 ]
Pappas, George J. [4 ]
机构
[1] TU Dortmund Univ, Control & Cyberphys Syst, D-44227 Dortmund, Germany
[2] Univ Maryland, Coll Comp Math & Nat Sci, Dept Com Sci, College Pk, MD 20742 USA
[3] Queensland Univ Technol QUT, Sch Elect Engn & Robot, Cyberphys Syst, Brisbane, Qld 4000, Australia
[4] Univ Penn, Dept Elect & Syst Engn, Philadelphia, PA 19104 USA
来源
IEEE CONTROL SYSTEMS MAGAZINE | 2021年 / 41卷 / 03期
关键词
SECURE; COMPUTATION; STABILITY;
D O I
10.1109/MCS.2021.3062956
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Control systems are rapidly evolving to utilize modern computation and communication tools, such as cloud computing and geographically distributed networks, to improve performance, coverage, and scalability. However, control loops that outsource the computation of privacysensitive data to third-party platforms via public networks are already the subject of cyberattacks involving eaves-dropping and data manipulation. Encrypted control addresses this security gap and ensures the confidentiality of the processed data in the entire control loop by encrypting the information both at the level of transmission (across the network) and at the level of computation (on corrupted computing platforms). This article presents a tutorial-style introduction to this young but emerging field in the framework of secure control for networked dynamical systems with encrypted data. Its focus is on the steps for deriving the encrypted formulations of some specific control algorithms from the standard formulations and discussing the challenges arising in this process, ranging from privacy-aware conceptualizations to changes in computation flows and quantization issues. In conclusion, a list of open problems and new directions to explore is provided to consolidate the area of encrypted control.
引用
收藏
页码:58 / 78
页数:21
相关论文
共 95 条
  • [51] Istrrpanian R, 2012, DIGITAL CONTROLLER I
  • [52] Input-to-state stability for discrete-time nonlinear systems
    Jiang, ZP
    Wang, Y
    [J]. AUTOMATICA, 2001, 37 (06) : 857 - 869
  • [53] Joye Marc, 2013, FC 2013, P111, DOI DOI 10.1007/978-3-642-39884-110
  • [54] Katz J., 2014, Introduction to Modern Cryptography, V2nd
  • [55] Kim J, 2019, IEEE DECIS CONTR P, P7190, DOI [10.1109/CDC40024.2019.9029752, 10.1109/cdc40024.2019.9029752]
  • [56] Encrypting Controller using Fully Homomorphic Encryption for Security of Cyber-Physical Systems
    Kim, Junsoo
    Lee, Chanhwa
    Shim, Hyungbo
    Cheon, Jung Hee
    Kim, Andrey
    Kim, Miran
    Song, Yongsoo
    [J]. IFAC PAPERSONLINE, 2016, 49 (22): : 175 - 180
  • [57] Kishida M, 2018, IEEE DECIS CONTR P, P5850, DOI 10.1109/CDC.2018.8619855
  • [58] A survey of cyber security management in industrial control systems
    Knowles, William
    Prince, Daniel
    Hutchison, David
    Disso, Jules Ferdinand Pagna
    Jones, Kevin
    [J]. INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2015, 9 : 52 - 80
  • [59] Kogiso K, 2015, IEEE DECIS CONTR P, P6836, DOI 10.1109/CDC.2015.7403296
  • [60] Theory and computation of disturbance invariant sets for discrete-time linear systems
    Kolmanovsky, I
    Gilbert, EG
    [J]. MATHEMATICAL PROBLEMS IN ENGINEERING, 1998, 4 (04) : 317 - 367