Attack-Tolerant Networked Control System ...
Document type :
Autre communication scientifique (congrès sans actes - poster - séminaire...): Communication dans un congrès avec actes
Title :
Attack-Tolerant Networked Control System Based on the Deception for the Cyber-Attacks
Author(s) :
Yaseen, Amer [Auteur]
Diagnostic, Commande et Observation pour des systèmes Tolérants aux fautes [DiCOT]
Centre de Recherche en Informatique, Signal et Automatique de Lille - UMR 9189 [CRIStAL]
Merchez, Mireille [Auteur]
Diagnostic, Commande et Observation pour des systèmes Tolérants aux fautes [DiCOT]
Centre de Recherche en Informatique, Signal et Automatique de Lille - UMR 9189 [CRIStAL]
Diagnostic, Commande et Observation pour des systèmes Tolérants aux fautes [DiCOT]
Centre de Recherche en Informatique, Signal et Automatique de Lille - UMR 9189 [CRIStAL]
Merchez, Mireille [Auteur]

Diagnostic, Commande et Observation pour des systèmes Tolérants aux fautes [DiCOT]
Centre de Recherche en Informatique, Signal et Automatique de Lille - UMR 9189 [CRIStAL]
Conference title :
World Congress on Industrial Control Systems Security (WCICSS-2015)
City :
London
Country :
Royaume-Uni
Start date of the conference :
2015-12-14
English keyword(s) :
attack-tolerant
Networked Control System (NCS)
security mechanism
Networked Control System (NCS)
security mechanism
HAL domain(s) :
Informatique [cs]/Automatique
Informatique [cs]/Systèmes et contrôle [cs.SY]
Informatique [cs]/Systèmes et contrôle [cs.SY]
English abstract : [en]
In this paper, we propose a new security mechanism for networked control system, which has the ability to stopping the cyber-attacks. In addition, the proposed mechanism provides the last line of defense when its encryption ...
Show more >In this paper, we propose a new security mechanism for networked control system, which has the ability to stopping the cyber-attacks. In addition, the proposed mechanism provides the last line of defense when its encryption is broken. This defensive line is called “Attack-Tolerant” and it is based on the deception for the cyber-attacks. The attack-tolerant scheme is able to making the attacker believes that he has achieved the desired goal and as a result, the attacker stops the attack method improvement. Furthermore, there is an indication for the attacks will be included within the sensor reading which will be sent from the remote plant side to the local controller side. In order to implement the proposed mechanism, a specific algorithm will be designed along with Data Encryption Standard (DES), Message Digest (MD5), timestamp, and the mathematical model of the plant with acceptable limit of uncertainty. The simulation results of the proposed mechanism have been found to be satisfactory.Show less >
Show more >In this paper, we propose a new security mechanism for networked control system, which has the ability to stopping the cyber-attacks. In addition, the proposed mechanism provides the last line of defense when its encryption is broken. This defensive line is called “Attack-Tolerant” and it is based on the deception for the cyber-attacks. The attack-tolerant scheme is able to making the attacker believes that he has achieved the desired goal and as a result, the attacker stops the attack method improvement. Furthermore, there is an indication for the attacks will be included within the sensor reading which will be sent from the remote plant side to the local controller side. In order to implement the proposed mechanism, a specific algorithm will be designed along with Data Encryption Standard (DES), Message Digest (MD5), timestamp, and the mathematical model of the plant with acceptable limit of uncertainty. The simulation results of the proposed mechanism have been found to be satisfactory.Show less >
Language :
Anglais
Peer reviewed article :
Oui
Audience :
Internationale
Popular science :
Non
Collections :
Source :