Attack-Tolerant Networked Control System ...
Type de document :
Autre communication scientifique (congrès sans actes - poster - séminaire...): Communication dans un congrès avec actes
Titre :
Attack-Tolerant Networked Control System Based on the Deception for the Cyber-Attacks
Auteur(s) :
Yaseen, Amer [Auteur]
Diagnostic, Commande et Observation pour des systèmes Tolérants aux fautes [DiCOT]
Centre de Recherche en Informatique, Signal et Automatique de Lille - UMR 9189 [CRIStAL]
Merchez, Mireille [Auteur]
Diagnostic, Commande et Observation pour des systèmes Tolérants aux fautes [DiCOT]
Centre de Recherche en Informatique, Signal et Automatique de Lille - UMR 9189 [CRIStAL]
Diagnostic, Commande et Observation pour des systèmes Tolérants aux fautes [DiCOT]
Centre de Recherche en Informatique, Signal et Automatique de Lille - UMR 9189 [CRIStAL]
Merchez, Mireille [Auteur]

Diagnostic, Commande et Observation pour des systèmes Tolérants aux fautes [DiCOT]
Centre de Recherche en Informatique, Signal et Automatique de Lille - UMR 9189 [CRIStAL]
Titre de la manifestation scientifique :
World Congress on Industrial Control Systems Security (WCICSS-2015)
Ville :
London
Pays :
Royaume-Uni
Date de début de la manifestation scientifique :
2015-12-14
Mot(s)-clé(s) en anglais :
attack-tolerant
Networked Control System (NCS)
security mechanism
Networked Control System (NCS)
security mechanism
Discipline(s) HAL :
Informatique [cs]/Automatique
Informatique [cs]/Systèmes et contrôle [cs.SY]
Informatique [cs]/Systèmes et contrôle [cs.SY]
Résumé en anglais : [en]
In this paper, we propose a new security mechanism for networked control system, which has the ability to stopping the cyber-attacks. In addition, the proposed mechanism provides the last line of defense when its encryption ...
Lire la suite >In this paper, we propose a new security mechanism for networked control system, which has the ability to stopping the cyber-attacks. In addition, the proposed mechanism provides the last line of defense when its encryption is broken. This defensive line is called “Attack-Tolerant” and it is based on the deception for the cyber-attacks. The attack-tolerant scheme is able to making the attacker believes that he has achieved the desired goal and as a result, the attacker stops the attack method improvement. Furthermore, there is an indication for the attacks will be included within the sensor reading which will be sent from the remote plant side to the local controller side. In order to implement the proposed mechanism, a specific algorithm will be designed along with Data Encryption Standard (DES), Message Digest (MD5), timestamp, and the mathematical model of the plant with acceptable limit of uncertainty. The simulation results of the proposed mechanism have been found to be satisfactory.Lire moins >
Lire la suite >In this paper, we propose a new security mechanism for networked control system, which has the ability to stopping the cyber-attacks. In addition, the proposed mechanism provides the last line of defense when its encryption is broken. This defensive line is called “Attack-Tolerant” and it is based on the deception for the cyber-attacks. The attack-tolerant scheme is able to making the attacker believes that he has achieved the desired goal and as a result, the attacker stops the attack method improvement. Furthermore, there is an indication for the attacks will be included within the sensor reading which will be sent from the remote plant side to the local controller side. In order to implement the proposed mechanism, a specific algorithm will be designed along with Data Encryption Standard (DES), Message Digest (MD5), timestamp, and the mathematical model of the plant with acceptable limit of uncertainty. The simulation results of the proposed mechanism have been found to be satisfactory.Lire moins >
Langue :
Anglais
Comité de lecture :
Oui
Audience :
Internationale
Vulgarisation :
Non
Collections :
Source :