Attack-tolerant networked control system ...
Document type :
Autre communication scientifique (congrès sans actes - poster - séminaire...): Communication dans un congrès avec actes
Title :
Attack-tolerant networked control system in presence of the controller hijacking attack
Author(s) :
Yaseen, Amer [Auteur]
Centre de Recherche en Informatique, Signal et Automatique de Lille - UMR 9189 [CRIStAL]
Diagnostic, Commande et Observation pour des systèmes Tolérants aux fautes [DiCOT]
Merchez, Mireille [Auteur]
Centre de Recherche en Informatique, Signal et Automatique de Lille - UMR 9189 [CRIStAL]
Diagnostic, Commande et Observation pour des systèmes Tolérants aux fautes [DiCOT]
Centre de Recherche en Informatique, Signal et Automatique de Lille - UMR 9189 [CRIStAL]
Diagnostic, Commande et Observation pour des systèmes Tolérants aux fautes [DiCOT]
Merchez, Mireille [Auteur]
Centre de Recherche en Informatique, Signal et Automatique de Lille - UMR 9189 [CRIStAL]
Diagnostic, Commande et Observation pour des systèmes Tolérants aux fautes [DiCOT]
Conference title :
2016 International Conference on Military Communications and Information Systems (ICMCIS),
Conference organizers(s) :
Royal Military Academy, Royal Higher Institute for Defence
City :
Bruxelles
Country :
Belgique
Start date of the conference :
2016-05-24
Publication date :
2016-06
English keyword(s) :
predictive control
Networked Control System (NCS)
attack-tolerant
Stuxnet
controller hijacking
Networked Control System (NCS)
attack-tolerant
Stuxnet
controller hijacking
HAL domain(s) :
Informatique [cs]/Automatique
Informatique [cs]/Systèmes et contrôle [cs.SY]
Informatique [cs]/Systèmes et contrôle [cs.SY]
English abstract : [en]
In this paper, an enhancement for the attacktolerant scheme in the Networked Control System (NCS) is introduced. The objective is to be able to react to an attack such as the Stuxnet case where the controller is reprogrammed ...
Show more >In this paper, an enhancement for the attacktolerant scheme in the Networked Control System (NCS) is introduced. The objective is to be able to react to an attack such as the Stuxnet case where the controller is reprogrammed and hijacked. The advantage of this proposed approach is that there is no need for a priori mathematical model of the controller. In order to implement the proposed scheme, a specific detector for the controller hijacking attack is designed. The performance of this scheme is evaluated be connected the detector to NCS with basic security elements such as Data Encryption Standard (DES), Message Digest (MD5), and timestamp. The test results of the proposed method show that the hijacked controller can be significantly detected and recovered.Show less >
Show more >In this paper, an enhancement for the attacktolerant scheme in the Networked Control System (NCS) is introduced. The objective is to be able to react to an attack such as the Stuxnet case where the controller is reprogrammed and hijacked. The advantage of this proposed approach is that there is no need for a priori mathematical model of the controller. In order to implement the proposed scheme, a specific detector for the controller hijacking attack is designed. The performance of this scheme is evaluated be connected the detector to NCS with basic security elements such as Data Encryption Standard (DES), Message Digest (MD5), and timestamp. The test results of the proposed method show that the hijacked controller can be significantly detected and recovered.Show less >
Language :
Anglais
Peer reviewed article :
Oui
Audience :
Internationale
Popular science :
Non
Collections :
Source :