Attack-tolerant networked control system ...
Type de document :
Autre communication scientifique (congrès sans actes - poster - séminaire...): Communication dans un congrès avec actes
Titre :
Attack-tolerant networked control system in presence of the controller hijacking attack
Auteur(s) :
Yaseen, Amer [Auteur]
Centre de Recherche en Informatique, Signal et Automatique de Lille - UMR 9189 [CRIStAL]
Diagnostic, Commande et Observation pour des systèmes Tolérants aux fautes [DiCOT]
Merchez, Mireille [Auteur]
Centre de Recherche en Informatique, Signal et Automatique de Lille - UMR 9189 [CRIStAL]
Diagnostic, Commande et Observation pour des systèmes Tolérants aux fautes [DiCOT]
Centre de Recherche en Informatique, Signal et Automatique de Lille - UMR 9189 [CRIStAL]
Diagnostic, Commande et Observation pour des systèmes Tolérants aux fautes [DiCOT]
Merchez, Mireille [Auteur]
Centre de Recherche en Informatique, Signal et Automatique de Lille - UMR 9189 [CRIStAL]
Diagnostic, Commande et Observation pour des systèmes Tolérants aux fautes [DiCOT]
Titre de la manifestation scientifique :
2016 International Conference on Military Communications and Information Systems (ICMCIS),
Organisateur(s) de la manifestation scientifique :
Royal Military Academy, Royal Higher Institute for Defence
Ville :
Bruxelles
Pays :
Belgique
Date de début de la manifestation scientifique :
2016-05-24
Date de publication :
2016-06
Mot(s)-clé(s) en anglais :
predictive control
Networked Control System (NCS)
attack-tolerant
Stuxnet
controller hijacking
Networked Control System (NCS)
attack-tolerant
Stuxnet
controller hijacking
Discipline(s) HAL :
Informatique [cs]/Automatique
Informatique [cs]/Systèmes et contrôle [cs.SY]
Informatique [cs]/Systèmes et contrôle [cs.SY]
Résumé en anglais : [en]
In this paper, an enhancement for the attacktolerant scheme in the Networked Control System (NCS) is introduced. The objective is to be able to react to an attack such as the Stuxnet case where the controller is reprogrammed ...
Lire la suite >In this paper, an enhancement for the attacktolerant scheme in the Networked Control System (NCS) is introduced. The objective is to be able to react to an attack such as the Stuxnet case where the controller is reprogrammed and hijacked. The advantage of this proposed approach is that there is no need for a priori mathematical model of the controller. In order to implement the proposed scheme, a specific detector for the controller hijacking attack is designed. The performance of this scheme is evaluated be connected the detector to NCS with basic security elements such as Data Encryption Standard (DES), Message Digest (MD5), and timestamp. The test results of the proposed method show that the hijacked controller can be significantly detected and recovered.Lire moins >
Lire la suite >In this paper, an enhancement for the attacktolerant scheme in the Networked Control System (NCS) is introduced. The objective is to be able to react to an attack such as the Stuxnet case where the controller is reprogrammed and hijacked. The advantage of this proposed approach is that there is no need for a priori mathematical model of the controller. In order to implement the proposed scheme, a specific detector for the controller hijacking attack is designed. The performance of this scheme is evaluated be connected the detector to NCS with basic security elements such as Data Encryption Standard (DES), Message Digest (MD5), and timestamp. The test results of the proposed method show that the hijacked controller can be significantly detected and recovered.Lire moins >
Langue :
Anglais
Comité de lecture :
Oui
Audience :
Internationale
Vulgarisation :
Non
Collections :
Source :