Dynamic Network Path Provisioning and Selection for the Detection and Mitigation of Data Tampering Attacks in Networked Control Systems
Networked control systems can help build cost-effective and flexible industrial systems. A system that can function while being immune to cyberattacks is necessary. A method called fixed redundant path selection (FRPS) has been proposed to detect and mitigate data tampering attacks in a networked mo...
Gespeichert in:
Veröffentlicht in: | IEEE access 2021, Vol.9, p.147430-147441 |
---|---|
Hauptverfasser: | , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 147441 |
---|---|
container_issue | |
container_start_page | 147430 |
container_title | IEEE access |
container_volume | 9 |
creator | Aida, Kento Yamada, Kenta Hotchi, Ryosuke Kubo, Ryogo |
description | Networked control systems can help build cost-effective and flexible industrial systems. A system that can function while being immune to cyberattacks is necessary. A method called fixed redundant path selection (FRPS) has been proposed to detect and mitigate data tampering attacks in a networked motion control system. This system contains redundant forward network paths from the controller to the motor sides to detect the attacked path by comparing the values that are received through respective paths. Then, a path selector on the motor side chooses a value on the path that is not attacked based on the majority decision. Increasing the number of redundant paths improves the detection performance of simultaneous attacks against multiple paths. However, it also increases the amount of traffic because the same data are transmitted to all of the redundant paths. This study proposes a dynamic redundant path selection (DRPS) method to balance the detection performance and the amount of traffic. The proposed method initially applies three redundant paths and changes the number of redundant paths to five only when the path selector detects a difference among the received values for the three paths. The experiments confirm that the proposed DRPS outperforms the conventional FRPS. The former can detect and mitigate the data tampering attacks while reducing the number of network paths during tampering detection when the system is exposed to simultaneous attacks against up to two of the redundant paths. |
doi_str_mv | 10.1109/ACCESS.2021.3124024 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_crossref_primary_10_1109_ACCESS_2021_3124024</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>9592785</ieee_id><doaj_id>oai_doaj_org_article_19a8eee0fa0d4edeaa33828504d36217</doaj_id><sourcerecordid>2595722874</sourcerecordid><originalsourceid>FETCH-LOGICAL-c408t-abb4d2f55d0c0a8516e85ce53995f22d3a886d9b805f9790c00cdcae30777b503</originalsourceid><addsrcrecordid>eNpNUV1PGzEQPFWtVAT8Al4s8ZzUH-c7-zG60IIELVLos7Wx94JDcg62AeUX9G_X4VJUv9ienZld7VTVBaNTxqj-Nuu6q8ViyilnU8F4TXn9qTrhrNETIUXz-b_31-o8pTUtRxVItifVn_l-gK235CfmtxCfyD3kR3Ifw6tPPgx-WBEYHFngBm0uAOlDJPkRyRzzETnU73z2K3j_hp7MIQN5gO0O48FgljPYp0T88K8LOtKFIcewIYt9yrhNZ9WXHjYJz4_3afX7-9VDdz25_fXjppvdTmxNVZ7Aclk73kvpqKWgJGtQSYtSaC17zp0ApRqnl4rKXre6kKh1FlDQtm2XkorT6mb0dQHWZhf9FuLeBPDmHQhxZSBmbzdomAaFiLQH6mp0CCCE4krS2omGs7Z4XY5euxieXzBlsw4vcSjjGy7LdjlXbV1YYmTZGFKK2H90ZdQcAjRjgOYQoDkGWFQXo8qXET4UWmreKin-AuF9mEM</addsrcrecordid><sourcetype>Open Website</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2595722874</pqid></control><display><type>article</type><title>Dynamic Network Path Provisioning and Selection for the Detection and Mitigation of Data Tampering Attacks in Networked Control Systems</title><source>IEEE Open Access Journals</source><source>DOAJ Directory of Open Access Journals</source><source>EZB-FREE-00999 freely available EZB journals</source><creator>Aida, Kento ; Yamada, Kenta ; Hotchi, Ryosuke ; Kubo, Ryogo</creator><creatorcontrib>Aida, Kento ; Yamada, Kenta ; Hotchi, Ryosuke ; Kubo, Ryogo</creatorcontrib><description>Networked control systems can help build cost-effective and flexible industrial systems. A system that can function while being immune to cyberattacks is necessary. A method called fixed redundant path selection (FRPS) has been proposed to detect and mitigate data tampering attacks in a networked motion control system. This system contains redundant forward network paths from the controller to the motor sides to detect the attacked path by comparing the values that are received through respective paths. Then, a path selector on the motor side chooses a value on the path that is not attacked based on the majority decision. Increasing the number of redundant paths improves the detection performance of simultaneous attacks against multiple paths. However, it also increases the amount of traffic because the same data are transmitted to all of the redundant paths. This study proposes a dynamic redundant path selection (DRPS) method to balance the detection performance and the amount of traffic. The proposed method initially applies three redundant paths and changes the number of redundant paths to five only when the path selector detects a difference among the received values for the three paths. The experiments confirm that the proposed DRPS outperforms the conventional FRPS. The former can detect and mitigate the data tampering attacks while reducing the number of network paths during tampering detection when the system is exposed to simultaneous attacks against up to two of the redundant paths.</description><identifier>ISSN: 2169-3536</identifier><identifier>EISSN: 2169-3536</identifier><identifier>DOI: 10.1109/ACCESS.2021.3124024</identifier><identifier>CODEN: IAECCG</identifier><language>eng</language><publisher>Piscataway: IEEE</publisher><subject>Computer crime ; Control systems ; cyber-physical system ; Cyberattack ; DC motors ; Delay effects ; Delays ; Motion control ; Network control ; networked control system ; Provisioning ; Quantization (signal) ; Redundancy ; System effectiveness ; tampering detection ; Transfer functions</subject><ispartof>IEEE access, 2021, Vol.9, p.147430-147441</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2021</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c408t-abb4d2f55d0c0a8516e85ce53995f22d3a886d9b805f9790c00cdcae30777b503</citedby><cites>FETCH-LOGICAL-c408t-abb4d2f55d0c0a8516e85ce53995f22d3a886d9b805f9790c00cdcae30777b503</cites><orcidid>0000-0001-8141-9986</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/9592785$$EHTML$$P50$$Gieee$$Hfree_for_read</linktohtml><link.rule.ids>314,780,784,864,2102,4024,27633,27923,27924,27925,54933</link.rule.ids></links><search><creatorcontrib>Aida, Kento</creatorcontrib><creatorcontrib>Yamada, Kenta</creatorcontrib><creatorcontrib>Hotchi, Ryosuke</creatorcontrib><creatorcontrib>Kubo, Ryogo</creatorcontrib><title>Dynamic Network Path Provisioning and Selection for the Detection and Mitigation of Data Tampering Attacks in Networked Control Systems</title><title>IEEE access</title><addtitle>Access</addtitle><description>Networked control systems can help build cost-effective and flexible industrial systems. A system that can function while being immune to cyberattacks is necessary. A method called fixed redundant path selection (FRPS) has been proposed to detect and mitigate data tampering attacks in a networked motion control system. This system contains redundant forward network paths from the controller to the motor sides to detect the attacked path by comparing the values that are received through respective paths. Then, a path selector on the motor side chooses a value on the path that is not attacked based on the majority decision. Increasing the number of redundant paths improves the detection performance of simultaneous attacks against multiple paths. However, it also increases the amount of traffic because the same data are transmitted to all of the redundant paths. This study proposes a dynamic redundant path selection (DRPS) method to balance the detection performance and the amount of traffic. The proposed method initially applies three redundant paths and changes the number of redundant paths to five only when the path selector detects a difference among the received values for the three paths. The experiments confirm that the proposed DRPS outperforms the conventional FRPS. The former can detect and mitigate the data tampering attacks while reducing the number of network paths during tampering detection when the system is exposed to simultaneous attacks against up to two of the redundant paths.</description><subject>Computer crime</subject><subject>Control systems</subject><subject>cyber-physical system</subject><subject>Cyberattack</subject><subject>DC motors</subject><subject>Delay effects</subject><subject>Delays</subject><subject>Motion control</subject><subject>Network control</subject><subject>networked control system</subject><subject>Provisioning</subject><subject>Quantization (signal)</subject><subject>Redundancy</subject><subject>System effectiveness</subject><subject>tampering detection</subject><subject>Transfer functions</subject><issn>2169-3536</issn><issn>2169-3536</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2021</creationdate><recordtype>article</recordtype><sourceid>ESBDL</sourceid><sourceid>RIE</sourceid><sourceid>DOA</sourceid><recordid>eNpNUV1PGzEQPFWtVAT8Al4s8ZzUH-c7-zG60IIELVLos7Wx94JDcg62AeUX9G_X4VJUv9ienZld7VTVBaNTxqj-Nuu6q8ViyilnU8F4TXn9qTrhrNETIUXz-b_31-o8pTUtRxVItifVn_l-gK235CfmtxCfyD3kR3Ifw6tPPgx-WBEYHFngBm0uAOlDJPkRyRzzETnU73z2K3j_hp7MIQN5gO0O48FgljPYp0T88K8LOtKFIcewIYt9yrhNZ9WXHjYJz4_3afX7-9VDdz25_fXjppvdTmxNVZ7Aclk73kvpqKWgJGtQSYtSaC17zp0ApRqnl4rKXre6kKh1FlDQtm2XkorT6mb0dQHWZhf9FuLeBPDmHQhxZSBmbzdomAaFiLQH6mp0CCCE4krS2omGs7Z4XY5euxieXzBlsw4vcSjjGy7LdjlXbV1YYmTZGFKK2H90ZdQcAjRjgOYQoDkGWFQXo8qXET4UWmreKin-AuF9mEM</recordid><startdate>2021</startdate><enddate>2021</enddate><creator>Aida, Kento</creator><creator>Yamada, Kenta</creator><creator>Hotchi, Ryosuke</creator><creator>Kubo, Ryogo</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>ESBDL</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>7SR</scope><scope>8BQ</scope><scope>8FD</scope><scope>JG9</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>DOA</scope><orcidid>https://orcid.org/0000-0001-8141-9986</orcidid></search><sort><creationdate>2021</creationdate><title>Dynamic Network Path Provisioning and Selection for the Detection and Mitigation of Data Tampering Attacks in Networked Control Systems</title><author>Aida, Kento ; Yamada, Kenta ; Hotchi, Ryosuke ; Kubo, Ryogo</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c408t-abb4d2f55d0c0a8516e85ce53995f22d3a886d9b805f9790c00cdcae30777b503</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2021</creationdate><topic>Computer crime</topic><topic>Control systems</topic><topic>cyber-physical system</topic><topic>Cyberattack</topic><topic>DC motors</topic><topic>Delay effects</topic><topic>Delays</topic><topic>Motion control</topic><topic>Network control</topic><topic>networked control system</topic><topic>Provisioning</topic><topic>Quantization (signal)</topic><topic>Redundancy</topic><topic>System effectiveness</topic><topic>tampering detection</topic><topic>Transfer functions</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Aida, Kento</creatorcontrib><creatorcontrib>Yamada, Kenta</creatorcontrib><creatorcontrib>Hotchi, Ryosuke</creatorcontrib><creatorcontrib>Kubo, Ryogo</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE Open Access Journals</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics & Communications Abstracts</collection><collection>Engineered Materials Abstracts</collection><collection>METADEX</collection><collection>Technology Research Database</collection><collection>Materials Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>DOAJ Directory of Open Access Journals</collection><jtitle>IEEE access</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Aida, Kento</au><au>Yamada, Kenta</au><au>Hotchi, Ryosuke</au><au>Kubo, Ryogo</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Dynamic Network Path Provisioning and Selection for the Detection and Mitigation of Data Tampering Attacks in Networked Control Systems</atitle><jtitle>IEEE access</jtitle><stitle>Access</stitle><date>2021</date><risdate>2021</risdate><volume>9</volume><spage>147430</spage><epage>147441</epage><pages>147430-147441</pages><issn>2169-3536</issn><eissn>2169-3536</eissn><coden>IAECCG</coden><abstract>Networked control systems can help build cost-effective and flexible industrial systems. A system that can function while being immune to cyberattacks is necessary. A method called fixed redundant path selection (FRPS) has been proposed to detect and mitigate data tampering attacks in a networked motion control system. This system contains redundant forward network paths from the controller to the motor sides to detect the attacked path by comparing the values that are received through respective paths. Then, a path selector on the motor side chooses a value on the path that is not attacked based on the majority decision. Increasing the number of redundant paths improves the detection performance of simultaneous attacks against multiple paths. However, it also increases the amount of traffic because the same data are transmitted to all of the redundant paths. This study proposes a dynamic redundant path selection (DRPS) method to balance the detection performance and the amount of traffic. The proposed method initially applies three redundant paths and changes the number of redundant paths to five only when the path selector detects a difference among the received values for the three paths. The experiments confirm that the proposed DRPS outperforms the conventional FRPS. The former can detect and mitigate the data tampering attacks while reducing the number of network paths during tampering detection when the system is exposed to simultaneous attacks against up to two of the redundant paths.</abstract><cop>Piscataway</cop><pub>IEEE</pub><doi>10.1109/ACCESS.2021.3124024</doi><tpages>12</tpages><orcidid>https://orcid.org/0000-0001-8141-9986</orcidid><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 2169-3536 |
ispartof | IEEE access, 2021, Vol.9, p.147430-147441 |
issn | 2169-3536 2169-3536 |
language | eng |
recordid | cdi_crossref_primary_10_1109_ACCESS_2021_3124024 |
source | IEEE Open Access Journals; DOAJ Directory of Open Access Journals; EZB-FREE-00999 freely available EZB journals |
subjects | Computer crime Control systems cyber-physical system Cyberattack DC motors Delay effects Delays Motion control Network control networked control system Provisioning Quantization (signal) Redundancy System effectiveness tampering detection Transfer functions |
title | Dynamic Network Path Provisioning and Selection for the Detection and Mitigation of Data Tampering Attacks in Networked Control Systems |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-22T08%3A04%3A14IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Dynamic%20Network%20Path%20Provisioning%20and%20Selection%20for%20the%20Detection%20and%20Mitigation%20of%20Data%20Tampering%20Attacks%20in%20Networked%20Control%20Systems&rft.jtitle=IEEE%20access&rft.au=Aida,%20Kento&rft.date=2021&rft.volume=9&rft.spage=147430&rft.epage=147441&rft.pages=147430-147441&rft.issn=2169-3536&rft.eissn=2169-3536&rft.coden=IAECCG&rft_id=info:doi/10.1109/ACCESS.2021.3124024&rft_dat=%3Cproquest_cross%3E2595722874%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2595722874&rft_id=info:pmid/&rft_ieee_id=9592785&rft_doaj_id=oai_doaj_org_article_19a8eee0fa0d4edeaa33828504d36217&rfr_iscdi=true |