Dynamic Network Path Provisioning and Selection for the Detection and Mitigation of Data Tampering Attacks in Networked Control Systems

Networked control systems can help build cost-effective and flexible industrial systems. A system that can function while being immune to cyberattacks is necessary. A method called fixed redundant path selection (FRPS) has been proposed to detect and mitigate data tampering attacks in a networked mo...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEEE access 2021, Vol.9, p.147430-147441
Hauptverfasser: Aida, Kento, Yamada, Kenta, Hotchi, Ryosuke, Kubo, Ryogo
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 147441
container_issue
container_start_page 147430
container_title IEEE access
container_volume 9
creator Aida, Kento
Yamada, Kenta
Hotchi, Ryosuke
Kubo, Ryogo
description Networked control systems can help build cost-effective and flexible industrial systems. A system that can function while being immune to cyberattacks is necessary. A method called fixed redundant path selection (FRPS) has been proposed to detect and mitigate data tampering attacks in a networked motion control system. This system contains redundant forward network paths from the controller to the motor sides to detect the attacked path by comparing the values that are received through respective paths. Then, a path selector on the motor side chooses a value on the path that is not attacked based on the majority decision. Increasing the number of redundant paths improves the detection performance of simultaneous attacks against multiple paths. However, it also increases the amount of traffic because the same data are transmitted to all of the redundant paths. This study proposes a dynamic redundant path selection (DRPS) method to balance the detection performance and the amount of traffic. The proposed method initially applies three redundant paths and changes the number of redundant paths to five only when the path selector detects a difference among the received values for the three paths. The experiments confirm that the proposed DRPS outperforms the conventional FRPS. The former can detect and mitigate the data tampering attacks while reducing the number of network paths during tampering detection when the system is exposed to simultaneous attacks against up to two of the redundant paths.
doi_str_mv 10.1109/ACCESS.2021.3124024
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_crossref_primary_10_1109_ACCESS_2021_3124024</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>9592785</ieee_id><doaj_id>oai_doaj_org_article_19a8eee0fa0d4edeaa33828504d36217</doaj_id><sourcerecordid>2595722874</sourcerecordid><originalsourceid>FETCH-LOGICAL-c408t-abb4d2f55d0c0a8516e85ce53995f22d3a886d9b805f9790c00cdcae30777b503</originalsourceid><addsrcrecordid>eNpNUV1PGzEQPFWtVAT8Al4s8ZzUH-c7-zG60IIELVLos7Wx94JDcg62AeUX9G_X4VJUv9ienZld7VTVBaNTxqj-Nuu6q8ViyilnU8F4TXn9qTrhrNETIUXz-b_31-o8pTUtRxVItifVn_l-gK235CfmtxCfyD3kR3Ifw6tPPgx-WBEYHFngBm0uAOlDJPkRyRzzETnU73z2K3j_hp7MIQN5gO0O48FgljPYp0T88K8LOtKFIcewIYt9yrhNZ9WXHjYJz4_3afX7-9VDdz25_fXjppvdTmxNVZ7Aclk73kvpqKWgJGtQSYtSaC17zp0ApRqnl4rKXre6kKh1FlDQtm2XkorT6mb0dQHWZhf9FuLeBPDmHQhxZSBmbzdomAaFiLQH6mp0CCCE4krS2omGs7Z4XY5euxieXzBlsw4vcSjjGy7LdjlXbV1YYmTZGFKK2H90ZdQcAjRjgOYQoDkGWFQXo8qXET4UWmreKin-AuF9mEM</addsrcrecordid><sourcetype>Open Website</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2595722874</pqid></control><display><type>article</type><title>Dynamic Network Path Provisioning and Selection for the Detection and Mitigation of Data Tampering Attacks in Networked Control Systems</title><source>IEEE Open Access Journals</source><source>DOAJ Directory of Open Access Journals</source><source>EZB-FREE-00999 freely available EZB journals</source><creator>Aida, Kento ; Yamada, Kenta ; Hotchi, Ryosuke ; Kubo, Ryogo</creator><creatorcontrib>Aida, Kento ; Yamada, Kenta ; Hotchi, Ryosuke ; Kubo, Ryogo</creatorcontrib><description>Networked control systems can help build cost-effective and flexible industrial systems. A system that can function while being immune to cyberattacks is necessary. A method called fixed redundant path selection (FRPS) has been proposed to detect and mitigate data tampering attacks in a networked motion control system. This system contains redundant forward network paths from the controller to the motor sides to detect the attacked path by comparing the values that are received through respective paths. Then, a path selector on the motor side chooses a value on the path that is not attacked based on the majority decision. Increasing the number of redundant paths improves the detection performance of simultaneous attacks against multiple paths. However, it also increases the amount of traffic because the same data are transmitted to all of the redundant paths. This study proposes a dynamic redundant path selection (DRPS) method to balance the detection performance and the amount of traffic. The proposed method initially applies three redundant paths and changes the number of redundant paths to five only when the path selector detects a difference among the received values for the three paths. The experiments confirm that the proposed DRPS outperforms the conventional FRPS. The former can detect and mitigate the data tampering attacks while reducing the number of network paths during tampering detection when the system is exposed to simultaneous attacks against up to two of the redundant paths.</description><identifier>ISSN: 2169-3536</identifier><identifier>EISSN: 2169-3536</identifier><identifier>DOI: 10.1109/ACCESS.2021.3124024</identifier><identifier>CODEN: IAECCG</identifier><language>eng</language><publisher>Piscataway: IEEE</publisher><subject>Computer crime ; Control systems ; cyber-physical system ; Cyberattack ; DC motors ; Delay effects ; Delays ; Motion control ; Network control ; networked control system ; Provisioning ; Quantization (signal) ; Redundancy ; System effectiveness ; tampering detection ; Transfer functions</subject><ispartof>IEEE access, 2021, Vol.9, p.147430-147441</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2021</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c408t-abb4d2f55d0c0a8516e85ce53995f22d3a886d9b805f9790c00cdcae30777b503</citedby><cites>FETCH-LOGICAL-c408t-abb4d2f55d0c0a8516e85ce53995f22d3a886d9b805f9790c00cdcae30777b503</cites><orcidid>0000-0001-8141-9986</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/9592785$$EHTML$$P50$$Gieee$$Hfree_for_read</linktohtml><link.rule.ids>314,780,784,864,2102,4024,27633,27923,27924,27925,54933</link.rule.ids></links><search><creatorcontrib>Aida, Kento</creatorcontrib><creatorcontrib>Yamada, Kenta</creatorcontrib><creatorcontrib>Hotchi, Ryosuke</creatorcontrib><creatorcontrib>Kubo, Ryogo</creatorcontrib><title>Dynamic Network Path Provisioning and Selection for the Detection and Mitigation of Data Tampering Attacks in Networked Control Systems</title><title>IEEE access</title><addtitle>Access</addtitle><description>Networked control systems can help build cost-effective and flexible industrial systems. A system that can function while being immune to cyberattacks is necessary. A method called fixed redundant path selection (FRPS) has been proposed to detect and mitigate data tampering attacks in a networked motion control system. This system contains redundant forward network paths from the controller to the motor sides to detect the attacked path by comparing the values that are received through respective paths. Then, a path selector on the motor side chooses a value on the path that is not attacked based on the majority decision. Increasing the number of redundant paths improves the detection performance of simultaneous attacks against multiple paths. However, it also increases the amount of traffic because the same data are transmitted to all of the redundant paths. This study proposes a dynamic redundant path selection (DRPS) method to balance the detection performance and the amount of traffic. The proposed method initially applies three redundant paths and changes the number of redundant paths to five only when the path selector detects a difference among the received values for the three paths. The experiments confirm that the proposed DRPS outperforms the conventional FRPS. The former can detect and mitigate the data tampering attacks while reducing the number of network paths during tampering detection when the system is exposed to simultaneous attacks against up to two of the redundant paths.</description><subject>Computer crime</subject><subject>Control systems</subject><subject>cyber-physical system</subject><subject>Cyberattack</subject><subject>DC motors</subject><subject>Delay effects</subject><subject>Delays</subject><subject>Motion control</subject><subject>Network control</subject><subject>networked control system</subject><subject>Provisioning</subject><subject>Quantization (signal)</subject><subject>Redundancy</subject><subject>System effectiveness</subject><subject>tampering detection</subject><subject>Transfer functions</subject><issn>2169-3536</issn><issn>2169-3536</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2021</creationdate><recordtype>article</recordtype><sourceid>ESBDL</sourceid><sourceid>RIE</sourceid><sourceid>DOA</sourceid><recordid>eNpNUV1PGzEQPFWtVAT8Al4s8ZzUH-c7-zG60IIELVLos7Wx94JDcg62AeUX9G_X4VJUv9ienZld7VTVBaNTxqj-Nuu6q8ViyilnU8F4TXn9qTrhrNETIUXz-b_31-o8pTUtRxVItifVn_l-gK235CfmtxCfyD3kR3Ifw6tPPgx-WBEYHFngBm0uAOlDJPkRyRzzETnU73z2K3j_hp7MIQN5gO0O48FgljPYp0T88K8LOtKFIcewIYt9yrhNZ9WXHjYJz4_3afX7-9VDdz25_fXjppvdTmxNVZ7Aclk73kvpqKWgJGtQSYtSaC17zp0ApRqnl4rKXre6kKh1FlDQtm2XkorT6mb0dQHWZhf9FuLeBPDmHQhxZSBmbzdomAaFiLQH6mp0CCCE4krS2omGs7Z4XY5euxieXzBlsw4vcSjjGy7LdjlXbV1YYmTZGFKK2H90ZdQcAjRjgOYQoDkGWFQXo8qXET4UWmreKin-AuF9mEM</recordid><startdate>2021</startdate><enddate>2021</enddate><creator>Aida, Kento</creator><creator>Yamada, Kenta</creator><creator>Hotchi, Ryosuke</creator><creator>Kubo, Ryogo</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>ESBDL</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>7SR</scope><scope>8BQ</scope><scope>8FD</scope><scope>JG9</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>DOA</scope><orcidid>https://orcid.org/0000-0001-8141-9986</orcidid></search><sort><creationdate>2021</creationdate><title>Dynamic Network Path Provisioning and Selection for the Detection and Mitigation of Data Tampering Attacks in Networked Control Systems</title><author>Aida, Kento ; Yamada, Kenta ; Hotchi, Ryosuke ; Kubo, Ryogo</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c408t-abb4d2f55d0c0a8516e85ce53995f22d3a886d9b805f9790c00cdcae30777b503</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2021</creationdate><topic>Computer crime</topic><topic>Control systems</topic><topic>cyber-physical system</topic><topic>Cyberattack</topic><topic>DC motors</topic><topic>Delay effects</topic><topic>Delays</topic><topic>Motion control</topic><topic>Network control</topic><topic>networked control system</topic><topic>Provisioning</topic><topic>Quantization (signal)</topic><topic>Redundancy</topic><topic>System effectiveness</topic><topic>tampering detection</topic><topic>Transfer functions</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Aida, Kento</creatorcontrib><creatorcontrib>Yamada, Kenta</creatorcontrib><creatorcontrib>Hotchi, Ryosuke</creatorcontrib><creatorcontrib>Kubo, Ryogo</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE Open Access Journals</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Engineered Materials Abstracts</collection><collection>METADEX</collection><collection>Technology Research Database</collection><collection>Materials Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>DOAJ Directory of Open Access Journals</collection><jtitle>IEEE access</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Aida, Kento</au><au>Yamada, Kenta</au><au>Hotchi, Ryosuke</au><au>Kubo, Ryogo</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Dynamic Network Path Provisioning and Selection for the Detection and Mitigation of Data Tampering Attacks in Networked Control Systems</atitle><jtitle>IEEE access</jtitle><stitle>Access</stitle><date>2021</date><risdate>2021</risdate><volume>9</volume><spage>147430</spage><epage>147441</epage><pages>147430-147441</pages><issn>2169-3536</issn><eissn>2169-3536</eissn><coden>IAECCG</coden><abstract>Networked control systems can help build cost-effective and flexible industrial systems. A system that can function while being immune to cyberattacks is necessary. A method called fixed redundant path selection (FRPS) has been proposed to detect and mitigate data tampering attacks in a networked motion control system. This system contains redundant forward network paths from the controller to the motor sides to detect the attacked path by comparing the values that are received through respective paths. Then, a path selector on the motor side chooses a value on the path that is not attacked based on the majority decision. Increasing the number of redundant paths improves the detection performance of simultaneous attacks against multiple paths. However, it also increases the amount of traffic because the same data are transmitted to all of the redundant paths. This study proposes a dynamic redundant path selection (DRPS) method to balance the detection performance and the amount of traffic. The proposed method initially applies three redundant paths and changes the number of redundant paths to five only when the path selector detects a difference among the received values for the three paths. The experiments confirm that the proposed DRPS outperforms the conventional FRPS. The former can detect and mitigate the data tampering attacks while reducing the number of network paths during tampering detection when the system is exposed to simultaneous attacks against up to two of the redundant paths.</abstract><cop>Piscataway</cop><pub>IEEE</pub><doi>10.1109/ACCESS.2021.3124024</doi><tpages>12</tpages><orcidid>https://orcid.org/0000-0001-8141-9986</orcidid><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 2169-3536
ispartof IEEE access, 2021, Vol.9, p.147430-147441
issn 2169-3536
2169-3536
language eng
recordid cdi_crossref_primary_10_1109_ACCESS_2021_3124024
source IEEE Open Access Journals; DOAJ Directory of Open Access Journals; EZB-FREE-00999 freely available EZB journals
subjects Computer crime
Control systems
cyber-physical system
Cyberattack
DC motors
Delay effects
Delays
Motion control
Network control
networked control system
Provisioning
Quantization (signal)
Redundancy
System effectiveness
tampering detection
Transfer functions
title Dynamic Network Path Provisioning and Selection for the Detection and Mitigation of Data Tampering Attacks in Networked Control Systems
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-22T08%3A04%3A14IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Dynamic%20Network%20Path%20Provisioning%20and%20Selection%20for%20the%20Detection%20and%20Mitigation%20of%20Data%20Tampering%20Attacks%20in%20Networked%20Control%20Systems&rft.jtitle=IEEE%20access&rft.au=Aida,%20Kento&rft.date=2021&rft.volume=9&rft.spage=147430&rft.epage=147441&rft.pages=147430-147441&rft.issn=2169-3536&rft.eissn=2169-3536&rft.coden=IAECCG&rft_id=info:doi/10.1109/ACCESS.2021.3124024&rft_dat=%3Cproquest_cross%3E2595722874%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2595722874&rft_id=info:pmid/&rft_ieee_id=9592785&rft_doaj_id=oai_doaj_org_article_19a8eee0fa0d4edeaa33828504d36217&rfr_iscdi=true