Security Against Communication Network Attacks of Cyber-Physical Systems
Communication networks are commonly used to connect sensors, actuators, and controllers to monitor and control cyber-physical systems (CPS). The use of communication networks increases the vulnerability of the CPS to cyber attacks that can drive the system to reach unsafe states. One of the most pow...
Gespeichert in:
Veröffentlicht in: | Journal of control, automation & electrical systems automation & electrical systems, 2019-02, Vol.30 (1), p.125-135 |
---|---|
Hauptverfasser: | , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 135 |
---|---|
container_issue | 1 |
container_start_page | 125 |
container_title | Journal of control, automation & electrical systems |
container_volume | 30 |
creator | Lima, Públio Macedo Alves, Marcos Vinícius Silva Carvalho, Lilian Kawakami Moreira, Marcos Vicente |
description | Communication networks are commonly used to connect sensors, actuators, and controllers to monitor and control cyber-physical systems (CPS). The use of communication networks increases the vulnerability of the CPS to cyber attacks that can drive the system to reach unsafe states. One of the most powerful cyber attacks is the so-called man-in-the-middle attack, where the intruder can observe, hide, create or replace information in the attacked network channel. In a previous paper, we have introduced the definition of NA-Safe controllability, that is related with the capability of detecting intrusions and preventing damages caused by man-in-the-middle attacks in the sensor and/or control communication channels in supervisory control systems. In this paper, we extend our previous work as follows: (i) we prove the correctness of the NA-Safe controllability verification algorithm; (ii) we show how to implement the security module against cyber attacks; (iii) we show that NA-Safe controllability is a necessary and sufficient condition for the existence of the security module; and (iv) we present a practical example to illustrate the results of the paper. |
doi_str_mv | 10.1007/s40313-018-0420-9 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2163378639</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2163378639</sourcerecordid><originalsourceid>FETCH-LOGICAL-c316t-7f39a91a6f5effba7c00e64f89e515c45aaa51b857ac72c868cd78a329247aa83</originalsourceid><addsrcrecordid>eNp1kM9LwzAYhoMoOOb-AG8Fz9H8aJrkOIo6YagwPYdvMZnd1nYmKdL_fh0VPXn63sPzvh88CF1TcksJkXcxJ5xyTKjCJGcE6zM0YVQLzJXW579ZkUs0i3FLyEBSRoWYoMXK2S5Uqc_mG6iamLKyreuuqSykqm2yZ5e-27DL5imB3cWs9VnZr13Ar599HKB9tupjcnW8Qhce9tHNfu4UvT_cv5ULvHx5fCrnS2w5LRKWnmvQFAovnPdrkJYQV-ReaSeosLkAAEHXSkiwkllVKPshFXCmWS4BFJ-im3H3ENqvzsVktm0XmuGlYbTgXKqC64GiI2VDG2Nw3hxCVUPoDSXm5MyMzsxgwpycmVOHjZ04sM3Ghb_l_0tHPDJuiw</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2163378639</pqid></control><display><type>article</type><title>Security Against Communication Network Attacks of Cyber-Physical Systems</title><source>SpringerNature Journals</source><creator>Lima, Públio Macedo ; Alves, Marcos Vinícius Silva ; Carvalho, Lilian Kawakami ; Moreira, Marcos Vicente</creator><creatorcontrib>Lima, Públio Macedo ; Alves, Marcos Vinícius Silva ; Carvalho, Lilian Kawakami ; Moreira, Marcos Vicente</creatorcontrib><description>Communication networks are commonly used to connect sensors, actuators, and controllers to monitor and control cyber-physical systems (CPS). The use of communication networks increases the vulnerability of the CPS to cyber attacks that can drive the system to reach unsafe states. One of the most powerful cyber attacks is the so-called man-in-the-middle attack, where the intruder can observe, hide, create or replace information in the attacked network channel. In a previous paper, we have introduced the definition of NA-Safe controllability, that is related with the capability of detecting intrusions and preventing damages caused by man-in-the-middle attacks in the sensor and/or control communication channels in supervisory control systems. In this paper, we extend our previous work as follows: (i) we prove the correctness of the NA-Safe controllability verification algorithm; (ii) we show how to implement the security module against cyber attacks; (iii) we show that NA-Safe controllability is a necessary and sufficient condition for the existence of the security module; and (iv) we present a practical example to illustrate the results of the paper.</description><identifier>ISSN: 2195-3880</identifier><identifier>EISSN: 2195-3899</identifier><identifier>DOI: 10.1007/s40313-018-0420-9</identifier><language>eng</language><publisher>New York: Springer US</publisher><subject>Communication ; Communication networks ; Communications networks ; Control ; Control and Systems Theory ; Control systems ; Controllability ; Cyber-physical systems ; Cybersecurity ; Damage detection ; Damage prevention ; Electrical Engineering ; Engineering ; Mechatronics ; Robotics ; Robotics and Automation ; Stability ; Supervisory control</subject><ispartof>Journal of control, automation & electrical systems, 2019-02, Vol.30 (1), p.125-135</ispartof><rights>Brazilian Society for Automatics--SBA 2018</rights><rights>Copyright Springer Science & Business Media 2019</rights><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c316t-7f39a91a6f5effba7c00e64f89e515c45aaa51b857ac72c868cd78a329247aa83</citedby><cites>FETCH-LOGICAL-c316t-7f39a91a6f5effba7c00e64f89e515c45aaa51b857ac72c868cd78a329247aa83</cites><orcidid>0000-0001-5661-2637</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s40313-018-0420-9$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/s40313-018-0420-9$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>314,780,784,27924,27925,41488,42557,51319</link.rule.ids></links><search><creatorcontrib>Lima, Públio Macedo</creatorcontrib><creatorcontrib>Alves, Marcos Vinícius Silva</creatorcontrib><creatorcontrib>Carvalho, Lilian Kawakami</creatorcontrib><creatorcontrib>Moreira, Marcos Vicente</creatorcontrib><title>Security Against Communication Network Attacks of Cyber-Physical Systems</title><title>Journal of control, automation & electrical systems</title><addtitle>J Control Autom Electr Syst</addtitle><description>Communication networks are commonly used to connect sensors, actuators, and controllers to monitor and control cyber-physical systems (CPS). The use of communication networks increases the vulnerability of the CPS to cyber attacks that can drive the system to reach unsafe states. One of the most powerful cyber attacks is the so-called man-in-the-middle attack, where the intruder can observe, hide, create or replace information in the attacked network channel. In a previous paper, we have introduced the definition of NA-Safe controllability, that is related with the capability of detecting intrusions and preventing damages caused by man-in-the-middle attacks in the sensor and/or control communication channels in supervisory control systems. In this paper, we extend our previous work as follows: (i) we prove the correctness of the NA-Safe controllability verification algorithm; (ii) we show how to implement the security module against cyber attacks; (iii) we show that NA-Safe controllability is a necessary and sufficient condition for the existence of the security module; and (iv) we present a practical example to illustrate the results of the paper.</description><subject>Communication</subject><subject>Communication networks</subject><subject>Communications networks</subject><subject>Control</subject><subject>Control and Systems Theory</subject><subject>Control systems</subject><subject>Controllability</subject><subject>Cyber-physical systems</subject><subject>Cybersecurity</subject><subject>Damage detection</subject><subject>Damage prevention</subject><subject>Electrical Engineering</subject><subject>Engineering</subject><subject>Mechatronics</subject><subject>Robotics</subject><subject>Robotics and Automation</subject><subject>Stability</subject><subject>Supervisory control</subject><issn>2195-3880</issn><issn>2195-3899</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2019</creationdate><recordtype>article</recordtype><recordid>eNp1kM9LwzAYhoMoOOb-AG8Fz9H8aJrkOIo6YagwPYdvMZnd1nYmKdL_fh0VPXn63sPzvh88CF1TcksJkXcxJ5xyTKjCJGcE6zM0YVQLzJXW579ZkUs0i3FLyEBSRoWYoMXK2S5Uqc_mG6iamLKyreuuqSykqm2yZ5e-27DL5imB3cWs9VnZr13Ar599HKB9tupjcnW8Qhce9tHNfu4UvT_cv5ULvHx5fCrnS2w5LRKWnmvQFAovnPdrkJYQV-ReaSeosLkAAEHXSkiwkllVKPshFXCmWS4BFJ-im3H3ENqvzsVktm0XmuGlYbTgXKqC64GiI2VDG2Nw3hxCVUPoDSXm5MyMzsxgwpycmVOHjZ04sM3Ghb_l_0tHPDJuiw</recordid><startdate>20190215</startdate><enddate>20190215</enddate><creator>Lima, Públio Macedo</creator><creator>Alves, Marcos Vinícius Silva</creator><creator>Carvalho, Lilian Kawakami</creator><creator>Moreira, Marcos Vicente</creator><general>Springer US</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope><orcidid>https://orcid.org/0000-0001-5661-2637</orcidid></search><sort><creationdate>20190215</creationdate><title>Security Against Communication Network Attacks of Cyber-Physical Systems</title><author>Lima, Públio Macedo ; Alves, Marcos Vinícius Silva ; Carvalho, Lilian Kawakami ; Moreira, Marcos Vicente</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c316t-7f39a91a6f5effba7c00e64f89e515c45aaa51b857ac72c868cd78a329247aa83</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2019</creationdate><topic>Communication</topic><topic>Communication networks</topic><topic>Communications networks</topic><topic>Control</topic><topic>Control and Systems Theory</topic><topic>Control systems</topic><topic>Controllability</topic><topic>Cyber-physical systems</topic><topic>Cybersecurity</topic><topic>Damage detection</topic><topic>Damage prevention</topic><topic>Electrical Engineering</topic><topic>Engineering</topic><topic>Mechatronics</topic><topic>Robotics</topic><topic>Robotics and Automation</topic><topic>Stability</topic><topic>Supervisory control</topic><toplevel>online_resources</toplevel><creatorcontrib>Lima, Públio Macedo</creatorcontrib><creatorcontrib>Alves, Marcos Vinícius Silva</creatorcontrib><creatorcontrib>Carvalho, Lilian Kawakami</creatorcontrib><creatorcontrib>Moreira, Marcos Vicente</creatorcontrib><collection>CrossRef</collection><jtitle>Journal of control, automation & electrical systems</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Lima, Públio Macedo</au><au>Alves, Marcos Vinícius Silva</au><au>Carvalho, Lilian Kawakami</au><au>Moreira, Marcos Vicente</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Security Against Communication Network Attacks of Cyber-Physical Systems</atitle><jtitle>Journal of control, automation & electrical systems</jtitle><stitle>J Control Autom Electr Syst</stitle><date>2019-02-15</date><risdate>2019</risdate><volume>30</volume><issue>1</issue><spage>125</spage><epage>135</epage><pages>125-135</pages><issn>2195-3880</issn><eissn>2195-3899</eissn><abstract>Communication networks are commonly used to connect sensors, actuators, and controllers to monitor and control cyber-physical systems (CPS). The use of communication networks increases the vulnerability of the CPS to cyber attacks that can drive the system to reach unsafe states. One of the most powerful cyber attacks is the so-called man-in-the-middle attack, where the intruder can observe, hide, create or replace information in the attacked network channel. In a previous paper, we have introduced the definition of NA-Safe controllability, that is related with the capability of detecting intrusions and preventing damages caused by man-in-the-middle attacks in the sensor and/or control communication channels in supervisory control systems. In this paper, we extend our previous work as follows: (i) we prove the correctness of the NA-Safe controllability verification algorithm; (ii) we show how to implement the security module against cyber attacks; (iii) we show that NA-Safe controllability is a necessary and sufficient condition for the existence of the security module; and (iv) we present a practical example to illustrate the results of the paper.</abstract><cop>New York</cop><pub>Springer US</pub><doi>10.1007/s40313-018-0420-9</doi><tpages>11</tpages><orcidid>https://orcid.org/0000-0001-5661-2637</orcidid></addata></record> |
fulltext | fulltext |
identifier | ISSN: 2195-3880 |
ispartof | Journal of control, automation & electrical systems, 2019-02, Vol.30 (1), p.125-135 |
issn | 2195-3880 2195-3899 |
language | eng |
recordid | cdi_proquest_journals_2163378639 |
source | SpringerNature Journals |
subjects | Communication Communication networks Communications networks Control Control and Systems Theory Control systems Controllability Cyber-physical systems Cybersecurity Damage detection Damage prevention Electrical Engineering Engineering Mechatronics Robotics Robotics and Automation Stability Supervisory control |
title | Security Against Communication Network Attacks of Cyber-Physical Systems |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-23T14%3A37%3A53IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Security%20Against%20Communication%20Network%20Attacks%20of%20Cyber-Physical%20Systems&rft.jtitle=Journal%20of%20control,%20automation%20&%20electrical%20systems&rft.au=Lima,%20P%C3%BAblio%20Macedo&rft.date=2019-02-15&rft.volume=30&rft.issue=1&rft.spage=125&rft.epage=135&rft.pages=125-135&rft.issn=2195-3880&rft.eissn=2195-3899&rft_id=info:doi/10.1007/s40313-018-0420-9&rft_dat=%3Cproquest_cross%3E2163378639%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2163378639&rft_id=info:pmid/&rfr_iscdi=true |