Security Against Communication Network Attacks of Cyber-Physical Systems

Communication networks are commonly used to connect sensors, actuators, and controllers to monitor and control cyber-physical systems (CPS). The use of communication networks increases the vulnerability of the CPS to cyber attacks that can drive the system to reach unsafe states. One of the most pow...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Journal of control, automation & electrical systems automation & electrical systems, 2019-02, Vol.30 (1), p.125-135
Hauptverfasser: Lima, Públio Macedo, Alves, Marcos Vinícius Silva, Carvalho, Lilian Kawakami, Moreira, Marcos Vicente
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 135
container_issue 1
container_start_page 125
container_title Journal of control, automation & electrical systems
container_volume 30
creator Lima, Públio Macedo
Alves, Marcos Vinícius Silva
Carvalho, Lilian Kawakami
Moreira, Marcos Vicente
description Communication networks are commonly used to connect sensors, actuators, and controllers to monitor and control cyber-physical systems (CPS). The use of communication networks increases the vulnerability of the CPS to cyber attacks that can drive the system to reach unsafe states. One of the most powerful cyber attacks is the so-called man-in-the-middle attack, where the intruder can observe, hide, create or replace information in the attacked network channel. In a previous paper, we have introduced the definition of NA-Safe controllability, that is related with the capability of detecting intrusions and preventing damages caused by man-in-the-middle attacks in the sensor and/or control communication channels in supervisory control systems. In this paper, we extend our previous work as follows: (i) we prove the correctness of the NA-Safe controllability verification algorithm; (ii) we show how to implement the security module against cyber attacks; (iii) we show that NA-Safe controllability is a necessary and sufficient condition for the existence of the security module; and (iv) we present a practical example to illustrate the results of the paper.
doi_str_mv 10.1007/s40313-018-0420-9
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2163378639</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2163378639</sourcerecordid><originalsourceid>FETCH-LOGICAL-c316t-7f39a91a6f5effba7c00e64f89e515c45aaa51b857ac72c868cd78a329247aa83</originalsourceid><addsrcrecordid>eNp1kM9LwzAYhoMoOOb-AG8Fz9H8aJrkOIo6YagwPYdvMZnd1nYmKdL_fh0VPXn63sPzvh88CF1TcksJkXcxJ5xyTKjCJGcE6zM0YVQLzJXW579ZkUs0i3FLyEBSRoWYoMXK2S5Uqc_mG6iamLKyreuuqSykqm2yZ5e-27DL5imB3cWs9VnZr13Ar599HKB9tupjcnW8Qhce9tHNfu4UvT_cv5ULvHx5fCrnS2w5LRKWnmvQFAovnPdrkJYQV-ReaSeosLkAAEHXSkiwkllVKPshFXCmWS4BFJ-im3H3ENqvzsVktm0XmuGlYbTgXKqC64GiI2VDG2Nw3hxCVUPoDSXm5MyMzsxgwpycmVOHjZ04sM3Ghb_l_0tHPDJuiw</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2163378639</pqid></control><display><type>article</type><title>Security Against Communication Network Attacks of Cyber-Physical Systems</title><source>SpringerNature Journals</source><creator>Lima, Públio Macedo ; Alves, Marcos Vinícius Silva ; Carvalho, Lilian Kawakami ; Moreira, Marcos Vicente</creator><creatorcontrib>Lima, Públio Macedo ; Alves, Marcos Vinícius Silva ; Carvalho, Lilian Kawakami ; Moreira, Marcos Vicente</creatorcontrib><description>Communication networks are commonly used to connect sensors, actuators, and controllers to monitor and control cyber-physical systems (CPS). The use of communication networks increases the vulnerability of the CPS to cyber attacks that can drive the system to reach unsafe states. One of the most powerful cyber attacks is the so-called man-in-the-middle attack, where the intruder can observe, hide, create or replace information in the attacked network channel. In a previous paper, we have introduced the definition of NA-Safe controllability, that is related with the capability of detecting intrusions and preventing damages caused by man-in-the-middle attacks in the sensor and/or control communication channels in supervisory control systems. In this paper, we extend our previous work as follows: (i) we prove the correctness of the NA-Safe controllability verification algorithm; (ii) we show how to implement the security module against cyber attacks; (iii) we show that NA-Safe controllability is a necessary and sufficient condition for the existence of the security module; and (iv) we present a practical example to illustrate the results of the paper.</description><identifier>ISSN: 2195-3880</identifier><identifier>EISSN: 2195-3899</identifier><identifier>DOI: 10.1007/s40313-018-0420-9</identifier><language>eng</language><publisher>New York: Springer US</publisher><subject>Communication ; Communication networks ; Communications networks ; Control ; Control and Systems Theory ; Control systems ; Controllability ; Cyber-physical systems ; Cybersecurity ; Damage detection ; Damage prevention ; Electrical Engineering ; Engineering ; Mechatronics ; Robotics ; Robotics and Automation ; Stability ; Supervisory control</subject><ispartof>Journal of control, automation &amp; electrical systems, 2019-02, Vol.30 (1), p.125-135</ispartof><rights>Brazilian Society for Automatics--SBA 2018</rights><rights>Copyright Springer Science &amp; Business Media 2019</rights><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c316t-7f39a91a6f5effba7c00e64f89e515c45aaa51b857ac72c868cd78a329247aa83</citedby><cites>FETCH-LOGICAL-c316t-7f39a91a6f5effba7c00e64f89e515c45aaa51b857ac72c868cd78a329247aa83</cites><orcidid>0000-0001-5661-2637</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s40313-018-0420-9$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/s40313-018-0420-9$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>314,780,784,27924,27925,41488,42557,51319</link.rule.ids></links><search><creatorcontrib>Lima, Públio Macedo</creatorcontrib><creatorcontrib>Alves, Marcos Vinícius Silva</creatorcontrib><creatorcontrib>Carvalho, Lilian Kawakami</creatorcontrib><creatorcontrib>Moreira, Marcos Vicente</creatorcontrib><title>Security Against Communication Network Attacks of Cyber-Physical Systems</title><title>Journal of control, automation &amp; electrical systems</title><addtitle>J Control Autom Electr Syst</addtitle><description>Communication networks are commonly used to connect sensors, actuators, and controllers to monitor and control cyber-physical systems (CPS). The use of communication networks increases the vulnerability of the CPS to cyber attacks that can drive the system to reach unsafe states. One of the most powerful cyber attacks is the so-called man-in-the-middle attack, where the intruder can observe, hide, create or replace information in the attacked network channel. In a previous paper, we have introduced the definition of NA-Safe controllability, that is related with the capability of detecting intrusions and preventing damages caused by man-in-the-middle attacks in the sensor and/or control communication channels in supervisory control systems. In this paper, we extend our previous work as follows: (i) we prove the correctness of the NA-Safe controllability verification algorithm; (ii) we show how to implement the security module against cyber attacks; (iii) we show that NA-Safe controllability is a necessary and sufficient condition for the existence of the security module; and (iv) we present a practical example to illustrate the results of the paper.</description><subject>Communication</subject><subject>Communication networks</subject><subject>Communications networks</subject><subject>Control</subject><subject>Control and Systems Theory</subject><subject>Control systems</subject><subject>Controllability</subject><subject>Cyber-physical systems</subject><subject>Cybersecurity</subject><subject>Damage detection</subject><subject>Damage prevention</subject><subject>Electrical Engineering</subject><subject>Engineering</subject><subject>Mechatronics</subject><subject>Robotics</subject><subject>Robotics and Automation</subject><subject>Stability</subject><subject>Supervisory control</subject><issn>2195-3880</issn><issn>2195-3899</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2019</creationdate><recordtype>article</recordtype><recordid>eNp1kM9LwzAYhoMoOOb-AG8Fz9H8aJrkOIo6YagwPYdvMZnd1nYmKdL_fh0VPXn63sPzvh88CF1TcksJkXcxJ5xyTKjCJGcE6zM0YVQLzJXW579ZkUs0i3FLyEBSRoWYoMXK2S5Uqc_mG6iamLKyreuuqSykqm2yZ5e-27DL5imB3cWs9VnZr13Ar599HKB9tupjcnW8Qhce9tHNfu4UvT_cv5ULvHx5fCrnS2w5LRKWnmvQFAovnPdrkJYQV-ReaSeosLkAAEHXSkiwkllVKPshFXCmWS4BFJ-im3H3ENqvzsVktm0XmuGlYbTgXKqC64GiI2VDG2Nw3hxCVUPoDSXm5MyMzsxgwpycmVOHjZ04sM3Ghb_l_0tHPDJuiw</recordid><startdate>20190215</startdate><enddate>20190215</enddate><creator>Lima, Públio Macedo</creator><creator>Alves, Marcos Vinícius Silva</creator><creator>Carvalho, Lilian Kawakami</creator><creator>Moreira, Marcos Vicente</creator><general>Springer US</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope><orcidid>https://orcid.org/0000-0001-5661-2637</orcidid></search><sort><creationdate>20190215</creationdate><title>Security Against Communication Network Attacks of Cyber-Physical Systems</title><author>Lima, Públio Macedo ; Alves, Marcos Vinícius Silva ; Carvalho, Lilian Kawakami ; Moreira, Marcos Vicente</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c316t-7f39a91a6f5effba7c00e64f89e515c45aaa51b857ac72c868cd78a329247aa83</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2019</creationdate><topic>Communication</topic><topic>Communication networks</topic><topic>Communications networks</topic><topic>Control</topic><topic>Control and Systems Theory</topic><topic>Control systems</topic><topic>Controllability</topic><topic>Cyber-physical systems</topic><topic>Cybersecurity</topic><topic>Damage detection</topic><topic>Damage prevention</topic><topic>Electrical Engineering</topic><topic>Engineering</topic><topic>Mechatronics</topic><topic>Robotics</topic><topic>Robotics and Automation</topic><topic>Stability</topic><topic>Supervisory control</topic><toplevel>online_resources</toplevel><creatorcontrib>Lima, Públio Macedo</creatorcontrib><creatorcontrib>Alves, Marcos Vinícius Silva</creatorcontrib><creatorcontrib>Carvalho, Lilian Kawakami</creatorcontrib><creatorcontrib>Moreira, Marcos Vicente</creatorcontrib><collection>CrossRef</collection><jtitle>Journal of control, automation &amp; electrical systems</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Lima, Públio Macedo</au><au>Alves, Marcos Vinícius Silva</au><au>Carvalho, Lilian Kawakami</au><au>Moreira, Marcos Vicente</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Security Against Communication Network Attacks of Cyber-Physical Systems</atitle><jtitle>Journal of control, automation &amp; electrical systems</jtitle><stitle>J Control Autom Electr Syst</stitle><date>2019-02-15</date><risdate>2019</risdate><volume>30</volume><issue>1</issue><spage>125</spage><epage>135</epage><pages>125-135</pages><issn>2195-3880</issn><eissn>2195-3899</eissn><abstract>Communication networks are commonly used to connect sensors, actuators, and controllers to monitor and control cyber-physical systems (CPS). The use of communication networks increases the vulnerability of the CPS to cyber attacks that can drive the system to reach unsafe states. One of the most powerful cyber attacks is the so-called man-in-the-middle attack, where the intruder can observe, hide, create or replace information in the attacked network channel. In a previous paper, we have introduced the definition of NA-Safe controllability, that is related with the capability of detecting intrusions and preventing damages caused by man-in-the-middle attacks in the sensor and/or control communication channels in supervisory control systems. In this paper, we extend our previous work as follows: (i) we prove the correctness of the NA-Safe controllability verification algorithm; (ii) we show how to implement the security module against cyber attacks; (iii) we show that NA-Safe controllability is a necessary and sufficient condition for the existence of the security module; and (iv) we present a practical example to illustrate the results of the paper.</abstract><cop>New York</cop><pub>Springer US</pub><doi>10.1007/s40313-018-0420-9</doi><tpages>11</tpages><orcidid>https://orcid.org/0000-0001-5661-2637</orcidid></addata></record>
fulltext fulltext
identifier ISSN: 2195-3880
ispartof Journal of control, automation & electrical systems, 2019-02, Vol.30 (1), p.125-135
issn 2195-3880
2195-3899
language eng
recordid cdi_proquest_journals_2163378639
source SpringerNature Journals
subjects Communication
Communication networks
Communications networks
Control
Control and Systems Theory
Control systems
Controllability
Cyber-physical systems
Cybersecurity
Damage detection
Damage prevention
Electrical Engineering
Engineering
Mechatronics
Robotics
Robotics and Automation
Stability
Supervisory control
title Security Against Communication Network Attacks of Cyber-Physical Systems
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-23T14%3A37%3A53IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Security%20Against%20Communication%20Network%20Attacks%20of%20Cyber-Physical%20Systems&rft.jtitle=Journal%20of%20control,%20automation%20&%20electrical%20systems&rft.au=Lima,%20P%C3%BAblio%20Macedo&rft.date=2019-02-15&rft.volume=30&rft.issue=1&rft.spage=125&rft.epage=135&rft.pages=125-135&rft.issn=2195-3880&rft.eissn=2195-3899&rft_id=info:doi/10.1007/s40313-018-0420-9&rft_dat=%3Cproquest_cross%3E2163378639%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2163378639&rft_id=info:pmid/&rfr_iscdi=true