Defending State-Feedback Based Controllers Against Sensor Attacks
نویسندگان
چکیده
Context: This paper is motivated by the need to improve resilience of industrial control systems. Many systems currently operating in industry were designed and implemented before boom communications (wired wireless networks) within However, nowadays they operate connected network. increase connectivity has made susceptible cyber-attacks that seek degrade proper operation loop even affecting only one sensor.
 Method: We use concepts from fault tolerant classic theory show it possible reconstruct system state without (any) outputs. fact used recalculation signal through an algorithm attack detection isolation, avoid for be feedback system, mitigating its effect. effectiveness our proposal with simulations on a four-tanks testbed using Matlab Simulink.
 Results: bank unknown input observers can recover true information attacked sensors, i.e., effect attack. Therefore, estimation obtained those utilized computing action mitigates attack.
 Conclusions: mitigation prevents single sensor signi cantly impair low-level controllers, improving just modifying digital controller architecture. The development presented limited sensors pre- sented at time, still compromise seriously behavior. Future work will address extension results situations simultaneous attacks more than sensor, and/or consider actuators.
منابع مشابه
Defending Against XML-Based Attacks Using State-Based XML Firewall
With the proliferation of service-oriented systems and cloud computing, web services security has gained much attention in recent years. Web service attacks, called XML-based attacks, typically occur at the SOAP message level, thus they are not readily handled by existing security mechanisms such as a conventional firewall. In order to provide effective security mechanisms for service-oriented ...
متن کاملDefending Against Nodes Replication Attacks on Wireless Sensor Networks
Wireless Sensor Networks (WSN) are subject to several kind of threats and attacks, like eavesdropping, intrusion, battery exhausting, packets reply and nodes compromising. While most of threats can be dealt with them through cryptographic materials provided by key management protocols, some other threats, like nodes replication attacks, can still go undetectable. Nodes replication attacks are o...
متن کاملDefending BitTorrent against Strategic Attacks
BitTorrent has shown to be efficient for bulk file transfer, however, it is susceptible to free riding by strategic clients like BitTyrant. Strategic peers configure the client software such that for very less or no contribution, they can obtain good download speeds. Such strategic nodes exploit the altruism in the swarm and consume resources at the expense of other honest nodes and create an u...
متن کاملDefending Against the Wily Surfer-Web-based Attacks and Defenses
Intrusions are often viewed as catastrophic events which destroy systems, wreak havoc on data through corruption or substitution, yield access to closely guarded sensitive information, or provide a springboard for hackers to attack other systems. Yet not all intrusions on the Web are the blatant, smash-and-grab, trash-the-site kind of attacks. Many attacks are more subtle, and some involve what...
متن کاملDefending RFID authentication protocols against DoS attacks
In this paper, we present a security weakness of a forward secure authentication protocol proposed by Tri Van Le et al. called O-FRAP which stands for Optimistic Forward secure RFID Authentication Protocol. In particular, we point out that in the O-FRAP protocol, the server can be subject to a denial-of-service attack due to a flaw in the database querying procedure. Our attack also applies to ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Ingeniería
سال: 2023
ISSN: ['2344-8393', '0121-750X']
DOI: https://doi.org/10.14483/23448393.20094