Defending State-Feedback Based Controllers Against Sensor Attacks

نویسندگان

چکیده

Context: This paper is motivated by the need to improve resilience of industrial control systems. Many systems currently operating in industry were designed and implemented before boom communications (wired wireless networks) within However, nowadays they operate connected network. increase connectivity has made susceptible cyber-attacks that seek degrade proper operation loop even affecting only one sensor.
 Method: We use concepts from fault tolerant classic theory show it possible reconstruct system state without (any) outputs. fact used recalculation signal through an algorithm attack detection isolation, avoid for be feedback system, mitigating its effect. effectiveness our proposal with simulations on a four-tanks testbed using Matlab Simulink.
 Results: bank unknown input observers can recover true information attacked sensors, i.e., effect attack. Therefore, estimation obtained those utilized computing action mitigates attack.
 Conclusions: mitigation prevents single sensor signi cantly impair low-level controllers, improving just modifying digital controller architecture. The development presented limited sensors pre- sented at time, still compromise seriously behavior. Future work will address extension results situations simultaneous attacks more than sensor, and/or consider actuators.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Defending Against XML-Based Attacks Using State-Based XML Firewall

With the proliferation of service-oriented systems and cloud computing, web services security has gained much attention in recent years. Web service attacks, called XML-based attacks, typically occur at the SOAP message level, thus they are not readily handled by existing security mechanisms such as a conventional firewall. In order to provide effective security mechanisms for service-oriented ...

متن کامل

Defending Against Nodes Replication Attacks on Wireless Sensor Networks

Wireless Sensor Networks (WSN) are subject to several kind of threats and attacks, like eavesdropping, intrusion, battery exhausting, packets reply and nodes compromising. While most of threats can be dealt with them through cryptographic materials provided by key management protocols, some other threats, like nodes replication attacks, can still go undetectable. Nodes replication attacks are o...

متن کامل

Defending BitTorrent against Strategic Attacks

BitTorrent has shown to be efficient for bulk file transfer, however, it is susceptible to free riding by strategic clients like BitTyrant. Strategic peers configure the client software such that for very less or no contribution, they can obtain good download speeds. Such strategic nodes exploit the altruism in the swarm and consume resources at the expense of other honest nodes and create an u...

متن کامل

Defending Against the Wily Surfer-Web-based Attacks and Defenses

Intrusions are often viewed as catastrophic events which destroy systems, wreak havoc on data through corruption or substitution, yield access to closely guarded sensitive information, or provide a springboard for hackers to attack other systems. Yet not all intrusions on the Web are the blatant, smash-and-grab, trash-the-site kind of attacks. Many attacks are more subtle, and some involve what...

متن کامل

Defending RFID authentication protocols against DoS attacks

In this paper, we present a security weakness of a forward secure authentication protocol proposed by Tri Van Le et al. called O-FRAP which stands for Optimistic Forward secure RFID Authentication Protocol. In particular, we point out that in the O-FRAP protocol, the server can be subject to a denial-of-service attack due to a flaw in the database querying procedure. Our attack also applies to ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Ingeniería

سال: 2023

ISSN: ['2344-8393', '0121-750X']

DOI: https://doi.org/10.14483/23448393.20094