“Identification of Data Injection Attacks in Networked Control Systems Using Noise Impulse Integration”
From Navigators
(Difference between revisions)
(Created page with "{{Publication |type=article |document=Document for Publication-Sa2020Sensors.pdf |title=Identification of Data Injection Attacks in Networked Control Systems Using Noise Impulse ...") |
|||
Line 4: | Line 4: | ||
|title=Identification of Data Injection Attacks in Networked Control Systems Using Noise Impulse Integration | |title=Identification of Data Injection Attacks in Networked Control Systems Using Noise Impulse Integration | ||
|author=Alan Oliveira de Sá, António Casimiro, Raphael C. S. Machado, and Luiz F. R. da C. Carmo | |author=Alan Oliveira de Sá, António Casimiro, Raphael C. S. Machado, and Luiz F. R. da C. Carmo | ||
+ | |ResearchLine=Fault and Intrusion Tolerance in Open Distributed Systems (FIT), Timeliness and Adaptation in Dependable Systems (TADS) | ||
+ | |month=jan | ||
+ | |year=2020 | ||
+ | |abstract=The benefits of using Networked Control Systems (NCS) in the growing Industry 4.0 are numerous, including better management and operational capabilities, as well as costs reduction. However, despite these benefits, the use of NCSs can also expose physical plants to new threats originated in the cyber domain—such as data injection attacks in NCS links through which sensors and controllers transmit signals. In this sense, this work proposes a link monitoring strategy to identify linear time-invariant (LTI) functions executed during controlled data injection attacks by a Man-in-the-Middle hosted in an NCS link. The countermeasure is based on a bioinspired metaheuristic, called Backtracking Search Optimization Algorithm (BSA), and uses white Gaussian noise to excite the attack function. To increase the accuracy of this countermeasure, it is proposed the Noise Impulse Integration (NII) technique, which is developed using the radar pulse integration technique as inspiration. The results demonstrate that the proposed countermeasure is able to accurately identify LTI attack functions, here executed to impair measurements transmitted by the plant sensor, without interfering with the NCS behavior when the system is in its normal operation. Moreover, the results indicate that the NII technique can increase the accuracy of the attack identification. | ||
+ | |journal=Sensors | ||
+ | |volume=20 | ||
+ | |number=792 | ||
+ | |publisher=MDPI | ||
}} | }} | ||
+ | 25 pages |
Revision as of 13:36, 6 February 2020
Alan Oliveira de Sá, António Casimiro, Raphael C. S. Machado, and Luiz F. R. da C. Carmo
Sensors, vol. 20, no. 792, Jan. 2020.
Abstract: The benefits of using Networked Control Systems (NCS) in the growing Industry 4.0 are numerous, including better management and operational capabilities, as well as costs reduction. However, despite these benefits, the use of NCSs can also expose physical plants to new threats originated in the cyber domain—such as data injection attacks in NCS links through which sensors and controllers transmit signals. In this sense, this work proposes a link monitoring strategy to identify linear time-invariant (LTI) functions executed during controlled data injection attacks by a Man-in-the-Middle hosted in an NCS link. The countermeasure is based on a bioinspired metaheuristic, called Backtracking Search Optimization Algorithm (BSA), and uses white Gaussian noise to excite the attack function. To increase the accuracy of this countermeasure, it is proposed the Noise Impulse Integration (NII) technique, which is developed using the radar pulse integration technique as inspiration. The results demonstrate that the proposed countermeasure is able to accurately identify LTI attack functions, here executed to impair measurements transmitted by the plant sensor, without interfering with the NCS behavior when the system is in its normal operation. Moreover, the results indicate that the NII technique can increase the accuracy of the attack identification.
Download paper
Export citation
Project(s):
Research line(s): Fault and Intrusion Tolerance in Open Distributed Systems (FIT), Timeliness and Adaptation in Dependable Systems (TADS)
25 pages