“Identification of Data Injection Attacks in Networked Control Systems Using Noise Impulse Integration”

From Navigators

Revision as of 13:36, 6 February 2020 by Casim (Talk | contribs)
Jump to: navigation, search

Alan Oliveira de Sá, António Casimiro, Raphael C. S. Machado, and Luiz F. R. da C. Carmo

Sensors, vol. 20, no. 792, Jan. 2020.

Abstract: The benefits of using Networked Control Systems (NCS) in the growing Industry 4.0 are numerous, including better management and operational capabilities, as well as costs reduction. However, despite these benefits, the use of NCSs can also expose physical plants to new threats originated in the cyber domain—such as data injection attacks in NCS links through which sensors and controllers transmit signals. In this sense, this work proposes a link monitoring strategy to identify linear time-invariant (LTI) functions executed during controlled data injection attacks by a Man-in-the-Middle hosted in an NCS link. The countermeasure is based on a bioinspired metaheuristic, called Backtracking Search Optimization Algorithm (BSA), and uses white Gaussian noise to excite the attack function. To increase the accuracy of this countermeasure, it is proposed the Noise Impulse Integration (NII) technique, which is developed using the radar pulse integration technique as inspiration. The results demonstrate that the proposed countermeasure is able to accurately identify LTI attack functions, here executed to impair measurements transmitted by the plant sensor, without interfering with the NCS behavior when the system is in its normal operation. Moreover, the results indicate that the NII technique can increase the accuracy of the attack identification.

Download paper

Download Identification of Data Injection Attacks in Networked Control Systems Using Noise Impulse Integration

Export citation



Research line(s): Fault and Intrusion Tolerance in Open Distributed Systems (FIT), Timeliness and Adaptation in Dependable Systems (TADS)

25 pages

Personal tools
Navigators toolbox