Loading…

Secure Data Transmission and Trustworthiness Judgement Approaches Against Cyber-Physical Attacks in an Integrated Data-Driven Framework

Threats of cyberattacks have penetrated from disclosing critical user information to destroying/manipulating industrial control systems. Study on data security during network transmission has raised increasing attention in the systems and control community, which is found very necessary and timely i...

Full description

Saved in:
Bibliographic Details
Published in:IEEE transactions on systems, man, and cybernetics. Systems man, and cybernetics. Systems, 2022-12, Vol.52 (12), p.7799-7809
Main Authors: Jiang, Yuchen, Wu, Shimeng, Yang, Hongyan, Luo, Hao, Chen, Zhiwen, Yin, Shen, Kaynak, Okyay
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Threats of cyberattacks have penetrated from disclosing critical user information to destroying/manipulating industrial control systems. Study on data security during network transmission has raised increasing attention in the systems and control community, which is found very necessary and timely in the context of Industry 4.0. In most existing approaches, the protection of the transmitted data from eavesdropping attacks and the detection of malicious integrity attacks are usually carried out separately. In this study, an integrated data-driven framework applicable at the control level is proposed to deal with secure transmission and attack detection simultaneously. In the framework, a secure correlation-based encryption/decryption approach and a trustworthiness judgement approach are proposed. Comprehensive discussions are made regarding the analysis of the sensitivity to attacks, the introduced time delay, and the design degree-of-free. Executable algorithms are presented, corresponding to which hardware is modularized and can work standalone independent from the configuration of the monitoring and control systems or any third-party authentication agencies. Evaluation results on a simulated two-area frequency-load control power grid system are provided to show the effectiveness and performance of the proposed approaches.
ISSN:2168-2216
2168-2232
DOI:10.1109/TSMC.2022.3164024