Loading…
Dual Redundant Cyber-Attack Tolerant Control Systems Strategy for Cyber-Physical Systems
In this paper, a cyber-attack tolerant control strategy for embedded controllers in a cyber-physical system is presented. A dual redundant control architecture that combines two identical controllers that are switched periodically between active and restart modes is proposed. The strategy is address...
Saved in:
Main Authors: | , , , , , |
---|---|
Format: | Conference Proceeding |
Language: | English |
Online Access: | Request full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | |
---|---|
cites | |
container_end_page | 7 |
container_issue | |
container_start_page | 1 |
container_title | |
container_volume | |
creator | Gamarra, Marco A. Shetty, Sachin Gonzalez, Oscar R. Njilla, Laurent Pendleton, Marcus Kamhoua, Charles |
description | In this paper, a cyber-attack tolerant control strategy for embedded controllers in a cyber-physical system is presented. A dual redundant control architecture that combines two identical controllers that are switched periodically between active and restart modes is proposed. The strategy is addressed to mitigate the impact due to corruption of the controller software by an adversary. We analyze the impact of the resetting and restarting the controller software and performance of switching process. The minimum requirements in the control design, for effective mitigation of cyber-attacks to the control software, that implies a “fast” switching period is provided. The simulation results demonstrate the effectiveness of the proposed strategy when the time to fully reset and restart the controller is faster than the time taken by adversary to compromise the controller. The results also provide insights into the stability and safety regions and the factors that determine the effectiveness of the proposed strategy. |
doi_str_mv | 10.1109/ICC.2019.8761260 |
format | conference_proceeding |
fullrecord | <record><control><sourceid>ieee_CHZPO</sourceid><recordid>TN_cdi_ieee_primary_8761260</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>8761260</ieee_id><sourcerecordid>8761260</sourcerecordid><originalsourceid>FETCH-LOGICAL-i175t-ad744be590013f1022d1e04aaa6fe2efd42760c797cc0e7b4821464b6830add3</originalsourceid><addsrcrecordid>eNo9kE1Lw0AURUdBsNbuBTf5A4nvzUzmY1mi1kJBsVm4K5PMi0bTRCbTRf69oMHVhcu5Z3EZu0HIEMHebYsi44A2M1ohV3DGVlYbzIVRBoyx52yBVpgUjRGX7GocPwFybgUu2Nv9yXXJK_lT710fk2KqKKTrGF39lZRDR-G3HfoYhi7ZT2Ok45jsY3CR3qekGcI8efmYxrZ2_8w1u2hcN9JqziUrHx_K4indPW-2xXqXtqjzmDqvpawotwAoGgTOPRJI55xqiFPjJdcKam11XQPpShqOUslKGQHOe7Fkt3_alogO36E9ujAd5h_ED8OpUdM</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Dual Redundant Cyber-Attack Tolerant Control Systems Strategy for Cyber-Physical Systems</title><source>IEEE Xplore All Conference Series</source><creator>Gamarra, Marco A. ; Shetty, Sachin ; Gonzalez, Oscar R. ; Njilla, Laurent ; Pendleton, Marcus ; Kamhoua, Charles</creator><creatorcontrib>Gamarra, Marco A. ; Shetty, Sachin ; Gonzalez, Oscar R. ; Njilla, Laurent ; Pendleton, Marcus ; Kamhoua, Charles</creatorcontrib><description>In this paper, a cyber-attack tolerant control strategy for embedded controllers in a cyber-physical system is presented. A dual redundant control architecture that combines two identical controllers that are switched periodically between active and restart modes is proposed. The strategy is addressed to mitigate the impact due to corruption of the controller software by an adversary. We analyze the impact of the resetting and restarting the controller software and performance of switching process. The minimum requirements in the control design, for effective mitigation of cyber-attacks to the control software, that implies a &#x201C;fast&#x201D; switching period is provided. The simulation results demonstrate the effectiveness of the proposed strategy when the time to fully reset and restart the controller is faster than the time taken by adversary to compromise the controller. The results also provide insights into the stability and safety regions and the factors that determine the effectiveness of the proposed strategy.</description><identifier>EISSN: 1938-1883</identifier><identifier>EISBN: 9781538680889</identifier><identifier>EISBN: 1538680882</identifier><identifier>DOI: 10.1109/ICC.2019.8761260</identifier><language>eng</language><publisher>IEEE</publisher><ispartof>ICC 2019 - 2019 IEEE International Conference on Communications (ICC), 2019, p.1-7</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/8761260$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,27925,54555,54932</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/8761260$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Gamarra, Marco A.</creatorcontrib><creatorcontrib>Shetty, Sachin</creatorcontrib><creatorcontrib>Gonzalez, Oscar R.</creatorcontrib><creatorcontrib>Njilla, Laurent</creatorcontrib><creatorcontrib>Pendleton, Marcus</creatorcontrib><creatorcontrib>Kamhoua, Charles</creatorcontrib><title>Dual Redundant Cyber-Attack Tolerant Control Systems Strategy for Cyber-Physical Systems</title><title>ICC 2019 - 2019 IEEE International Conference on Communications (ICC)</title><addtitle>ICC</addtitle><description>In this paper, a cyber-attack tolerant control strategy for embedded controllers in a cyber-physical system is presented. A dual redundant control architecture that combines two identical controllers that are switched periodically between active and restart modes is proposed. The strategy is addressed to mitigate the impact due to corruption of the controller software by an adversary. We analyze the impact of the resetting and restarting the controller software and performance of switching process. The minimum requirements in the control design, for effective mitigation of cyber-attacks to the control software, that implies a &#x201C;fast&#x201D; switching period is provided. The simulation results demonstrate the effectiveness of the proposed strategy when the time to fully reset and restart the controller is faster than the time taken by adversary to compromise the controller. The results also provide insights into the stability and safety regions and the factors that determine the effectiveness of the proposed strategy.</description><issn>1938-1883</issn><isbn>9781538680889</isbn><isbn>1538680882</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2019</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><recordid>eNo9kE1Lw0AURUdBsNbuBTf5A4nvzUzmY1mi1kJBsVm4K5PMi0bTRCbTRf69oMHVhcu5Z3EZu0HIEMHebYsi44A2M1ohV3DGVlYbzIVRBoyx52yBVpgUjRGX7GocPwFybgUu2Nv9yXXJK_lT710fk2KqKKTrGF39lZRDR-G3HfoYhi7ZT2Ok45jsY3CR3qekGcI8efmYxrZ2_8w1u2hcN9JqziUrHx_K4indPW-2xXqXtqjzmDqvpawotwAoGgTOPRJI55xqiFPjJdcKam11XQPpShqOUslKGQHOe7Fkt3_alogO36E9ujAd5h_ED8OpUdM</recordid><startdate>201905</startdate><enddate>201905</enddate><creator>Gamarra, Marco A.</creator><creator>Shetty, Sachin</creator><creator>Gonzalez, Oscar R.</creator><creator>Njilla, Laurent</creator><creator>Pendleton, Marcus</creator><creator>Kamhoua, Charles</creator><general>IEEE</general><scope>6IE</scope><scope>6IH</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIO</scope></search><sort><creationdate>201905</creationdate><title>Dual Redundant Cyber-Attack Tolerant Control Systems Strategy for Cyber-Physical Systems</title><author>Gamarra, Marco A. ; Shetty, Sachin ; Gonzalez, Oscar R. ; Njilla, Laurent ; Pendleton, Marcus ; Kamhoua, Charles</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i175t-ad744be590013f1022d1e04aaa6fe2efd42760c797cc0e7b4821464b6830add3</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2019</creationdate><toplevel>online_resources</toplevel><creatorcontrib>Gamarra, Marco A.</creatorcontrib><creatorcontrib>Shetty, Sachin</creatorcontrib><creatorcontrib>Gonzalez, Oscar R.</creatorcontrib><creatorcontrib>Njilla, Laurent</creatorcontrib><creatorcontrib>Pendleton, Marcus</creatorcontrib><creatorcontrib>Kamhoua, Charles</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan (POP) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE/IET Electronic Library</collection><collection>IEEE Proceedings Order Plans (POP) 1998-present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Gamarra, Marco A.</au><au>Shetty, Sachin</au><au>Gonzalez, Oscar R.</au><au>Njilla, Laurent</au><au>Pendleton, Marcus</au><au>Kamhoua, Charles</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Dual Redundant Cyber-Attack Tolerant Control Systems Strategy for Cyber-Physical Systems</atitle><btitle>ICC 2019 - 2019 IEEE International Conference on Communications (ICC)</btitle><stitle>ICC</stitle><date>2019-05</date><risdate>2019</risdate><spage>1</spage><epage>7</epage><pages>1-7</pages><eissn>1938-1883</eissn><eisbn>9781538680889</eisbn><eisbn>1538680882</eisbn><abstract>In this paper, a cyber-attack tolerant control strategy for embedded controllers in a cyber-physical system is presented. A dual redundant control architecture that combines two identical controllers that are switched periodically between active and restart modes is proposed. The strategy is addressed to mitigate the impact due to corruption of the controller software by an adversary. We analyze the impact of the resetting and restarting the controller software and performance of switching process. The minimum requirements in the control design, for effective mitigation of cyber-attacks to the control software, that implies a &#x201C;fast&#x201D; switching period is provided. The simulation results demonstrate the effectiveness of the proposed strategy when the time to fully reset and restart the controller is faster than the time taken by adversary to compromise the controller. The results also provide insights into the stability and safety regions and the factors that determine the effectiveness of the proposed strategy.</abstract><pub>IEEE</pub><doi>10.1109/ICC.2019.8761260</doi><tpages>7</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | EISSN: 1938-1883 |
ispartof | ICC 2019 - 2019 IEEE International Conference on Communications (ICC), 2019, p.1-7 |
issn | 1938-1883 |
language | eng |
recordid | cdi_ieee_primary_8761260 |
source | IEEE Xplore All Conference Series |
title | Dual Redundant Cyber-Attack Tolerant Control Systems Strategy for Cyber-Physical Systems |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-06T07%3A40%3A16IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_CHZPO&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Dual%20Redundant%20Cyber-Attack%20Tolerant%20Control%20Systems%20Strategy%20for%20Cyber-Physical%20Systems&rft.btitle=ICC%202019%20-%202019%20IEEE%20International%20Conference%20on%20Communications%20(ICC)&rft.au=Gamarra,%20Marco%20A.&rft.date=2019-05&rft.spage=1&rft.epage=7&rft.pages=1-7&rft.eissn=1938-1883&rft_id=info:doi/10.1109/ICC.2019.8761260&rft.eisbn=9781538680889&rft.eisbn_list=1538680882&rft_dat=%3Cieee_CHZPO%3E8761260%3C/ieee_CHZPO%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-i175t-ad744be590013f1022d1e04aaa6fe2efd42760c797cc0e7b4821464b6830add3%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=8761260&rfr_iscdi=true |