Loading…

Dual Redundant Cyber-Attack Tolerant Control Systems Strategy for Cyber-Physical Systems

In this paper, a cyber-attack tolerant control strategy for embedded controllers in a cyber-physical system is presented. A dual redundant control architecture that combines two identical controllers that are switched periodically between active and restart modes is proposed. The strategy is address...

Full description

Saved in:
Bibliographic Details
Main Authors: Gamarra, Marco A., Shetty, Sachin, Gonzalez, Oscar R., Njilla, Laurent, Pendleton, Marcus, Kamhoua, Charles
Format: Conference Proceeding
Language:English
Online Access:Request full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by
cites
container_end_page 7
container_issue
container_start_page 1
container_title
container_volume
creator Gamarra, Marco A.
Shetty, Sachin
Gonzalez, Oscar R.
Njilla, Laurent
Pendleton, Marcus
Kamhoua, Charles
description In this paper, a cyber-attack tolerant control strategy for embedded controllers in a cyber-physical system is presented. A dual redundant control architecture that combines two identical controllers that are switched periodically between active and restart modes is proposed. The strategy is addressed to mitigate the impact due to corruption of the controller software by an adversary. We analyze the impact of the resetting and restarting the controller software and performance of switching process. The minimum requirements in the control design, for effective mitigation of cyber-attacks to the control software, that implies a “fast” switching period is provided. The simulation results demonstrate the effectiveness of the proposed strategy when the time to fully reset and restart the controller is faster than the time taken by adversary to compromise the controller. The results also provide insights into the stability and safety regions and the factors that determine the effectiveness of the proposed strategy.
doi_str_mv 10.1109/ICC.2019.8761260
format conference_proceeding
fullrecord <record><control><sourceid>ieee_CHZPO</sourceid><recordid>TN_cdi_ieee_primary_8761260</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>8761260</ieee_id><sourcerecordid>8761260</sourcerecordid><originalsourceid>FETCH-LOGICAL-i175t-ad744be590013f1022d1e04aaa6fe2efd42760c797cc0e7b4821464b6830add3</originalsourceid><addsrcrecordid>eNo9kE1Lw0AURUdBsNbuBTf5A4nvzUzmY1mi1kJBsVm4K5PMi0bTRCbTRf69oMHVhcu5Z3EZu0HIEMHebYsi44A2M1ohV3DGVlYbzIVRBoyx52yBVpgUjRGX7GocPwFybgUu2Nv9yXXJK_lT710fk2KqKKTrGF39lZRDR-G3HfoYhi7ZT2Ok45jsY3CR3qekGcI8efmYxrZ2_8w1u2hcN9JqziUrHx_K4indPW-2xXqXtqjzmDqvpawotwAoGgTOPRJI55xqiFPjJdcKam11XQPpShqOUslKGQHOe7Fkt3_alogO36E9ujAd5h_ED8OpUdM</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Dual Redundant Cyber-Attack Tolerant Control Systems Strategy for Cyber-Physical Systems</title><source>IEEE Xplore All Conference Series</source><creator>Gamarra, Marco A. ; Shetty, Sachin ; Gonzalez, Oscar R. ; Njilla, Laurent ; Pendleton, Marcus ; Kamhoua, Charles</creator><creatorcontrib>Gamarra, Marco A. ; Shetty, Sachin ; Gonzalez, Oscar R. ; Njilla, Laurent ; Pendleton, Marcus ; Kamhoua, Charles</creatorcontrib><description>In this paper, a cyber-attack tolerant control strategy for embedded controllers in a cyber-physical system is presented. A dual redundant control architecture that combines two identical controllers that are switched periodically between active and restart modes is proposed. The strategy is addressed to mitigate the impact due to corruption of the controller software by an adversary. We analyze the impact of the resetting and restarting the controller software and performance of switching process. The minimum requirements in the control design, for effective mitigation of cyber-attacks to the control software, that implies a &amp;#x201C;fast&amp;#x201D; switching period is provided. The simulation results demonstrate the effectiveness of the proposed strategy when the time to fully reset and restart the controller is faster than the time taken by adversary to compromise the controller. The results also provide insights into the stability and safety regions and the factors that determine the effectiveness of the proposed strategy.</description><identifier>EISSN: 1938-1883</identifier><identifier>EISBN: 9781538680889</identifier><identifier>EISBN: 1538680882</identifier><identifier>DOI: 10.1109/ICC.2019.8761260</identifier><language>eng</language><publisher>IEEE</publisher><ispartof>ICC 2019 - 2019 IEEE International Conference on Communications (ICC), 2019, p.1-7</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/8761260$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,27925,54555,54932</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/8761260$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Gamarra, Marco A.</creatorcontrib><creatorcontrib>Shetty, Sachin</creatorcontrib><creatorcontrib>Gonzalez, Oscar R.</creatorcontrib><creatorcontrib>Njilla, Laurent</creatorcontrib><creatorcontrib>Pendleton, Marcus</creatorcontrib><creatorcontrib>Kamhoua, Charles</creatorcontrib><title>Dual Redundant Cyber-Attack Tolerant Control Systems Strategy for Cyber-Physical Systems</title><title>ICC 2019 - 2019 IEEE International Conference on Communications (ICC)</title><addtitle>ICC</addtitle><description>In this paper, a cyber-attack tolerant control strategy for embedded controllers in a cyber-physical system is presented. A dual redundant control architecture that combines two identical controllers that are switched periodically between active and restart modes is proposed. The strategy is addressed to mitigate the impact due to corruption of the controller software by an adversary. We analyze the impact of the resetting and restarting the controller software and performance of switching process. The minimum requirements in the control design, for effective mitigation of cyber-attacks to the control software, that implies a &amp;#x201C;fast&amp;#x201D; switching period is provided. The simulation results demonstrate the effectiveness of the proposed strategy when the time to fully reset and restart the controller is faster than the time taken by adversary to compromise the controller. The results also provide insights into the stability and safety regions and the factors that determine the effectiveness of the proposed strategy.</description><issn>1938-1883</issn><isbn>9781538680889</isbn><isbn>1538680882</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2019</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><recordid>eNo9kE1Lw0AURUdBsNbuBTf5A4nvzUzmY1mi1kJBsVm4K5PMi0bTRCbTRf69oMHVhcu5Z3EZu0HIEMHebYsi44A2M1ohV3DGVlYbzIVRBoyx52yBVpgUjRGX7GocPwFybgUu2Nv9yXXJK_lT710fk2KqKKTrGF39lZRDR-G3HfoYhi7ZT2Ok45jsY3CR3qekGcI8efmYxrZ2_8w1u2hcN9JqziUrHx_K4indPW-2xXqXtqjzmDqvpawotwAoGgTOPRJI55xqiFPjJdcKam11XQPpShqOUslKGQHOe7Fkt3_alogO36E9ujAd5h_ED8OpUdM</recordid><startdate>201905</startdate><enddate>201905</enddate><creator>Gamarra, Marco A.</creator><creator>Shetty, Sachin</creator><creator>Gonzalez, Oscar R.</creator><creator>Njilla, Laurent</creator><creator>Pendleton, Marcus</creator><creator>Kamhoua, Charles</creator><general>IEEE</general><scope>6IE</scope><scope>6IH</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIO</scope></search><sort><creationdate>201905</creationdate><title>Dual Redundant Cyber-Attack Tolerant Control Systems Strategy for Cyber-Physical Systems</title><author>Gamarra, Marco A. ; Shetty, Sachin ; Gonzalez, Oscar R. ; Njilla, Laurent ; Pendleton, Marcus ; Kamhoua, Charles</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i175t-ad744be590013f1022d1e04aaa6fe2efd42760c797cc0e7b4821464b6830add3</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2019</creationdate><toplevel>online_resources</toplevel><creatorcontrib>Gamarra, Marco A.</creatorcontrib><creatorcontrib>Shetty, Sachin</creatorcontrib><creatorcontrib>Gonzalez, Oscar R.</creatorcontrib><creatorcontrib>Njilla, Laurent</creatorcontrib><creatorcontrib>Pendleton, Marcus</creatorcontrib><creatorcontrib>Kamhoua, Charles</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan (POP) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE/IET Electronic Library</collection><collection>IEEE Proceedings Order Plans (POP) 1998-present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Gamarra, Marco A.</au><au>Shetty, Sachin</au><au>Gonzalez, Oscar R.</au><au>Njilla, Laurent</au><au>Pendleton, Marcus</au><au>Kamhoua, Charles</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Dual Redundant Cyber-Attack Tolerant Control Systems Strategy for Cyber-Physical Systems</atitle><btitle>ICC 2019 - 2019 IEEE International Conference on Communications (ICC)</btitle><stitle>ICC</stitle><date>2019-05</date><risdate>2019</risdate><spage>1</spage><epage>7</epage><pages>1-7</pages><eissn>1938-1883</eissn><eisbn>9781538680889</eisbn><eisbn>1538680882</eisbn><abstract>In this paper, a cyber-attack tolerant control strategy for embedded controllers in a cyber-physical system is presented. A dual redundant control architecture that combines two identical controllers that are switched periodically between active and restart modes is proposed. The strategy is addressed to mitigate the impact due to corruption of the controller software by an adversary. We analyze the impact of the resetting and restarting the controller software and performance of switching process. The minimum requirements in the control design, for effective mitigation of cyber-attacks to the control software, that implies a &amp;#x201C;fast&amp;#x201D; switching period is provided. The simulation results demonstrate the effectiveness of the proposed strategy when the time to fully reset and restart the controller is faster than the time taken by adversary to compromise the controller. The results also provide insights into the stability and safety regions and the factors that determine the effectiveness of the proposed strategy.</abstract><pub>IEEE</pub><doi>10.1109/ICC.2019.8761260</doi><tpages>7</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier EISSN: 1938-1883
ispartof ICC 2019 - 2019 IEEE International Conference on Communications (ICC), 2019, p.1-7
issn 1938-1883
language eng
recordid cdi_ieee_primary_8761260
source IEEE Xplore All Conference Series
title Dual Redundant Cyber-Attack Tolerant Control Systems Strategy for Cyber-Physical Systems
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-06T07%3A40%3A16IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_CHZPO&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Dual%20Redundant%20Cyber-Attack%20Tolerant%20Control%20Systems%20Strategy%20for%20Cyber-Physical%20Systems&rft.btitle=ICC%202019%20-%202019%20IEEE%20International%20Conference%20on%20Communications%20(ICC)&rft.au=Gamarra,%20Marco%20A.&rft.date=2019-05&rft.spage=1&rft.epage=7&rft.pages=1-7&rft.eissn=1938-1883&rft_id=info:doi/10.1109/ICC.2019.8761260&rft.eisbn=9781538680889&rft.eisbn_list=1538680882&rft_dat=%3Cieee_CHZPO%3E8761260%3C/ieee_CHZPO%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-i175t-ad744be590013f1022d1e04aaa6fe2efd42760c797cc0e7b4821464b6830add3%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=8761260&rfr_iscdi=true