Physical layer privacy scheme for networked control systems

Hesham W. Gomma1, Ali Allam1
1Electronics, Communications and Computer Department, Faculty of Engineering, Helwan University, Helwan, Egypt

Tóm tắt

Control systems in general and networked controls systems in particular are vulnerable to harmful noise effect and malicious cyber-attacks that may have devastated outcomes on sensitive applications. One approach to address these threats is to introduce a stringent security and privacy schemes that able to protect the attacked systems. This paper addresses this issue by proposing a privacy scheme, for feedback signals, stemmed from the well-known spread spectrum principle and the information system theory. In order to confirm the efficiency of the proposed scheme in offering a good level of control system privacy, a theoretical analysis is provided and supported by a simulation example introduced to one of the relatively weak control systems to noise and malicious attacks namely Higher Order Iterative Learning Control (HOILC).

Tài liệu tham khảo

T. Goodspeed, Extracting Keys from Second Generation Zigbee Chips, Black Hat USA, Las Vegas, Nevada, 2009. W. Zeng, M. Y. Chow, and P. Ning, “Secure distributed control in unreliable D-NCS,” Proc. of the IEEE International Symposium on Industrial Electronics, pp. 28–31, 2012. M. S. Mahmoud and Y. Xia, Analysis and Synthesis of Fault-Tolerant Control Systems, John Wiley, UK, November 2013. J. Dong and W. Kim, “Markov-chain-based output feedback control for stabilization of networked control systems with random time delays and packet losses,” International Journal of Control, Automation and Systems, vol. 10, no. 5, pp. 1013–1022, 2012. X. Li and S. Sun, “H ∞ control for networked systems with random delays and packet dropouts,” International Journal of Control, Automation and Systems, vol. 10, no. 5, pp. 1023–1031, 2012. W. Zeng and M. Y. Chow, “Optimal trade-off between performance and security in networked control systems based on coevolutionary algorithms,” IEEE Trans. on Industrial Electronics, vol. 59, pp. 3016–3025, 2012. W. Zeng and M.-Y. Chow, “Modeling and optimizing the performance-security trade-off in D-NCS using the coevolutionary paradigm,” IEEE Trans. on Industrial Informatics, Special Section on Advances in Theories and Industrial Applications of Networked Control Systems, vol. 9, no. 1, pp. 394–402, 2013. B. Liu, Y. Xia, M. S. Mahmoud, H. Wu, and S. Cui, “New predictive control scheme for networked control systems,” Circuits, Systems, and Signal Processing, vol. 31, no. 3, pp. 945–960, 2012. M. S. Mahmoud, “H ∞ control of uncertain fuzzy networked control systems with state quantization,” Journal of Intelligent Control and Automation, vol. 3, no. 1, pp. 59–70, 2012. M. S. Mahmoud, “Improved networked-control systems approach with communication constraint,” IMA Journal of Mathematical Control and Information, vol. 29, no. 2, pp. 215–233, 2013. G. P. Liu, Y. Xia, J. Chen, D. Rees, and W. Hu, “Networked predictive control of systems with random network delays in both forward and feedback channels,” IEEE Trans. Ind. Electron, vol. 54, no. 3, pp. 1282–1296, 2007. G. P. Liu, J. X. Mu, and D. Rees, “Design and stability analysis of networked control systems with random communication time delay using the modified MPC,” Int. J. Control. Autom. Syst., vol. 79, no. 4, pp. 288–297, 2006. L. Shi, L. Xie, and R. M. Murray, “Kalman filtering over a packet-delaying network: a probabilistic approach,” Automatica, vol. 45, no. 9, pp. 2134–2140, 2009. T. Mukherjee and S. K. S. Gupta, “A modeling framework for evaluating effectiveness of smartinfrastructure crises management systems,” Proc. of the IEEE International Conference on Technologies for Homeland Security, Waltham, May 2008. A. Creery and E. J. Byres, “Industrial cyber security for power system and SCADA networks,” Proc. of the Industry Applications Society Petroleum and Chemical Industry Conference, 12–14, pp. 303–309, 2005. Z. Pang, L. Guoping, and Z. Donghua, “Detection of deception attacks on the backward channel of networked control systems,” Proc. of IEEE Control Conference, pp. 5972–5977, 2012. A. Teixeira, H. Sandberg, and K. H. Johansson, “Networked control systems under cyber attacks with applications to power networks,” Proc. of the IEEE American Control Conference, pp. 3690–3696, 2010. A. A. Cárdenas, S. Amin, Z. S. Lin, Y. L. Huang, C. Y. Huang, and S. Sastry, “Attacks against process control systems: risk assessment, detection, and response,” Proc. of the ACM Symposium on Information, Computer and Communications Security, pp. 355–366, 2011. A. A. Cárdenas, S. Amin, and S. Sastry, “Research challenges for the security of control systems,” Proc. of the USENIX Association in Hot Topics in Security, pp. 1–6, 2008. D. Dzung, M. Naedele, T. P. Von Hoff, and M. Crevatin, “Security for industrial communication systems,” Proc. of IEEE, vol. 93, no. 6, pp. 1152–1177, June 2005. H. W. Gomma and A. Allam, “Spread spectrum and noise rejection with application to ILC controlled systems,” Proc. of the IEEE Conference in Control Applications, pp. 1615–162, 2012. R. L. Pickholtz, D. L. Schilling, and L. B. Milstein, “Theory of spread-spectrum communications-a tutorial,” IEEE Trans. on Communications, vol. 30, no. 5, pp. 855–884, 1982. K. Fazel, “Performance of CDMA/OFDM for mobile communication system,” Proc. of the IEEE International Conference on Universal Personal Communications, pp. 975–979, 1993. A. J. Viterbi, CDMA: Principles of Spread Spectrum Communications, Addison Wesley, 1995. B. Sklar, Digital Communication, Fundamentals and Applications, 2nd edition, Pearson Education, 2005. Y. Q. Chen and K. L. Moore, “An optimal design of PD-type iterative learning control with monotonic convergence,” Proc. of the IEEE International Symposium on Intelligent Control, pp. 55–60, 2002. C. K. Chen and J. Hwang, “PD-type iterative learning control for the trajectory tracking of a pneumatic X-Y table with disturbances,” JSME International Journal, vol. 49, no. 2, pp. 520–526, 2006.