2018 ACM/IEEE 9th International Conference on Cyber-Physical Systems (ICCPS) 2018
DOI: 10.1109/iccps.2018.00011
|View full text |Cite
|
Sign up to set email alerts
|

Cyber-Physical System Checkpointing and Recovery

Abstract: Transitioning to more open architectures has been making Cyber-Physical Systems (CPS) vulnerable to malicious attacks that are beyond the conventional cyber attacks. This paper studies attack-resilience enhancement for a system under emerging attacks in the environment of the controller. An effective way to address this problem is to make system state estimation accurate enough for control regardless of the compromised components. This work follows this way and develops a procedure named CPS checkpointing and … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
18
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 51 publications
(19 citation statements)
references
References 23 publications
1
18
0
Order By: Relevance
“…Thus a time dependent value of the failure probability g will need to be considered in this case. Finally, as far as security is concerned, ALCR can be used to disrupt attackers (e.g., [40]), while it can be also exploited by malicious individuals to increase the workload of the system, potentially leading to a form of Denial of Service through workload saturation. Thus the interaction of ALCR and checkpointing in general, and security, is also a worthwhile subject of investigation.…”
Section: Discussionmentioning
confidence: 99%
“…Thus a time dependent value of the failure probability g will need to be considered in this case. Finally, as far as security is concerned, ALCR can be used to disrupt attackers (e.g., [40]), while it can be also exploited by malicious individuals to increase the workload of the system, potentially leading to a form of Denial of Service through workload saturation. Thus the interaction of ALCR and checkpointing in general, and security, is also a worthwhile subject of investigation.…”
Section: Discussionmentioning
confidence: 99%
“…For this reason, our rollback fails if any actuator that needs to be changed is currently faulty (lines 6-7). We note that this captures the heterogeneous nature of IoT devices when compared to similar functions in distributed systems [28] and cyber-physical systems [32]. We also implement a data rollback as part of the system rollback.…”
Section: B Environment-based Functionsmentioning
confidence: 99%
“…The focus of this work relies on resilient architectures taking into account that the resilient attribute is relevant to maintain the operation level of a stabilized UAV, even in the case of successful exploration (CHEN et al, 2019;ORDOUKHANIAN;MADNI, 2019;KONG et al, 2018;YOON et al, 2017;ORDOUKHANIAN;MADNI, 2016;VEGA et al, 2015).…”
Section: Resilient Architectures For Uavsmentioning
confidence: 99%
“…The authors Kong et al (2018) address the improvement of system resilience to emerging attacks in the controlled environment, such as sensor attacks. Consequently, the authors developed a procedure called checkpoint and recovery, using historical data to recover the failed system states.…”
Section: Resilient Architectures For Uavsmentioning
confidence: 99%
See 1 more Smart Citation