2020
DOI: 10.1145/3380866
|View full text |Cite
|
Sign up to set email alerts
|

Integrating Security in Resource-Constrained Cyber-Physical Systems

Abstract: Defense mechanisms against network-level attacks are commonly based on the use of cryptographic techniques, such as lengthy message authentication codes (MAC) that provide data integrity guarantees. However, such mechanisms require significant resources (both computational and network bandwidth), which prevents their continuous use in resource-constrained cyber-physical systems (CPS). Recently, it was shown how physical properties of controlled systems can be exploited to relax these stringent requirements for… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
11
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
2
2

Relationship

1
7

Authors

Journals

citations
Cited by 25 publications
(12 citation statements)
references
References 41 publications
0
11
0
Order By: Relevance
“…A body of existing work also explores enhancing security in legacy networks (e.g., based on CAN bus) by retrofitting of authentication services (e.g., [23]) or modifying the execution paradigm (e.g., [24]). All these works rely on the ability to perform some level of modification to the firmware executed by legacy ECUs (e.g., running additional security services, performing changes to real-time scheduling policies, etc.…”
Section: Related Work and Discussionmentioning
confidence: 99%
“…A body of existing work also explores enhancing security in legacy networks (e.g., based on CAN bus) by retrofitting of authentication services (e.g., [23]) or modifying the execution paradigm (e.g., [24]). All these works rely on the ability to perform some level of modification to the firmware executed by legacy ECUs (e.g., running additional security services, performing changes to real-time scheduling policies, etc.…”
Section: Related Work and Discussionmentioning
confidence: 99%
“…To perform an extensive comparison, we generate 1000 trials under each parameter setting. Each trial contains a task set T = {τ 1 , τ 2 , ..., τ n }, where n ∈ [1,50]. The task periods are randomly set in [10,10000].…”
Section: A Experimental Setupmentioning
confidence: 99%
“…However, the network scheduling is not guaranteed to be real-time because of the CAN protocol considered in the model. The work in [50] studies how to integrate security guarantees with end-toend timeliness requirements for control tasks in resourceconstrained NCSs. The proposed sensing-control-actuation model is similar to our CRS model, but the sensing, computing and actuating segments in the proposed model have designed release times and deadlines.…”
Section: Related Workmentioning
confidence: 99%
“…Among many different CPS attacks, FDIA can be considered to be one of the most prominent attacks [5]. The FDIA injects a modified control input [13] or modified measurement [17] [18] or both [8] to degrade the performance of a control system. Even though FDIA was considered as a specific deception attack in the sense that the FDIA as the attack to the state estimator [6], MitM, FDIA, a replay attack and a deception attack [11] can be regarded as the attack of the same class.…”
Section: Introductionmentioning
confidence: 99%
“…To improve the state estimation in the presence of FDIA on measurement data, deep learning with a generative adversarial network (GAN) was also introduced [17]. Attack detector and the intermittent message authentication were proposed to improve robust control for CPS operating on the resource-constrained network in the presence of the FDIA at the measurement [18].…”
Section: Introductionmentioning
confidence: 99%