Attack-tolerant networked control system in presence of the controller hijacking attack - Archive ouverte HAL Accéder directement au contenu
Communication Dans Un Congrès Année : 2016

Attack-tolerant networked control system in presence of the controller hijacking attack

Résumé

In this paper, an enhancement for the attacktolerant scheme in the Networked Control System (NCS) is introduced. The objective is to be able to react to an attack such as the Stuxnet case where the controller is reprogrammed and hijacked. The advantage of this proposed approach is that there is no need for a priori mathematical model of the controller. In order to implement the proposed scheme, a specific detector for the controller hijacking attack is designed. The performance of this scheme is evaluated be connected the detector to NCS with basic security elements such as Data Encryption Standard (DES), Message Digest (MD5), and timestamp. The test results of the proposed method show that the hijacked controller can be significantly detected and recovered.
Fichier non déposé

Dates et versions

hal-01413883 , version 1 (11-12-2016)

Identifiants

Citer

Amer Atta Yaseen, Mireille Bayart. Attack-tolerant networked control system in presence of the controller hijacking attack. 2016 International Conference on Military Communications and Information Systems (ICMCIS), , Royal Military Academy, Royal Higher Institute for Defence, May 2016, Bruxelles, Belgium. ⟨10.1109/ICMCIS.2016.7496582⟩. ⟨hal-01413883⟩
107 Consultations
0 Téléchargements

Altmetric

Partager

Gmail Facebook X LinkedIn More