HAL will be down for maintenance from Friday, June 10 at 4pm through Monday, June 13 at 9am. More information
Skip to Main content Skip to Navigation
Conference papers

Attack-tolerant networked control system: an approach for detection the controller stealthy hijacking attack

Abstract : In this work, a new approach will be introduced as a development for the attack-tolerant scheme in the Networked Control System (NCS). The objective is to be able to detect to an attack such as the Stuxnet case where the controller is reprogrammed and hijacked. Beside the ability to detect the stealthy controller hijacking attack. The advantage of this approach is that there is no need for a priori mathematical model of the controller. In order to implement the proposed scheme, a specific detector for the controller hijacking attack is designed. The performance of this scheme is evaluated be connected the detector to NCS with basic security elements such as Data Encryption Standard (DES), Message Digest (MD5), and timestamp. The detector is tested along with networked PID controller under stealthy hijacking attack. The test results of the proposed method show that the hijacked controller can be significantly detected and recovered.
Complete list of metadata

https://hal.archives-ouvertes.fr/hal-01413891
Contributor : Mireille Bayart Connect in order to contact the contributor
Submitted on : Sunday, December 11, 2016 - 6:27:48 PM
Last modification on : Wednesday, March 23, 2022 - 3:51:24 PM

Identifiers

  • HAL Id : hal-01413891, version 1

Citation

Amer Yaseen, Mireille Bayart. Attack-tolerant networked control system: an approach for detection the controller stealthy hijacking attack. ACD 2016, ADVANCED CONTROL AND DIAGNOSIS, Nov 2016, Lille, France. ⟨hal-01413891⟩

Share

Metrics

Record views

119