Cargando…

Identification of Data Injection Attacks in Networked Control Systems Using Noise Impulse Integration †

The benefits of using Networked Control Systems (NCS) in the growing Industry 4.0 are numerous, including better management and operational capabilities, as well as costs reduction. However, despite these benefits, the use of NCSs can also expose physical plants to new threats originated in the cybe...

Descripción completa

Detalles Bibliográficos
Autores principales: Oliveira de Sá, Alan, Casimiro, António, Machado, Raphael C. S., Carmo, Luiz F. R. da C.
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2020
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7038783/
https://www.ncbi.nlm.nih.gov/pubmed/32024000
http://dx.doi.org/10.3390/s20030792
_version_ 1783500713575317504
author Oliveira de Sá, Alan
Casimiro, António
Machado, Raphael C. S.
Carmo, Luiz F. R. da C.
author_facet Oliveira de Sá, Alan
Casimiro, António
Machado, Raphael C. S.
Carmo, Luiz F. R. da C.
author_sort Oliveira de Sá, Alan
collection PubMed
description The benefits of using Networked Control Systems (NCS) in the growing Industry 4.0 are numerous, including better management and operational capabilities, as well as costs reduction. However, despite these benefits, the use of NCSs can also expose physical plants to new threats originated in the cyber domain—such as data injection attacks in NCS links through which sensors and controllers transmit signals. In this sense, this work proposes a link monitoring strategy to identify linear time-invariant (LTI) functions executed during controlled data injection attacks by a Man-in-the-Middle hosted in an NCS link. The countermeasure is based on a bioinspired metaheuristic, called Backtracking Search Optimization Algorithm (BSA), and uses white Gaussian noise to excite the attack function. To increase the accuracy of this countermeasure, it is proposed the Noise Impulse Integration (NII) technique, which is developed using the radar pulse integration technique as inspiration. The results demonstrate that the proposed countermeasure is able to accurately identify LTI attack functions, here executed to impair measurements transmitted by the plant sensor, without interfering with the NCS behavior when the system is in its normal operation. Moreover, the results indicate that the NII technique can increase the accuracy of the attack identification.
format Online
Article
Text
id pubmed-7038783
institution National Center for Biotechnology Information
language English
publishDate 2020
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-70387832020-03-09 Identification of Data Injection Attacks in Networked Control Systems Using Noise Impulse Integration † Oliveira de Sá, Alan Casimiro, António Machado, Raphael C. S. Carmo, Luiz F. R. da C. Sensors (Basel) Article The benefits of using Networked Control Systems (NCS) in the growing Industry 4.0 are numerous, including better management and operational capabilities, as well as costs reduction. However, despite these benefits, the use of NCSs can also expose physical plants to new threats originated in the cyber domain—such as data injection attacks in NCS links through which sensors and controllers transmit signals. In this sense, this work proposes a link monitoring strategy to identify linear time-invariant (LTI) functions executed during controlled data injection attacks by a Man-in-the-Middle hosted in an NCS link. The countermeasure is based on a bioinspired metaheuristic, called Backtracking Search Optimization Algorithm (BSA), and uses white Gaussian noise to excite the attack function. To increase the accuracy of this countermeasure, it is proposed the Noise Impulse Integration (NII) technique, which is developed using the radar pulse integration technique as inspiration. The results demonstrate that the proposed countermeasure is able to accurately identify LTI attack functions, here executed to impair measurements transmitted by the plant sensor, without interfering with the NCS behavior when the system is in its normal operation. Moreover, the results indicate that the NII technique can increase the accuracy of the attack identification. MDPI 2020-01-31 /pmc/articles/PMC7038783/ /pubmed/32024000 http://dx.doi.org/10.3390/s20030792 Text en © 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Oliveira de Sá, Alan
Casimiro, António
Machado, Raphael C. S.
Carmo, Luiz F. R. da C.
Identification of Data Injection Attacks in Networked Control Systems Using Noise Impulse Integration †
title Identification of Data Injection Attacks in Networked Control Systems Using Noise Impulse Integration †
title_full Identification of Data Injection Attacks in Networked Control Systems Using Noise Impulse Integration †
title_fullStr Identification of Data Injection Attacks in Networked Control Systems Using Noise Impulse Integration †
title_full_unstemmed Identification of Data Injection Attacks in Networked Control Systems Using Noise Impulse Integration †
title_short Identification of Data Injection Attacks in Networked Control Systems Using Noise Impulse Integration †
title_sort identification of data injection attacks in networked control systems using noise impulse integration †
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7038783/
https://www.ncbi.nlm.nih.gov/pubmed/32024000
http://dx.doi.org/10.3390/s20030792
work_keys_str_mv AT oliveiradesaalan identificationofdatainjectionattacksinnetworkedcontrolsystemsusingnoiseimpulseintegration
AT casimiroantonio identificationofdatainjectionattacksinnetworkedcontrolsystemsusingnoiseimpulseintegration
AT machadoraphaelcs identificationofdatainjectionattacksinnetworkedcontrolsystemsusingnoiseimpulseintegration
AT carmoluizfrdac identificationofdatainjectionattacksinnetworkedcontrolsystemsusingnoiseimpulseintegration