Cargando…
Identification of Data Injection Attacks in Networked Control Systems Using Noise Impulse Integration †
The benefits of using Networked Control Systems (NCS) in the growing Industry 4.0 are numerous, including better management and operational capabilities, as well as costs reduction. However, despite these benefits, the use of NCSs can also expose physical plants to new threats originated in the cybe...
Autores principales: | , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2020
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7038783/ https://www.ncbi.nlm.nih.gov/pubmed/32024000 http://dx.doi.org/10.3390/s20030792 |
_version_ | 1783500713575317504 |
---|---|
author | Oliveira de Sá, Alan Casimiro, António Machado, Raphael C. S. Carmo, Luiz F. R. da C. |
author_facet | Oliveira de Sá, Alan Casimiro, António Machado, Raphael C. S. Carmo, Luiz F. R. da C. |
author_sort | Oliveira de Sá, Alan |
collection | PubMed |
description | The benefits of using Networked Control Systems (NCS) in the growing Industry 4.0 are numerous, including better management and operational capabilities, as well as costs reduction. However, despite these benefits, the use of NCSs can also expose physical plants to new threats originated in the cyber domain—such as data injection attacks in NCS links through which sensors and controllers transmit signals. In this sense, this work proposes a link monitoring strategy to identify linear time-invariant (LTI) functions executed during controlled data injection attacks by a Man-in-the-Middle hosted in an NCS link. The countermeasure is based on a bioinspired metaheuristic, called Backtracking Search Optimization Algorithm (BSA), and uses white Gaussian noise to excite the attack function. To increase the accuracy of this countermeasure, it is proposed the Noise Impulse Integration (NII) technique, which is developed using the radar pulse integration technique as inspiration. The results demonstrate that the proposed countermeasure is able to accurately identify LTI attack functions, here executed to impair measurements transmitted by the plant sensor, without interfering with the NCS behavior when the system is in its normal operation. Moreover, the results indicate that the NII technique can increase the accuracy of the attack identification. |
format | Online Article Text |
id | pubmed-7038783 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2020 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-70387832020-03-09 Identification of Data Injection Attacks in Networked Control Systems Using Noise Impulse Integration † Oliveira de Sá, Alan Casimiro, António Machado, Raphael C. S. Carmo, Luiz F. R. da C. Sensors (Basel) Article The benefits of using Networked Control Systems (NCS) in the growing Industry 4.0 are numerous, including better management and operational capabilities, as well as costs reduction. However, despite these benefits, the use of NCSs can also expose physical plants to new threats originated in the cyber domain—such as data injection attacks in NCS links through which sensors and controllers transmit signals. In this sense, this work proposes a link monitoring strategy to identify linear time-invariant (LTI) functions executed during controlled data injection attacks by a Man-in-the-Middle hosted in an NCS link. The countermeasure is based on a bioinspired metaheuristic, called Backtracking Search Optimization Algorithm (BSA), and uses white Gaussian noise to excite the attack function. To increase the accuracy of this countermeasure, it is proposed the Noise Impulse Integration (NII) technique, which is developed using the radar pulse integration technique as inspiration. The results demonstrate that the proposed countermeasure is able to accurately identify LTI attack functions, here executed to impair measurements transmitted by the plant sensor, without interfering with the NCS behavior when the system is in its normal operation. Moreover, the results indicate that the NII technique can increase the accuracy of the attack identification. MDPI 2020-01-31 /pmc/articles/PMC7038783/ /pubmed/32024000 http://dx.doi.org/10.3390/s20030792 Text en © 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Oliveira de Sá, Alan Casimiro, António Machado, Raphael C. S. Carmo, Luiz F. R. da C. Identification of Data Injection Attacks in Networked Control Systems Using Noise Impulse Integration † |
title | Identification of Data Injection Attacks in Networked Control Systems Using Noise Impulse Integration † |
title_full | Identification of Data Injection Attacks in Networked Control Systems Using Noise Impulse Integration † |
title_fullStr | Identification of Data Injection Attacks in Networked Control Systems Using Noise Impulse Integration † |
title_full_unstemmed | Identification of Data Injection Attacks in Networked Control Systems Using Noise Impulse Integration † |
title_short | Identification of Data Injection Attacks in Networked Control Systems Using Noise Impulse Integration † |
title_sort | identification of data injection attacks in networked control systems using noise impulse integration † |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7038783/ https://www.ncbi.nlm.nih.gov/pubmed/32024000 http://dx.doi.org/10.3390/s20030792 |
work_keys_str_mv | AT oliveiradesaalan identificationofdatainjectionattacksinnetworkedcontrolsystemsusingnoiseimpulseintegration AT casimiroantonio identificationofdatainjectionattacksinnetworkedcontrolsystemsusingnoiseimpulseintegration AT machadoraphaelcs identificationofdatainjectionattacksinnetworkedcontrolsystemsusingnoiseimpulseintegration AT carmoluizfrdac identificationofdatainjectionattacksinnetworkedcontrolsystemsusingnoiseimpulseintegration |