Visible to the public Response and reconfiguration of cyber-physical control systems: A survey

TitleResponse and reconfiguration of cyber-physical control systems: A survey
Publication TypeConference Paper
Year of Publication2015
AuthorsCómbita, L. F., Giraldo, J., Cárdenas, A. A., Quijano, N.
Conference Name2015 IEEE 2nd Colombian Conference on Automatic Control (CCAC)
PublisherIEEE
ISBN Number978-1-4673-9305-8
Keywordsactuators, attack protection, cyber-physical control system, detection mechanism, distributed embedded computing, embedded computer, Embedded systems, game theory, Games, isolation mechanism, pubcrawl170107, Redundancy, reliability, security, security mechanism, security of data, Sensor systems
Abstract

The integration of physical systems with distributed embedded computing and communication devices offers advantages on reliability, efficiency, and maintenance. At the same time, these embedded computers are susceptible to cyber-attacks that can harm the performance of the physical system, or even drive the system to an unsafe state; therefore, it is necessary to deploy security mechanisms that are able to automatically detect, isolate, and respond to potential attacks. Detection and isolation mechanisms have been widely studied for different types of attacks; however, automatic response to attacks has attracted considerably less attention. Our goal in this paper is to identify trends and recent results on how to respond and reconfigure a system under attack, and to identify limitations and open problems. We have found two main types of attack protection: i) preventive, which identifies the vulnerabilities in a control system and then increases its resiliency by modifying either control parameters or the redundancy of devices; ii) reactive, which responds as soon as the attack is detected (e.g., modifying the non-compromised controller actions).

URLhttp://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7345181&isnumber=7345173
DOI10.1109/CCAC.2015.7345181
Citation Keycombita_response_2015