Detection and Mitigation of False Data Injection Attacks for Secure Interactive Networked Control Systems
Title | Detection and Mitigation of False Data Injection Attacks for Secure Interactive Networked Control Systems |
Publication Type | Conference Paper |
Year of Publication | 2018 |
Authors | Kubo, Ryogo |
Conference Name | 2018 IEEE International Conference on Intelligence and Safety for Robotics (ISR) |
ISBN Number | 978-1-5386-5547-4 |
Keywords | Acceleration, bilateral teleoperation systems, Communication channels, composability, control engineering computing, control systems, cyber physical systems, cybersecurity, Delay effects, delays, False Data Detection, false data injection attacks, Force, Human Behavior, Internet, master-to-slave paths, mitigation method, networked control systems, position control, pubcrawl, resilience, Resiliency, robots, secure interactive networked control systems, security of data, slave robots, slave sides, slave-to-master paths, tamper detection observer |
Abstract | Cybersecurity in control systems has been actively discussed in recent years. In particular, networked control systems (NCSs) over the Internet are exposed to various types of cyberattacks such as false data injection attacks. This paper proposes a detection and mitigation method of the false data injection attacks in interactive NCSs, i.e., bilateral teleoperation systems. A bilateral teleoperation system exchanges position and force information through the Internet between the master and slave robots. The proposed method utilizes two redundant communication channels for both the master-to-slave and slave-to-master paths. The attacks are detected by a tamper detection observer (TDO) on each of the master and slave sides. The TDO compares the position responses of actual robots and robot models. A path selector on each side chooses the appropriate position and force responses from the responses received through the two communication channels, based on the outputs of the TDO. The proposed method is validated by simulations with attack models. |
URL | https://ieeexplore.ieee.org/document/8535978 |
DOI | 10.1109/IISR.2018.8535978 |
Citation Key | kubo_detection_2018 |
- internet
- tamper detection observer
- slave-to-master paths
- slave sides
- slave robots
- security of data
- secure interactive networked control systems
- robots
- Resiliency
- resilience
- pubcrawl
- position control
- networked control systems
- mitigation method
- master-to-slave paths
- Acceleration
- Human behavior
- Force
- false data injection attacks
- False Data Detection
- delays
- Delay effects
- Cybersecurity
- cyber physical systems
- control systems
- control engineering computing
- composability
- Communication channels
- bilateral teleoperation systems