Network steganography based security framework for cyber-physical systems

被引:7
|
作者
Zhang, Xiao-Guang [1 ,3 ]
Yang, Guang-Hong [1 ,2 ]
Ren, Xiu-Xiu [1 ]
机构
[1] Northeastern Univ, Coll Informat Sci & Engn, Shenyang 110819, Peoples R China
[2] Northeastern Univ, State Key Lab Synthet Automat Proc Ind, Shenyang 110819, Liaoning, Peoples R China
[3] Shanghai Intelligent Qual Technol Co Ltd, Shanghai 201801, Peoples R China
基金
中国国家自然科学基金;
关键词
Cyber-physical systems; Network steganography; Covert channel; Attack detection; Eavesdropping attack defense; REMOTE STATE ESTIMATION; ATTACKS;
D O I
10.1016/j.ins.2022.07.081
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper proposes a novel network steganography (NS) based security framework to ensure the security operation of the cyber-physical systems (CPSs). Firstly, a new covert channel is established to conceal the existence of the secret data exchange by exploiting the dynamical system's measurements with no extra communication overhead. The covert channel evades the imperceptible and statistical detections in an effective manner. Next, combining covert transmission with data consistency, a data-based attack detection methodology is explored, which is capable of detecting a broad class of cyber-attacks and differs from the existing detection methods that enhance detection performance by degrading system performance or adding redundant systems. Then, combining covert transmission with simple linear encryption, an eavesdropping defense methodology is pro-posed, which guarantees that the authorized user's estimation performance is optimal and renders the eavesdropper's error covariance unbounded. Moreover, the detection and defense methods take small memory and computational overhead of the embedded sys-tem, which ensures the ease of implementation in real-world systems. Finally, the effec-tiveness of the proposed security framework is demonstrated by a proof-of-concept implementation on a CPS prototype called permanent magnet synchronous machine (PMSM) monitoring system.(c) 2022 Elsevier Inc. All rights reserved.
引用
收藏
页码:963 / 983
页数:21
相关论文
共 50 条
  • [21] A survey on the security of cyber-physical systems
    Wu G.
    Sun J.
    Chen J.
    Control Theory and Technology, 2016, 14 (1) : 2 - 10
  • [22] Cyber-physical systems and their security issues
    Alguliyev, Rasim
    Imamverdiyev, Yadigar
    Sukhostat, Lyudmila
    COMPUTERS IN INDUSTRY, 2018, 100 : 212 - 223
  • [23] Safety and security of cyber-physical systems
    Biro, Miklos
    Mashkoor, Atif
    Sametinger, Johannes
    JOURNAL OF SOFTWARE-EVOLUTION AND PROCESS, 2023, 35 (07)
  • [24] Analysis of security in cyber-physical systems
    CHEN Jie
    ZHANG Fan
    SUN Jian
    Science China(Technological Sciences), 2017, (12) : 1975 - 1977
  • [25] Cyber-Physical Systems: A Security Perspective
    Konstantinou, Charalambos
    Maniatakos, Michail
    Saqib, Fareena
    Hu, Shiyan
    Plusquellic, Jim
    Jin, Yier
    2015 20TH IEEE EUROPEAN TEST SYMPOSIUM (ETS), 2015,
  • [26] Cyber-Physical Systems Security and Privacy
    Henkel, Jorg
    IEEE DESIGN & TEST, 2017, 34 (04) : 4 - 4
  • [27] A Survey on Cyber-Physical Systems Security
    Yu, Zhenhua
    Gao, Hongxia
    Cong, Xuya
    Wu, Naiqi
    Song, Houbing Herbert
    IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (24) : 21670 - 21686
  • [28] Security Enumerations for Cyber-Physical Systems
    Schlette, Daniel
    Menges, Florian
    Baumer, Thomas
    Pernul, Guenther
    DATA AND APPLICATIONS SECURITY AND PRIVACY XXXIV, DBSEC 2020, 2020, 12122 : 64 - 76
  • [29] Modeling security in cyber-physical systems
    Burmester, Mike
    Magkos, Ernmanouil
    Chrissikopoulos, Vassilis
    INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2012, 5 (3-4) : 118 - 126
  • [30] TRIPLE: A blockchain-based digital twin framework for cyber-physical systems security
    Suhail, Sabah
    Iqbal, Mubashar
    Hussain, Rasheed
    Malik, Saif Ur Rehman
    Jurdak, Raja
    JOURNAL OF INDUSTRIAL INFORMATION INTEGRATION, 2024, 42