Improvement of Networked Control Systems Performance Using a New Encryption Algorithm
Subject Areas : Renewable energySeyed Ali Mesbahifard 1 , Benyamin Hagh Niaz Jahrimi 2 , Pooya Hajebi 3 , Seyed Mohammad Taghi Almadrasi 4
1 - Yazd University
2 - Yazd University
3 - Yazd University
4 - Yazd University
Keywords: Security, Encryption, Time delay, Deception attack, networked control systems,
Abstract :
Networked control systems are control systems which controllers and plants are connected via telecommunication network. One of the most important challenges in networked control systems is the problem of network time delay. Increasing of time delay may affect on control system performance extremely. Other important issue in networked control systems is the security problems. Since it is possible that unknown people access to network especially Internet, the probability of terrible attacks such as deception attacks is greater, therefore presentation of methods which could decrease time delay and increase system immunity are desired. In this paper a symmetric encryption with low data volume against deception attacks is proposed. This method has high security and low time delay rather than the other encryption algorithms and could improve the control system performance against deception attacks.
[1] J.P. Hespanha, P. Naghshtabriz, Y. Xu, "A survey of recent results in networked control systems", Proc. IEEE, Vol. 95, No. 1, Jan. 2007.
[2] U.S. Department of Energy, Office of Energy Assurance, 21 Steps to Improve Cyber. Security of SCADA Networks, 2003.
[3] K. Scarfone, P. Mell, "Guide to intrusion detection and prevention systems (IDPS)", NIST(National Institute of Standards and Technology), 2007.
[4] A. Creery, E.J. Byres, "Industrial cybersecurity for power system and SCADA networks", In Proc. 52nd Annu. Petroleum Chemical Industry Conf. Ind. Appli. Soc., pp.303-309, 2005.
[5] S. Amin, G.A. Schwartz, S.S. Sastry, "Security of interdependent and identical networked control systems", Automatica, Vol. 49, No.1, pp. 186-192, Jan. 2013.
[6] K. Yuan, J. Chen, G. Liu, J. Sun, "Design and implementation of data encryption for networked control systems", In Proc. IEEE Int. Conf. Sys., Man, and Cybern., pp. 2105-2109, 2009.
[7] Z. Pang, G. Zheng, G. Liu, C. Luo, "Secure transmission mechanism for networked control systems under deception attacks", In Proc. IEEE Int. Conf. Cyber Technology Automation, Control, and Intelligent Syst., pp. 27-32, 2011.
[8] P. Hua, L. Guoping, "Secure networked control systems under data integrity attacks", In Proc. 29th Chinese Control Conf., Beijing, China, pp. 5765-5771, 2010.
[9] R.A Gupta, M. Chow, "Performance assessment and compensation for secure networked control systems", In Proc. 34th Annu. Conf. IEEE Ind. Electron., pp. 2929-2934, 2008.
[10]W. Zeng, M. Chow, "Optimal tradeoff between performance and security in networked control systems based on coevolutionary algorithms", IEEE Trans. Ind. Electron., Vol. 59, No.7, pp. 3016-3025, July 2012.
[11] W. Zeng, M. Chow, "A trade-off model for performance and security in secured networked control systems", In Proc IEEE Int. Sympos. Ind. Electron. pp. 1997-2002, 2011.
[12] P. Hajebi, S.M.T. AlModarresi, "Online adaptive fuzzy logic controller using neural network for networked control systems", In Proc. 14th Int. Conf. Advanced Commun. Technology, pp. 888-893, 2012.
[13] P. Hajebi, S.M.T. AlModarresi, "Online adaptive fuzzy logic controller using genetic algorithm and neural network for networked control systems", ICACT Trans. Advanced Commun. Technology, Vol. 1, No. 3, pp. 88-98, Nov. 2012.
_||_