Secure Control: Towards Survivable Cyber-Physical Systems

In this position paper we investigate the security of cyber-physical systems. We (1) identify and define the problem of secure control, (2) investigate the defenses that information security and control theory can provide, and (3) propose a set of challenges that need to be addressed to improve the survivability of cyber-physical systems.

[1]  T. Potok,et al.  CRITICAL ENERGY INFRASTRUCTURE SURVIVABILITY , INHERENT LIMITATIONS , 2004 .

[2]  Ya-Chin Chang,et al.  A SCADA system reliability evaluation considering performance requirement , 2004, 2004 International Conference on Power System Technology, 2004. PowerCon 2004..

[3]  Leonard M. Adleman,et al.  An Abstract Theory of Computer Viruses , 1988, CRYPTO.

[4]  David A. Wagner,et al.  TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.

[5]  George Scalise,et al.  Leadership Under Challenge: Information Technology R&D in a Competitive World. An Assessment of the Federal Networking and Information Technology R&D Program , 2007 .

[6]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[7]  Robert W. Shirey,et al.  Internet Security Glossary , 2000, RFC.

[8]  Gianfranco Ciardo,et al.  SMART: the stochastic model checking analyzer for reliability and timing , 2004, First International Conference on the Quantitative Evaluation of Systems, 2004. QEST 2004. Proceedings..

[9]  Matt Bishop,et al.  What Is Computer Security? , 2003, IEEE Secur. Priv..

[10]  Robert J. Turk Cyber Incidents Involving Control Systems , 2005 .

[11]  João Pedro Hespanha,et al.  A Survey of Recent Results in Networked Control Systems , 2007, Proceedings of the IEEE.

[12]  Sasikanth Avancha,et al.  Security for Sensor Networks , 2004 .

[13]  Virgil D. Gligor A Note on Denial-of-Service in Operating Systems , 1984, IEEE Transactions on Software Engineering.

[14]  Dawn Xiaodong Song,et al.  Secure hierarchical in-network aggregation in sensor networks , 2006, CCS '06.

[15]  John A. Stankovic,et al.  Security in wireless sensor networks , 2004, SASN '04.

[16]  Bruce Schneier,et al.  Managed Security Monitoring: Network Security for the 21st Centur , 2001, Comput. Secur..

[17]  Panos J. Antsaklis,et al.  Supervisory Control of Concurrent Systems: A Petri Net Structural Approach (M.V. Iordache and P.J. Antsaklis; 2008) [Book reviews] , 2006, IEEE Transactions on Automatic Control.

[18]  J. Knight,et al.  ON THE DEFINITION OF SURVIVABILITY , 2000 .

[19]  Adrian Perrig,et al.  Don't Sweat Your Privacy Using Humidity to Detect Human Presence , 2007 .

[20]  G. Manimaran,et al.  Vulnerability Assessment of Cybersecurity for SCADA Systems , 2008, IEEE Transactions on Power Systems.

[21]  Adrian Perrig,et al.  On the distribution and revocation of cryptographic keys in sensor networks , 2005, IEEE Transactions on Dependable and Secure Computing.

[22]  Qing Zhang,et al.  A Framework for Identifying Compromised Nodes in Sensor Networks , 2006, 2006 Securecomm and Workshops.

[23]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.

[24]  Adrian Perrig,et al.  Secure sensor network routing: a clean-slate approach , 2006, CoNEXT '06.

[25]  Ian R. Petersen,et al.  Robust Kalman Filtering for Signals and Systems with Large Uncertainties , 1999 .

[26]  Hongnian Yu,et al.  Petri net-based closed-loop control and on-line scheduling of the batch process plant , 1998 .

[27]  Jerome H. Saltzer,et al.  The protection of information in computer systems , 1975, Proc. IEEE.

[28]  Carl E. Landwehr,et al.  Basic concepts and taxonomy of dependable and secure computing , 2004, IEEE Transactions on Dependable and Secure Computing.

[29]  David A. Wagner,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Ad Hoc Networks.

[30]  Matt Bishop,et al.  Computer Security: Art and Science , 2002 .

[31]  Bruno Sinopoli,et al.  Foundations of Control and Estimation Over Lossy Networks , 2007, Proceedings of the IEEE.

[32]  R. Olfati-Saber,et al.  Distributed Kalman Filter with Embedded Consensus Filters , 2005, Proceedings of the 44th IEEE Conference on Decision and Control.

[33]  Boudewijn R. Haverkort Performance of computer communication systems , 1998 .

[34]  Vincent D. Blondel,et al.  Fault tolerant control: a simultaneous stabilization result , 2004, IEEE Transactions on Automatic Control.

[35]  John McHugh,et al.  Survivable Network Analysis Method , 2000 .

[36]  Dawn Xiaodong Song,et al.  Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..

[37]  Boudewijn R. Haverkort,et al.  Model checking for survivability! , 2005, Second International Conference on the Quantitative Evaluation of Systems (QEST'05).

[38]  Michel Kinnaert,et al.  Diagnosis and Fault-Tolerant Control , 2006 .

[39]  M. Luk,et al.  MiniSec: A Secure Sensor Network Communication Architecture , 2007, 2007 6th International Symposium on Information Processing in Sensor Networks.

[40]  H. Vincent On Minimax Robustness: A General Approach and Applications , 1984 .

[41]  Leslie Lamport,et al.  The Byzantine Generals Problem , 1982, TOPL.