Experimental Validation of Encrypted Controller Implemented on Raspberry Pi

This study validates an encrypted controller using a practical networked control system implemented on Raspberry Pi with a dc motor. The encrypted controller is able to conceal not only the signals over communication links in the control systems but also the controller parameters. Experimental validation confirms that the signals and parameters inside the controller are concealed and that the processing related to the encrypted controller is done in realtime.

[1]  Taher El Gamal A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, IEEE Trans. Inf. Theory.

[2]  Zhong-Hua Pang,et al.  Secure transmission mechanism for networked control systems under deception attacks , 2011, 2011 IEEE International Conference on Cyber Technology in Automation, Control, and Intelligent Systems.

[3]  Takahiro Fujita,et al.  Cyber-security enhancement of networked control systems using homomorphic encryption , 2015, 2015 54th IEEE Conference on Decision and Control (CDC).

[4]  Paulo Tabuada,et al.  Secure Estimation and Control for Cyber-Physical Systems Under Adversarial Attacks , 2012, IEEE Transactions on Automatic Control.

[5]  Francesco Bullo,et al.  Control-Theoretic Methods for Cyberphysical Security: Geometric Principles for Optimal Cross-Layer Resilient Control Systems , 2015, IEEE Control Systems.

[6]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[7]  Karl Henrik Johansson,et al.  Cyberphysical Security in Networked Control Systems: An Introduction to the Issue , 2015 .

[8]  Bruno Sinopoli,et al.  Secure control against replay attacks , 2009, 2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[9]  T. Elgamal A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.

[10]  F. Bullo,et al.  Control-Theoretic Methods for Cyber-Physical Security , 2013 .

[11]  Hiroaki Nishino,et al.  Distributed Detection of Cyber Attacks and Faults for Power Systems , 2014 .

[12]  Quanyan Zhu,et al.  Robust and resilient control design for cyber-physical systems with an application to power systems , 2011, IEEE Conference on Decision and Control and European Control Conference.

[13]  Yoshizumi Serizawa,et al.  Security technologies, usage and guidelines in SCADA system networks , 2009, 2009 ICCAS-SICE.

[14]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.