A trade-off model for performance and security in secured Networked Control Systems

Networked Control Systems (NCS) is a fast growing technology that integrates distributed sensors, actuators, and computing processors over a communication network for a vast amount of applications. However, the NCS can be vulnerable to various network attacks when the network used is insecure (e.g., Internet). Thus, secure NCS need to have embedded security mechanism to ensure its security operating requirements, which may sacrifice its performance due to limited system resources. This paper addresses the trade-off between NCS security and its real-time performance and use a secured networked DC motor system for illustration. This paper will present a trade-off model for system dynamic performance and system security. This model can be used to adapt security configurations to provide sufficient protection and satisfy real-time dynamic performance requirements of the NCS simultaneously. The construction of this model includes the development of a set of metrics to quantitatively measure the performance and security levels of NCS and the development of a trade-off objective function incorporating performance and security. A Simulink based test-bed implemented to control the speed of the DC motor is used to illustrate the effectiveness of this model.

[1]  Mo-Yuen Chow,et al.  Optimal Stabilizing Gain Selection for Networked Control Systems With Time Delays and Packet Losses , 2009, IEEE Transactions on Control Systems Technology.

[2]  Wenye Wang,et al.  Information security with real-time operation: performance assessment for next generation wireless distributed networked-control-systems , 2007, IECON 2007 - 33rd Annual Conference of the IEEE Industrial Electronics Society.

[3]  Weiming Shen,et al.  Nrc Publications Archive (nparc) Archives Des Publications Du Cnrc (nparc) Distributed Device Networks with Security Constraints Distributed Device Networks with Security Constraints* Distributed Device Networks with Security Constraints , 2022 .

[4]  Mo-Yuen Chow,et al.  Networked Control System: Overview and Research Trends , 2010, IEEE Transactions on Industrial Electronics.

[5]  Peng Ning,et al.  Reasoning about complementary intrusion evidence , 2004, 20th Annual Computer Security Applications Conference.

[6]  Wenye Wang,et al.  Performance Assessment of Data and Time-Sensitive Wireless Distributed Networked-Control-Systems in Presence of Information Security , 2007, MILCOM 2007 - IEEE Military Communications Conference.

[7]  E.J. Byres,et al.  Industrial cybersecurity for power system and SCADA networks , 2005, Record of Conference Papers Industry Applications Society 52nd Annual Petroleum and Chemical Industry Conference.

[8]  Stephen S. Yau,et al.  An Adaptive Tradeoff Model for Service Performance and Security in Service-Based Systems , 2009, 2009 IEEE International Conference on Web Services.

[9]  Rajarathnam Chandramouli,et al.  Opportunistic Encryption: A Trade-Off between Security and Throughput in Wireless Networks , 2007, IEEE Transactions on Dependable and Secure Computing.

[10]  Radia J. Perlman,et al.  Network security - private communication in a public world , 2002, Prentice Hall series in computer networking and distributed systems.

[11]  S.K.S. Gupta,et al.  A Modeling Framework for Evaluating Effectiveness of Smart-Infrastructure Crises Management Systems , 2008, 2008 IEEE Conference on Technologies for Homeland Security.

[12]  Chi-Ho Tsang,et al.  Multi-agent intrusion detection system in industrial network using ant colony clustering approach and unsupervised feature extraction , 2005, 2005 IEEE International Conference on Industrial Technology.

[13]  Mo-Yuen Chow,et al.  Performance assessment and compensation for secure networked control systems , 2008, 2008 34th Annual Conference of IEEE Industrial Electronics.

[14]  Mo-Yuen Chow,et al.  EDA-Based Speed Control of a Networked DC Motor System With Time Delays and Packet Losses , 2009, IEEE Transactions on Industrial Electronics.

[15]  S. Shankar Sastry,et al.  Secure Control: Towards Survivable Cyber-Physical Systems , 2008, 2008 The 28th International Conference on Distributed Computing Systems Workshops.