Skip to Secure: Securing Cyber-Physical Control Loops with Intentionally Skipped Executions

We consider the problem of provably securing a given control loop implementation in the presence of adversarial interventions on data exchange between plant and controller. Such interventions can be thwarted using continuously operating monitoring systems and also cryptographic techniques, both of which consume network and computational resources. We provide a principled approach for intentional skipping of control loop executions which may qualify as a useful control-theoretic countermeasure against stealthy attacks which violate message integrity and authenticity. As can be seen, such an approach helps in lowering the resource consumption caused by monitoring/cryptographic security measures.

[1]  Vuk Lesi,et al.  Integrating Security in Resource-Constrained Cyber-Physical Systems , 2018, ACM Trans. Cyber Phys. Syst..

[2]  Gedare Bloom,et al.  Survey of Automotive Controller Area Network Intrusion Detection Systems , 2019, IEEE Design & Test.

[3]  Nikolaj Bjørner,et al.  Z3: An Efficient SMT Solver , 2008, TACAS.

[4]  Karl Henrik Johansson,et al.  Secure Control Systems: A Quantitative Risk Management Approach , 2015, IEEE Control Systems.

[5]  Yilin Mo,et al.  False Data Injection Attacks in Control Systems , 2010 .

[6]  Yong Zhang,et al.  Controller design for vehicle stability enhancement , 2006 .

[7]  Stefano Zanero,et al.  CopyCAN: An Error-Handling Protocol based Intrusion Detection System for Controller Area Network , 2019, CPS-SPC@CCS.

[8]  Farinaz Koushanfar,et al.  Design and Analysis of Secure and Dependable Automotive CPS: A Steer-by-Wire Case Study , 2020, IEEE Transactions on Dependable and Secure Computing.

[9]  Pallab Dasgupta,et al.  A Structured Methodology for Pattern based Adaptive Scheduling in Embedded Control , 2017, ACM Trans. Embed. Comput. Syst..

[10]  Mohamed Darouach,et al.  Cyber Security and Vulnerability Analysis of Networked Control System subject to False-Data injection , 2018, 2018 Annual American Control Conference (ACC).

[11]  Mohammad Abdullah Al Faruque,et al.  Self-Secured Control with Anomaly Detection and Recovery in Automotive Cyber-Physical Systems , 2019, 2019 Design, Automation & Test in Europe Conference & Exhibition (DATE).

[12]  Karl Henrik Johansson,et al.  A secure control framework for resource-limited adversaries , 2012, Autom..

[13]  TippenhauerNils Ole,et al.  A Survey of Physics-Based Attack Detection in Cyber-Physical Systems , 2018 .

[14]  Rupak Majumdar,et al.  Performance-aware scheduler synthesis for control systems , 2011, 2011 Proceedings of the Ninth ACM International Conference on Embedded Software (EMSOFT).

[15]  Vuk Lesi,et al.  Security-Aware Scheduling of Embedded Control Tasks , 2017, ACM Trans. Embed. Comput. Syst..

[16]  M. Yampolskiy,et al.  In-Vehicle Networks: Attacks, Vulnerabilities, and Proposed Solutions , 2015, CISR.

[17]  Insup Lee,et al.  Design and Implementation of Attack-Resilient Cyberphysical Systems: With a Focus on Attack-Resilient State Estimators , 2017, IEEE Control Systems.

[18]  Paul Tavolato,et al.  Anomaly-Based Detection and Classification of Attacks in Cyber-Physical Systems , 2017, ARES.

[19]  Henrik Sandberg,et al.  A Survey of Physics-Based Attack Detection in Cyber-Physical Systems , 2018, ACM Comput. Surv..

[20]  Springer Fachmedien Wiesbaden,et al.  AUTOSAR — The Worldwide Automotive Standard for E/E Systems , 2013 .

[21]  Ilija Jovanov,et al.  Secure State Estimation with Cumulative Message Authentication , 2018, 2018 IEEE Conference on Decision and Control (CDC).

[22]  Bruno Sinopoli,et al.  On the Performance Degradation of Cyber-Physical Systems Under Stealthy Integrity Attacks , 2016, IEEE Transactions on Automatic Control.

[23]  Shwetak N. Patel,et al.  Experimental Security Analysis of a Modern Automobile , 2010, 2010 IEEE Symposium on Security and Privacy.

[24]  J. S. Freudenberg Controller Area Network (CAN) , 2008 .

[25]  Kang G. Shin,et al.  Fingerprinting Electronic Control Units for Vehicle Intrusion Detection , 2016, USENIX Security Symposium.

[26]  Insup Lee,et al.  Co-design of control and platform with dropped signals , 2013, 2013 ACM/IEEE International Conference on Cyber-Physical Systems (ICCPS).

[27]  Debdeep Mukhopadhyay,et al.  Performance, Security Tradeoffs in Secure Control , 2019, IEEE Embedded Systems Letters.

[28]  George A. Perdikaris Computer Controlled Systems , 1991 .

[29]  Jia Ning,et al.  Graceful degradation of the quality of control through data drop policy , 2007, 2007 European Control Conference (ECC).

[30]  Ilija Jovanov,et al.  Sporadic data integrity for secure state estimation , 2017, 2017 IEEE 56th Annual Conference on Decision and Control (CDC).

[31]  Wei Zhang,et al.  Stability of networked control systems , 2001 .

[32]  T. Başar,et al.  A New Approach to Linear Filtering and Prediction Problems , 2001 .

[33]  Debdeep Mukhopadhyay,et al.  Formal Synthesis of Monitoring and Detection Systems for Secure CPS Implementations , 2020, 2020 Design, Automation & Test in Europe Conference & Exhibition (DATE).