dc.contributor.author | Solnør, Petter | |
dc.date.accessioned | 2021-02-10T10:51:29Z | |
dc.date.available | 2021-02-10T10:51:29Z | |
dc.date.created | 2020-12-27T09:41:33Z | |
dc.date.issued | 2020 | |
dc.identifier.citation | Modeling, Identification and Control. 2020, 41 (4), 313-332. | en_US |
dc.identifier.issn | 0332-7353 | |
dc.identifier.uri | https://hdl.handle.net/11250/2727150 | |
dc.description.abstract | Abstract: Feedback control systems consist of components such as sensory systems, state estimators, controllers, and actuators. By transmitting signals between these components across insecure transmission channels, feedback control systems become vulnerable to cyber-physical attacks. For example, passive eavesdropping attacks may result in a leak of confidential system and control parameters. Active deception attacks may manipulate the behavior of the state estimators, controllers, and actuators through the injection of spoofed data. To prevent such attacks, we must ensure that the transmitted signals remain confidential across the transmission channels, and that spoofed data is not allowed to enter the feedback control system. We can achieve both these goals by using cryptographic tools. By encrypting the signals, we achieve confidential signal transmission. By applying message authentication codes (MACs), we assert the authenticity of the data before allowing it to enter the components of the feedback control system. In this paper, a toolbox containing implementations of state-of-the-art high-performance algorithms such as the Advanced Encryption Standard (AES), the AEGIS stream cipher, the Keyed-Hash Message Authentication Code (HMAC), and the stream ciphers from the eSTREAM portfolio, is introduced. It is shown how the algorithm implementations can be used to ensure secure signal transmission between the components of the feedback control system, and general guidelines that the users must adhere to for safe operation are provided. | en_US |
dc.language.iso | eng | en_US |
dc.publisher | Norwegian Society of Automatic Control | en_US |
dc.rights | Navngivelse 4.0 Internasjonal | * |
dc.rights.uri | http://creativecommons.org/licenses/by/4.0/deed.no | * |
dc.title | A Cryptographic Toolbox for Feedback Control Systems | en_US |
dc.type | Peer reviewed | en_US |
dc.type | Journal article | en_US |
dc.description.version | publishedVersion | en_US |
dc.source.pagenumber | 313-332 | en_US |
dc.source.volume | 41 | en_US |
dc.source.journal | Modeling, Identification and Control | en_US |
dc.source.issue | 4 | en_US |
dc.identifier.doi | 10.4173/mic.2020.4.3 | |
dc.identifier.cristin | 1863342 | |
dc.description.localcode | © 2020 Norwegian Society of Automatic Control. All articles in MIC are published with the Creative Commons Attribution 3.0 Unported (CC BY 3.0) license. See: http://creativecommons.org/licenses/by/3.0/. | en_US |
cristin.ispublished | true | |
cristin.fulltext | original | |
cristin.qualitycode | 1 | |