Vis enkel innførsel

dc.contributor.authorSolnør, Petter
dc.date.accessioned2021-02-10T10:51:29Z
dc.date.available2021-02-10T10:51:29Z
dc.date.created2020-12-27T09:41:33Z
dc.date.issued2020
dc.identifier.citationModeling, Identification and Control. 2020, 41 (4), 313-332.en_US
dc.identifier.issn0332-7353
dc.identifier.urihttps://hdl.handle.net/11250/2727150
dc.description.abstractAbstract: Feedback control systems consist of components such as sensory systems, state estimators, controllers, and actuators. By transmitting signals between these components across insecure transmission channels, feedback control systems become vulnerable to cyber-physical attacks. For example, passive eavesdropping attacks may result in a leak of confidential system and control parameters. Active deception attacks may manipulate the behavior of the state estimators, controllers, and actuators through the injection of spoofed data. To prevent such attacks, we must ensure that the transmitted signals remain confidential across the transmission channels, and that spoofed data is not allowed to enter the feedback control system. We can achieve both these goals by using cryptographic tools. By encrypting the signals, we achieve confidential signal transmission. By applying message authentication codes (MACs), we assert the authenticity of the data before allowing it to enter the components of the feedback control system. In this paper, a toolbox containing implementations of state-of-the-art high-performance algorithms such as the Advanced Encryption Standard (AES), the AEGIS stream cipher, the Keyed-Hash Message Authentication Code (HMAC), and the stream ciphers from the eSTREAM portfolio, is introduced. It is shown how the algorithm implementations can be used to ensure secure signal transmission between the components of the feedback control system, and general guidelines that the users must adhere to for safe operation are provided.en_US
dc.language.isoengen_US
dc.publisherNorwegian Society of Automatic Controlen_US
dc.rightsNavngivelse 4.0 Internasjonal*
dc.rights.urihttp://creativecommons.org/licenses/by/4.0/deed.no*
dc.titleA Cryptographic Toolbox for Feedback Control Systemsen_US
dc.typePeer revieweden_US
dc.typeJournal articleen_US
dc.description.versionpublishedVersionen_US
dc.source.pagenumber313-332en_US
dc.source.volume41en_US
dc.source.journalModeling, Identification and Controlen_US
dc.source.issue4en_US
dc.identifier.doi10.4173/mic.2020.4.3
dc.identifier.cristin1863342
dc.description.localcode© 2020 Norwegian Society of Automatic Control. All articles in MIC are published with the Creative Commons Attribution 3.0 Unported (CC BY 3.0) license. See: http://creativecommons.org/licenses/by/3.0/.en_US
cristin.ispublishedtrue
cristin.fulltextoriginal
cristin.qualitycode1


Tilhørende fil(er)

Thumbnail

Denne innførselen finnes i følgende samling(er)

Vis enkel innførsel

Navngivelse 4.0 Internasjonal
Med mindre annet er angitt, så er denne innførselen lisensiert som Navngivelse 4.0 Internasjonal