SCADA system architecture under attack.

SCADA system architecture under attack.

Source publication
Article
Full-text available
Recent years witness an ever-increasing research interest in the study of securing the Networked Control Systems due mainly to the trend of integrating the advanced communication technical into the traditional control system. As a result, the control system becomes prone to the cyber attacks and a number of serious security incidents of the industr...

Similar publications

Article
Full-text available
Within a social-ecological system (SES), households develop specific practices, the logics of which are not derived directly or exclusively from higher levels (community, social-ecological system). This article advocates paying closer attention to this micro level of social-ecological analysis in order to gain a better understanding of the SES dyna...
Conference Paper
Full-text available
We consider feedback control systems where sensor readings may be compromised by a malicious attacker intent on causing damage to the system. We study this problem at the supervisory layer of the control system, using discrete event systems techniques. We assume that the attacker can edit the outputs from the sensors of the system before they reach...

Citations

... Performance appraisal as a management tool is recognized by many companies and their managers, and is reflected in more or less various ways in companies, but considering the characteristics of many industries, employee performance appraisal cannot be carried out quantitatively and accurately. This provides a good basis for the design and operation of the performance appraisal mechanism, but considering a large number of employees in manufacturing enterprises [1][2][3][4], it is necessary to design and develop a performance appraisal system, which can reduce the work intensity of human resource managers and make the operation of the performance appraisal mechanism more transparent and open, and help employees understand their performance levels in detail [5][6][7][8][9]. An effective performance appraisal mechanism not only determines the level of employee performance, but also provides decision-making assessment information for HR management in general, improves organizational feedback mechanisms, and enhances employee performance [10][11]. ...
Article
Full-text available
Small and medium-sized enterprises (SMEs) are the mainstay of China’s social and economic development, and the implementation of performance appraisal systems in SMEs is an important way for enterprises to promote the growth of their employees, and each enterprise has a performance appraisal system that matches the characteristics of its own corporate culture. However, at present, objective factors such as the scale and operation of SMEs in China lead to the fact that employee performance appraisal cannot play a good role, and the decision-making level of SMEs understand the implementation of the performance appraisal for subordinate employees in a formal way, and cannot develop a performance appraisal system that is in line with the enterprise itself by combining with its development status. A reasonable performance appraisal system can improve the corporate cohesion and industry competitiveness of the company’s employees. The imperfection of the current corporate employee performance mechanism is not addressed, and the planning of objective employees is not uniform and reasonable enough. This paper constructs a model by analyzing many factors influencing the implementation of performance appraisal systems in SMEs and combining them with incomplete information race theory. Ultimately, we explore the strategies and methods of the performance appraisal for SMEs, cultivate talents for SMEs, enhance the sense of belonging and creativity of enterprise employees, and provide a strong guarantee for enterprise development.
... For example, in 2011, the 860 "Stuxnet" virus invaded Iran's Bolshevik nuclear power plant, causing massive damage to its nuclear program [6]; in 2015, the "BlackEnergy" trojan virus successfully attacked Ukraine's power companies and cut off the local power supply [7]. Therefore, the security of NCS under cyber attacks has received increasing attention, and many illuminating results have been reported (see surveys [8,9]). ...
Article
Full-text available
This paper copes with event-triggered stabilization for networked control systems subject to deception attacks. A new switched event-triggered scheme (ETS) is designed by introducing a term regarding the last triggering moment in the trigger condition. This increases the difficulty of triggering, thus reducing trigger times compared to some existing ETSs. Furthermore, to cater for actual deception attack behavior, the occurrence of deception attacks is assumed to be a time-dependent stochastic variable that obeys the Bernoulli distribution with probability uncertainty. By means of a piecewise-defined Lyapunov function, a sufficient condition is developed to assure that the close-loop system under deception attacks is exponentially stable in regards to mean square. On the basis of this, a joint design of the desired trigger and feedback-gain matrices is presented. Finally, a simulation example is given to confirm the validity of the design method.
... Recently, a sharp rise in the number of cyber attacks has been reported. Consequently, many researchers have shown a great concern for the analysis of vulnerabilities of NCSs to external attacks (Wang and Yang, 2019;Chang et al., 2018;Chabir et al., 2018). ...
Article
Full-text available
This paper deals with the problem of joint state and unknown input estimation for stochastic discrete-time linear systems subject to intermittent unknown inputs on measurements. A Kalman filter approach is proposed for state prediction and intermittent unknown input reconstruction. The filter design is based on the minimization of the trace of the state estimation error covariance matrix under the constraint that the state prediction error is decoupled from active unknown inputs corrupting measurements at the current time. When the system is not strongly detectable, a sufficient stochastic stability condition on the mathematical expectation of the random state prediction errors covariance matrix is established in the case where the arrival binary sequences of unknown inputs follow independent random Bernoulli processes. When the intermittent unknown inputs on measurements represent intermittent observations, an illustrative example shows that the proposed filter corresponds to a Kalman filter with intermittent observations having the ability to generate a minimum variance unbiased prediction of measurement losses.
... Because of the great benefits associated with NCSs, they are increasingly used in vehicles (El-Rewini et al., 2020). However, since NCSs connect system components across a network and are vulnerable to cyber-physical attacks, such as eavesdropping and data injection (Teixeira et al., 2012;Wang & Yang, 2019), researchers have expressed concerns about the cybersecurity of NCSs for many years (Dzung et al., 2005). In particular, with increased self-governance, F I G U R E 1 An overview of the NTNU Otter unmanned surface vehicle security breaches in onboard communication systems may directly cause altered behavior in unmanned and autonomous vehicles. ...
Article
Full-text available
Driven by advances in information and communication technologies, an increasing number of industries embrace unmanned and autonomous vehicles for services, such as public transportation, shipping, mapping, and remote surveillance. Unfortunately, these vehicles are vulnerable to passive and active cyber‐physical attacks that can be used for industrial espionage and hijacking attempts. Since attackers can use hijacked vehicles as weapons in terrorist attacks, ensuring the secure operation of such vehicles is critical to prevent the attacks from causing dire financial consequences, or worse, the loss of human lives. This study is motivated by the observation that most cybersecurity studies provide superficial, high‐level descriptions of vulnerabilities and attacks, and the true impact of the described attacks remains unclear. To address this problem, we demonstrate advanced manipulation attacks against an underactuated Unmanned Surface Vehicle (USV) which results in successful hijackings. Using state‐of‐the‐art cryptography, we also show how the signal transmission can be secured to avoid hijacking attempts actively steering the vehicle off course. Through field experiments, we demonstrate how the attacks affect the closed‐loop guidance, navigation, and control system and how the proposed countermeasures prevent these attacks from being successful. Our study is unique in that we provide a complete description of the attacked USV and give a detailed analysis of how spoofed navigation estimates affect the closed‐loop behavior of the underactuated USV.
... Since NCSs connect system components across a network, they become vulnerable to cyber-physical attacks such as eavesdropping and deception attacks, as described in [10,11]. Therefore, the use of cryptographic algorithms such as the Data Encryption Standard (DES) [12], Triple DES (3DES) [13], Advanced Encryption Standard (AES) [14], Message Digest 5 (MD5) [15], and Keyed-Hash Message Authentication Code (HMAC) [16] has been suggested by [17][18][19] to secure the signal transmission in NCSs. ...
Article
Full-text available
An ever-increasing number of autonomous vehicles use bandwidth-greedy sensors such as cameras and LiDARs to sense and act to the world around us. Unfortunately, signal transmission in vehicles is vulnerable to passive and active cyber-physical attacks that may result in loss of intellectual property, or worse yet, the loss of control of a vehicle, potentially causing great harm. Therefore, it is important to investigate efficient cryptographic methods to secure signal transmission in such vehicles against outside threats. This study is motivated by the observation that previous publications have suggested legacy algorithms, which are either inefficient or insecure for vision-based signals. We show how stream ciphers and authenticated encryption can be applied to transfer sensor data securely and efficiently between computing devices suitable for distributed guidance, navigation, and control systems. We provide an efficient and flexible pipeline of cryptographic operations on image and point cloud data in the Robot Operating System (ROS). We also demonstrate how image data can be compressed to reduce the amount of data to be encrypted, transmitted, and decrypted. Experiments on embedded computers verify that modern software cryptographic algorithms perform very well on large sensor data. Hence, the introduction of such algorithms should enhance security without significantly compromising the overall performance.
... The nodes interconnect and perform the desired operations. Examples of distributed systems are automation in industries, building automation, automation at home and offices, automation in vehicle systems, in aircraft and spacecraft (Selivanov and Fridman, 2016;Wang and Yang, 2019;Wu et al., 2018;Liu et al., 2013;Wang and Liu, 2008). Networked control system (NCS) consists of sensors, actuators and controllers. ...
Article
Networked control system (NCS) consists of controlled distributed nodes while an orchestrator functions as a central coordinator for controlling the distributed tasks. The NCSs have challenges of coordination and right execution sequencing of operations. This paper proposes a framework named controlled orchestrator (COrch) for coordinating and sequencing the tasks of NCSs. An experiment was performed with three robotic vehicles that are considered as individual control system. Furthermore, the proposed orchestrator COrch decided the sequencing of operations of the robots while performing obstacle avoidance task for spatially distributed robots in parallel. COrch is used to control this task by utilising the concept of remote method invocation (RMI) and multithreading. RMI is used to prepare the software for controlling the robots at remote end while multithreading is used to perform parallel and synchronise execution of multiple robots. The remote end software generates signals for sequential, parallel and hybrid mode execution.
... The Networked Control Systems are used due to its decreased network wiring as well as an expense; enhance system flexibility as well as reliability and system diagnosis and maintenance is facilitated (Yang, 2006). Therefore, in several contexts like aircraft, remote surgery, automobile, intelligent transportation and manufacturing plant the NCSs are becoming significantly famous (Bengaid et al., 2006;Cao et al., 2017;Wang & Yang, 2019). In any case, the limited bandwidth and restricted service in communication systems cause various new issues and difficulties, for example, random delays, multi-packet transmission, packet losses, and packet disordering (Brindha & Jayapal, 2018;Han et al., 2016;Qiao et al., 2019; L. X. Zhang et al., 2013). ...
Article
Full-text available
Frequent occurrence of control loops in network systems leads to various issues such as packet loss, random delays, multi-packet transmission etc. Actually, in networked control systems, random delays present more significant and challenging issue. In order to enhance the performance of the network, various soft computing techniques were presented in previous works for both scenarios i.e. with delay and without delay, in which Fuzzy-PID controllers were regarded as the most efficient one. However, it is analyzed that Fuzzy-PID approach lacks in some aspects that leads to inefficient system performance. Therefore, in this paper, a novel and more efficient approach is introduced, i.e. ANFIS-PID controller. Also, this presented ANFIS-PID controller is a modified version of traditional ANFIS approach and it is optimized by using Grey Wolf Optimization (GWO) algorithm. The simulation of the proposed approach is processed for both with and without time delay consideration to perform analysis over Peak Overshoot, Settling Time and Rise Time of the network. The outcomes represent that the proposed model is quite efficient and successful to achieve the system output with lesser transmission delays and packet dropouts along with the enhanced accuracy level in comparison to the traditional system.
Article
A networked control system (NCS), which integrates various physical components by utilising communication networks, is a complex intelligent control system with high flexibility and reliability. It has been widely applied in various areas, such as power grids, intelligent transportation, and smart manufacturing. However, compared with traditional control systems, NCSs expose more extra vulnerabilities with the openness of communication networks, leading to long-term concerns for the security of NCSs against cyber attacks. This paper gives a survey in detail on recent developments on the security of NCSs subject to deception attacks from the two domains of information technology (IT) and system control, respectively. First, several security incidents reported in recent years are reviewed and a couple of prevailing cyber attacks are analysed. Besides, the results on IT security with respect to the protection-detection-reaction model are summarised. Then, from the domain of system control, the security issues on attack design, attack detection, secure state estimation and resilient control are surveyed in depth. Furthermore, several novel security topics from the combination of IT and system control are also discussed. Finally, several future research directions are presented on this topic.
Article
The aim of this paper is to explore the potential capabilities of nonlinear projectors to represent the integrated behaviour of products when manufacturing involves several plants inside a typical facility of heavy industry. The interest is focused in the integrated supervision of production able to identify sudden failures or infrastructure attacks discovered from the process perspective. In this analysis, not only the feasibility but also computational capabilities are going to be explored. The selected methodology is the case analysis with action research, and the selected facility is a hot rolling mill for long steel products, which involves more than twenty plants or equipment units. The challenge is to define a monitoring procedure able to assess the product as well as the individual behaviour of each equipment. The results obtained allow to define an automatic procedure applicable in intraprocess time, which can have as an additional benefit its visual interpretation from the operator point of view.
Article
Full-text available
In this study, optimal performance of the multi-input multi-output networked control systems (NCSs) is analysed. The systems are with a time-delay and channel noise constraints in the forward network channel, and encoding-decoding and quantisation constraints, and packet dropouts in the feedback network channel. By using the Youla parameterisation of a twodegree- of-freedom controller, a new and explicit expression of the optimal performance is derived. The optimal performance is obtained using the method of H2 norm technique. The results show that the positions and directions of the non-minimum phase zeros and unstable poles of a given plant are related to the optimal tracking error. On the other hand, the optimal tracking error is dependent on channel noise, quantisation noise, encoding-decoding, time-delay, packet dropout probability and other correction factors. Finally, simulation results demonstrate the effectiveness of the proposed control scheme.