Nonlinear Theory and Its Applications, IEICE
Online ISSN : 2185-4106
ISSN-L : 2185-4106
Special Section on Recent Progress in Nonlinear Theory and Its Applications
Detection of data tampering attacks using redundant network paths with different delays for networked control systems
Kenta YamadaJin HoshinoRyogo Kubo
著者情報
ジャーナル フリー

2019 年 10 巻 2 号 p. 140-156

詳細
抄録

The need for safe and secure networked motion control systems have been growing with the increase in the number of cyberattacks against critical infrastructure. This paper proposes three methods of tamper detection: the maximum delay (MaxD), minimum delay (MinD), and data thresholding (DT) methods, for a networked motion control system. The system has redundant forward network paths from a controller to an actuator and a path selector on the actuator side. The selector chooses an appropriate path without tampering. Error compensation schemes in the path change are also proposed. In the experiments using the three redundant forward paths, the proposed tamper detection methods are compared. Experimental results show that the proposed methods can achieve stable operation of the system even if one of the paths is exposed to data tampering attacks, while each method has advantages and drawbacks.

著者関連情報
© 2019 The Institute of Electronics, Information and Communication Engineers
前の記事 次の記事
feedback
Top