Security Solutions for Networked Control Systems Based on DES Algorithm and Improved Grey Prediction Model

Full Text (PDF, 677KB), PP.78-85

Views: 0 Downloads: 0

Author(s)

Liying Zhang 1,* Lun Xie 1 Weize Li 1 Zhiliang Wang 1

1. University of Science and Technology Beijing, Beijing, 100083 China

* Corresponding author.

DOI: https://doi.org/10.5815/ijcnis.2014.01.10

Received: 7 Apr. 2013 / Revised: 6 Jul. 2013 / Accepted: 15 Aug. 2013 / Published: 8 Nov. 2013

Index Terms

Security solutions, NCS, DES, detection and reaction mechanism (DARM), grey prediction model

Abstract

Compared with the conventional control systems, networked control systems (NCSs) are more open to the external network. As a result, they are more vulnerable to attacks from disgruntled insiders or malicious cyber-terrorist organizations. Therefore, the security issues of NCSs have been receiving a lot of attention recently. In this brief, we review the existing literature on security issues of NCSs and propose some security solutions for the DC motor networked control system. The typical Data Encryption Standard (DES) algorithm is adopted to implement data encryption and decryption. Furthermore, we design a Detection and Reaction Mechanism (DARM) on the basis of DES algorithm and the improved grey prediction model. Finally, our proposed security solutions are tested with the established models of deception and DOS attacks. According to the results of numerical experiments, it’s clear to see the great feasibility and effectiveness of the proposed solutions above.

Cite This Paper

Liying Zhang, Lun Xie, Weize Li, Zhiliang Wang, "Security Solutions for Networked Control Systems Based on DES Algorithm and Improved Grey Prediction Model", International Journal of Computer Network and Information Security(IJCNIS), vol.6, no.1, pp.78-85, 2014. DOI:10.5815/ijcnis.2014.01.10

Reference

[1]Dzung, Dacfey, et al, "Security for industrial communication systems", Proceedings of the IEEE 93.6, pp. 1152-1177, 2005.
[2]R. A. Gupta and M.-Y. Chow, "Networked control system: Overview and research trends", IEEE Trans. Ind. Electron., vol. 57, no. 7, pp. 2527-2535, Jul. 2010.
[3]Byres, Eric, and Justin Lowe, " The myths and facts behind cyber security risks for industrial control systems ", Proceedings of the VDE Kongress, vol. 116, 2004.
[4]Cardenas, Alvaro A., Saurabh Amin, and Shankar Sastry, " Secure control: Towards survivable cyber-physical systems", Distributed Computing Systems Workshops, 2008. ICDCS'08. 28th International Conference on IEEE, pp. 495-500, 2008.
[5]Creery, A.; Byres, E.J., "Industrial cybersecurity for power system and SCADA networks," Petroleum and Chemical Industry Conference, 2005. Industry Applications Society 52nd Annual , vol., no., pp.303,309, 12-14 Sept. 2005.
[6]Peng Jie; Liu Li, "Industrial Control System Security," Intelligent Human-Machine Systems and Cybernetics (IHMSC), 2011 International Conference on , vol.2, no., pp.156,158, 26-27 Aug. 2011.
[7]Swaminathan, P.; Padmanabhan, K.; Ananthi, S.; Pradeep, R, "The Secure Field Bus (SecFB) Protocol-Network Communication Security for secure Industrial Process control ", TENCON 2006. 2006 IEEE Region 10 Conference , vol., no, pp.1,4, 14-17, Nov. 2006.
[8]Zhonghua, Pang, Liu Guoping, and Zhou Donghua, "Detection of deception attacks on the backward channel of networked control systems", Control Conference (CCC), 2012 31st Chinese. IEEE, pp. 5972-5977, 2012.
[9] Ke-Ya Yuan; Jie Chen; Guo-Ping Liu; Jian Sun, "Design and implementation of data encryption for networked control systems", Systems, Man and Cybernetics, 2009. SMC 2009. IEEE International Conference on. IEEE, vol. no, pp.2105-2109, 11-14 Oct. 2009.
[10]Zhong-Hua Pang; Guo-Ping Liu, "Design and Implementation of Secure Networked Predictive Control Systems Under Deception Attacks", Control Systems Technology, IEEE Transactions on , vol.20, no.5, pp.1334-1342, Sept. 2012.
[11]Zhong-Hua Pang; Geng Zheng; Guo-Ping Liu; Chun-Xiang Luo, "Secure transmission mechanism for networked control systems under deception attacks", Cyber Technology in Automation, Control, and Intelligent Systems (CYBER), 2011 IEEE International Conference on , vol., no., pp.27-32, 20-23 March 2011.
[12]Teixeira, A.; Sandberg, H.; Johansson, K.H., "Networked control systems under cyber attacks with applications to power networks", American Control Conference (ACC), 2010, vol., no., pp.3690-3696, June 30 2010-July 2 2010.
[13]Cárdenas, Alvaro A., Saurabh Amin, and Shankar Sastry, "Research challenges for the security of control systems", Proceedings of the 3rd conference on Hot topics in security. USENIX Association, pp.1-6, 2008.
[14]Wente Zeng; Mo-Yuen Chow, "A trade-off model for performance and security in secured Networked Control Systems", Industrial Electronics (ISIE), 2011 IEEE International Symposium on , vol., no., pp.1997-2002, 27-30 June 2011.
[15]Wente Zeng; Mo-Yuen Chow, "Optimal Tradeoff Between Performance and Security in Networked Control Systems Based on Coevolutionary Algorithms", Industrial Electronics, IEEE Transactions on , vol.59, no.7, pp.3016-3025, July 2012.
[16]Gupta, R.A.; Mo-Yuen Chow, "Performance assessment and compensation for secure networked control systems", Industrial Electronics, 2008. IECON 2008. 34th Annual Conference of IEEE , vol., no., pp.2929-2934, 10-13 Nov. 2008.
[17]Hussain, Alefiya, and Saurabh Amin, "NCS security experimentation using DETER." Proceedings of the 1st international conference on High Confidence Networked Systems. ACM, pp. 73-80, 2012.
[18]Amin, S.; Litrico, X.; Sastry, S.; Bayen, A. M., "Cyber Security of Water SCADA Systems-Part I: Analysis and Experimentation of Stealthy Deception Attacks," Control Systems Technology, IEEE Transactions on , vol.PP, no.99, pp.1,1, 0, 2012.
[19]Cárdenas, Alvaro A., et al, "Attacks against process control systems: risk assessment, detection, and response", Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security. ACM, pp. 355-366, 2011.
[20]Hsu, Che-Chiang, and Chia-Yon Chen, "Applications of improved grey prediction model for power demand forecasting", Energy Conversion and Management, vol. 44, no. 14, pp. 2241-2249, 2003.
[21]Qi Xie; Yan Xie, "Forecast of the Total Volume of Import-export Trade Based on Grey Modelling Optimized by Genetic Algorithm", Intelligent Information Technology Application, 2009. IITA 2009. Third International Symposium on , vol.1, no., pp.545-547, 21-22 Nov. 2009.
[22]Jianfeng Dong, "The Building of Network Security Situation Evaluation and Prediction Model Based on Grey Theory", Challenges in Environmental Science and Computer Engineering (CESCE), 2010 International Conference on , vol.2, no., pp.401-404, 6-7 March 2010.