Detection and Mitigation of False Data Injection Attacks for Secure Interactive Networked Control Systems

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)

    Abstract

    Cybersecurity in control systems has been actively discussed in recent years. In particular, networked control systems (NCSs) over the Internet are exposed to various types of cyberattacks such as false data injection attacks. This paper proposes a detection and mitigation method of the false data injection attacks in interactive NCSs, i.e., bilateral teleoperation systems. A bilateral teleoperation system exchanges position and force information through the Internet between the master and slave robots. The proposed method utilizes two redundant communication channels for both the master-to-slave and slave-to-master paths. The attacks are detected by a tamper detection observer (TDO) on each of the master and slave sides. The TDO compares the position responses of actual robots and robot models. A path selector on each side chooses the appropriate position and force responses from the responses received through the two communication channels, based on the outputs of the TDO. The proposed method is validated by simulations with attack models.

    Original languageEnglish
    Title of host publication2018 International Conference on Intelligence and Safety for Robotics, ISR 2018
    PublisherInstitute of Electrical and Electronics Engineers Inc.
    Pages7-12
    Number of pages6
    ISBN (Electronic)9781538655467
    DOIs
    Publication statusPublished - 2018 Nov 14
    Event2018 International Conference on Intelligence and Safety for Robotics, ISR 2018 - Shenyang, China
    Duration: 2018 Aug 242018 Aug 27

    Other

    Other2018 International Conference on Intelligence and Safety for Robotics, ISR 2018
    CountryChina
    CityShenyang
    Period18/8/2418/8/27

    ASJC Scopus subject areas

    • Artificial Intelligence
    • Mechanical Engineering
    • Safety, Risk, Reliability and Quality
    • Control and Optimization

    Fingerprint Dive into the research topics of 'Detection and Mitigation of False Data Injection Attacks for Secure Interactive Networked Control Systems'. Together they form a unique fingerprint.

    Cite this