Dynamic network path provisioning and selection for the detection and mitigation of data tampering attacks in networked control systems

Kento Aida, Kenta Yamada, Ryosuke Hotchi, Ryogo Kubo

Research output: Contribution to journalArticlepeer-review

Abstract

Networked control systems can help build cost-effective and flexible industrial systems. A system that can function while being immune to cyberattacks is necessary. A method called fixed redundant path selection (FRPS) has been proposed to detect and mitigate data tampering attacks in a networked motion control system. This system contains redundant forward network paths from the controller to the motor sides to detect the attacked path by comparing the values that are received through respective paths. Then, a path selector on the motor side chooses a value on the path that is not attacked based on the majority decision. Increasing the number of redundant paths improves the detection performance of simultaneous attacks against multiple paths. However, it also increases the amount of traffic because the same data are transmitted to all of the redundant paths. This study proposes a dynamic redundant path selection (DRPS) method to balance the detection performance and the amount of traffic. The proposed method initially applies three redundant paths and changes the number of redundant paths to five only when the path selector detects a difference among the received values for the three paths. The experiments confirm that the proposed DRPS outperforms the conventional FRPS. The former can detect and mitigate the data tampering attacks while reducing the number of network paths during tampering detection when the system is exposed to simultaneous attacks against up to two of the redundant paths.

Original languageEnglish
Pages (from-to)147430-147441
Number of pages12
JournalIEEE Access
Volume9
DOIs
Publication statusPublished - 2021

Keywords

  • Cyber-physical system
  • Cyberattack
  • Motion control
  • Networked control system
  • Tampering detection

ASJC Scopus subject areas

  • Computer Science(all)
  • Materials Science(all)
  • Engineering(all)

Fingerprint

Dive into the research topics of 'Dynamic network path provisioning and selection for the detection and mitigation of data tampering attacks in networked control systems'. Together they form a unique fingerprint.

Cite this