Network Scheduling for Secure Cyber-Physical Systems

被引:20
|
作者
Lesi, Vuk [1 ]
Jovanov, Ilija [1 ]
Pajic, Miroslav [1 ]
机构
[1] Duke Univ, Dept Elect & Comp Engn, Durham, NC 27708 USA
基金
美国国家科学基金会;
关键词
D O I
10.1109/RTSS.2017.00012
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Existing design techniques for providing security guarantees against network-based attacks in cyber-physical systems (CPS) are based on continuous use of standard cryptographic tools to ensure data integrity. This creates an apparent conflict with common resource limitations in these systems, given that, for instance, lengthy message authentication codes (MAC) introduce significant overheads. We present a framework to ensure both timing guarantees for real-time network messages and Quality-of-Control (QoC) in the presence of network-based attacks. We exploit physical properties of controlled systems to relax constant integrity enforcement requirements, and show how the problem of feasibility testing of intermittently authenticated real-time messages can be cast as a mixed integer linear programming problem. Besides scheduling a set of real-time messages with predefined authentication rates obtained from QoC requirements, we show how to optimally increase the overall system QoC while ensuring that all real-time messages are schedulable. Finally, we introduce an efficient runtime bandwidth allocation method, based on opportunistic scheduling, in order to improve QoC. We evaluate our framework on a standard benchmark designed for CAN bus, and show how an infeasible message set with strong security guarantees can be scheduled if dynamics of controlled systems are taken into account along with real-time requirements.
引用
收藏
页码:45 / 55
页数:11
相关论文
共 50 条
  • [1] Safe and secure cyber-physical systems
    Biro, Miklos
    Mashkoor, Atif
    Sametinger, Johannes
    JOURNAL OF SOFTWARE-EVOLUTION AND PROCESS, 2021, 33 (09)
  • [2] Task Scheduling in Cyber-Physical Systems
    Liu, Chunyao
    Zhang, Lichen
    Zhang, Daqiang
    2014 IEEE 11TH INTL CONF ON UBIQUITOUS INTELLIGENCE AND COMPUTING AND 2014 IEEE 11TH INTL CONF ON AUTONOMIC AND TRUSTED COMPUTING AND 2014 IEEE 14TH INTL CONF ON SCALABLE COMPUTING AND COMMUNICATIONS AND ITS ASSOCIATED WORKSHOPS, 2014, : 319 - 324
  • [3] SECURE DISTRIBUTED ESTIMATION IN CYBER-PHYSICAL SYSTEMS
    Khan, Usman A.
    Stankovic, Aleksandar M.
    2013 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP), 2013, : 5209 - 5213
  • [4] Analysis and design of secure cyber-physical systems
    Ling SHI
    Control Theory and Technology, 2014, 12 (04) : 413 - 414
  • [5] Secure Control of Networked Cyber-Physical Systems
    Satchidanandan, Bharadwaj
    Kumar, P. R.
    2016 IEEE 55TH CONFERENCE ON DECISION AND CONTROL (CDC), 2016, : 283 - 289
  • [6] Design and Operation of Secure Cyber-Physical Systems
    Pasqualetti, Fabio
    Zhu, Qi
    IEEE EMBEDDED SYSTEMS LETTERS, 2015, 7 (01) : 3 - 6
  • [7] Analysis and design of secure cyber-physical systems
    Shi L.
    Control Theory and Technology, 2015, 12 (04): : 413 - 414
  • [8] Secure and Timely GPU Execution in Cyber-physical Systems
    Wang, Jinwen
    Wang, Yujie
    Zhang, Ning
    PROCEEDINGS OF THE 2023 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, CCS 2023, 2023, : 2591 - 2605
  • [9] Safe and secure system architectures for cyber-physical systems
    Furrer F.J.
    Informatik-Spektrum, 2023, 46 (02) : 96 - 103
  • [10] Secure-by-construction synthesis of cyber-physical systems
    Liu, Siyuan
    Trivedi, Ashutosh
    Yin, Xiang
    Zamani, Majid
    ANNUAL REVIEWS IN CONTROL, 2022, 53 : 30 - 50