Performance, Security Tradeoffs in Secure Control

被引:1
|
作者
Ghosh, Saurav Kumar [1 ]
Dey, Soumyajit [1 ]
Mukhopadhyay, Debdeep [1 ]
机构
[1] Indian Inst Technol Kharagpur, Dept Comp Sci & Engn, Kharagpur 721302, W Bengal, India
关键词
Security; Control theory; Detectors; Microsoft Windows; Trajectory; Physically unclonable functions (PUF); replay attacks; secure cyber physical system (CPS); CONTROL-SYSTEMS;
D O I
10.1109/LES.2018.2882495
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
This letter summarizes the established vulnerability analysis techniques for cyber physical control software and highlights the possibility of employing lightweight security measures in conjunction with reachability analysis for such systems. We propose a possible cyber physical control system implementation methodology, which leverages the dependence of control performance on the choice of security measure adopted and the resulting platform level vulnerability.
引用
收藏
页码:102 / 105
页数:4
相关论文
共 50 条
  • [21] Multiloop Control of Floating Wind Turbines: Tradeoffs in performance and stability
    Stockhouse, David
    Pao, Lucy Y.
    IEEE CONTROL SYSTEMS MAGAZINE, 2024, 44 (05): : 63 - 80
  • [22] Security and performance analysis of a secure clustering protocol for sensor networks
    Banerjee, Pubali
    Jacobson, Doug
    Lahiri, Soumendra Nath
    SIXTH IEEE INTERNATIONAL SYMPOSIUM ON NETWORK COMPUTING AND APPLICATIONS, PROCEEDINGS, 2007, : 145 - +
  • [23] How Secure and Quick is QUIC? Provable Security and Performance Analyses
    Lychev, Robert
    Jero, Samuel
    Boldyreva, Alexandra
    Nita-Rotaru, Cristina
    2015 IEEE SYMPOSIUM ON SECURITY AND PRIVACY SP 2015, 2015, : 214 - 231
  • [24] TRAGIC TRADEOFFS - DEMOCRACY AND SECURITY IN CHAD
    MILES, WFS
    JOURNAL OF MODERN AFRICAN STUDIES, 1995, 33 (01): : 53 - 65
  • [25] Performance Analysis of Secure GPSM Systems for Physical Layer Security
    Pang, Yashan
    Lei, Xia
    Xiao, Yue
    Li, You
    Xiang, Wei
    2019 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2019,
  • [26] An Approach for Verification of Secure Access Control Using Security Pattern
    Gupta, Charu
    Singh, Rakesh Kumar
    Mohapatra, Amar Kumar
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022
  • [27] Layering Security at Global Control Points to Secure Unmodified Software
    Ruoti, Scott
    Seamons, Kent
    Zappala, Daniel
    2017 IEEE CYBERSECURITY DEVELOPMENT (SECDEV), 2017, : 42 - 49
  • [28] A Study on IT Security Control by Comparison of Secure Software Development Process
    Rijayanti, Rita
    Hendayun, Mokhamad
    Suharto, Toto
    Hwang, Mintae
    INFORMATION SCIENCE AND APPLICATIONS, 2020, 621 : 551 - 560
  • [29] Verifying the Security Characteristics of a Secure Physical Access Control Protocol
    Carryl, Clyde
    Alhalabi, Bassem
    Khoshgoftaar, Taghi M.
    Bullard, Lofton
    INTERNATIONAL JOURNAL OF RELIABILITY QUALITY AND SAFETY ENGINEERING, 2016, 23 (02)
  • [30] Physical layer security-aware routing and performance tradeoffs in ad hoc networks
    Xu, Yang
    Liu, Jia
    Shen, Yulong
    Jiang, Xiaohong
    Shiratori, Norio
    COMPUTER NETWORKS, 2017, 123 : 77 - 87