Performance, Security Tradeoffs in Secure Control

被引:1
|
作者
Ghosh, Saurav Kumar [1 ]
Dey, Soumyajit [1 ]
Mukhopadhyay, Debdeep [1 ]
机构
[1] Indian Inst Technol Kharagpur, Dept Comp Sci & Engn, Kharagpur 721302, W Bengal, India
关键词
Security; Control theory; Detectors; Microsoft Windows; Trajectory; Physically unclonable functions (PUF); replay attacks; secure cyber physical system (CPS); CONTROL-SYSTEMS;
D O I
10.1109/LES.2018.2882495
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
This letter summarizes the established vulnerability analysis techniques for cyber physical control software and highlights the possibility of employing lightweight security measures in conjunction with reachability analysis for such systems. We propose a possible cyber physical control system implementation methodology, which leverages the dependence of control performance on the choice of security measure adopted and the resulting platform level vulnerability.
引用
收藏
页码:102 / 105
页数:4
相关论文
共 50 条
  • [31] PRIVACY-SECURITY TRADEOFFS IN REUSABLE BIOMETRIC SECURITY SYSTEMS
    Lai, Lifeng
    Ho, Siu-Wai
    Poor, H. Vincent
    2010 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, 2010, : 1722 - 1725
  • [32] The secure field bus (SecFB) protocol - Network communication security for secure industrial process control
    Swaminathan, P.
    Padmanabhan, K.
    Ananthi, S.
    Pradeep, R.
    TENCON 2006 - 2006 IEEE REGION 10 CONFERENCE, VOLS 1-4, 2006, : 941 - +
  • [33] ISDN PERFORMANCE TRADEOFFS
    GIFFORD, WS
    IEEE COMMUNICATIONS MAGAZINE, 1987, 25 (12) : 25 - 29
  • [34] Performance Tradeoffs by Power Control in Wireless Ad-Hoc Networks
    Rossi, Giorgia V.
    Leung, Kin K.
    2013 9TH INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING CONFERENCE (IWCMC), 2013, : 1343 - 1347
  • [35] Robustness and performance tradeoffs in torque control of robots with harmonic drive transmission
    Moghaddam, MM
    Goldenberg, AA
    1997 IEEE INTERNATIONAL CONFERENCE ON ROBOTICS AND AUTOMATION - PROCEEDINGS, VOLS 1-4, 1997, : 2365 - 2370
  • [36] Construct the Secure Shell Transport Model and Analyze Its Security Performance
    Huang, Xiaoqiao
    Guo, Hongbin
    2011 2ND INTERNATIONAL CONFERENCE ON CHALLENGES IN ENVIRONMENTAL SCIENCE AND COMPUTER ENGINEERING (CESCE 2011), VOL 11, PT A, 2011, 11 : 183 - 188
  • [37] Risk and security tradeoffs in graphical coordination games
    Paarporn, Keith
    Alizadeh, Mahnoosh
    Maiden, Jason R.
    2019 IEEE 58TH CONFERENCE ON DECISION AND CONTROL (CDC), 2019, : 4409 - 4414
  • [38] HOW SECURE IS SECURITY
    COLBORN, K
    DATAMATION, 1992, 38 (22): : 122 - 122
  • [39] How secure is security?
    Booth, Michael
    Bourne, Robert
    TRUSTS & TRUSTEES, 2013, 19 (05) : 475 - 480
  • [40] Secure State Estimation and Control for Cyber Security of the Nonlinear Power Systems
    Hu, Qie
    Fooladivanda, Dariush
    Chang, Young Hwan
    Tomlin, Claire J.
    IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, 2018, 5 (03): : 1310 - 1321