This paper proposes an energy-efficient security-aware architecture for wireless control systems to be used in factory automation. We face deception attacks which corrupt commands and measurements in a smart way and with intermittent behavior to produce the highest damage without being discovered. The intrusion is hard to be distinguished from normal disturbance. Furthermore, protection against attacks is energy consuming and it would be desirable to activate protection only when needed. We propose packet-based selective encryption to reduce energy consumption and to detect when an attack starts and ends. Since energy consumption depends also on packet transmission rate, especially during attacks, we also propose to adapt it according to instantaneous control performance.

Energy-Efficient Intrusion Detection and Mitigation for Networked Control Systems Security

MURADORE, Riccardo;QUAGLIA, Davide
2015-01-01

Abstract

This paper proposes an energy-efficient security-aware architecture for wireless control systems to be used in factory automation. We face deception attacks which corrupt commands and measurements in a smart way and with intermittent behavior to produce the highest damage without being discovered. The intrusion is hard to be distinguished from normal disturbance. Furthermore, protection against attacks is energy consuming and it would be desirable to activate protection only when needed. We propose packet-based selective encryption to reduce energy consumption and to detect when an attack starts and ends. Since energy consumption depends also on packet transmission rate, especially during attacks, we also propose to adapt it according to instantaneous control performance.
2015
Deception Attack; Wireless Transmission; Digital Signature; Encryption; Energy-Efficiency
File in questo prodotto:
Non ci sono file associati a questo prodotto.

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11562/909790
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 22
  • ???jsp.display-item.citation.isi??? 17
social impact