Detection and Mitigation of False Data Injection Attacks for Secure Interactive Networked Control Systems

Research output: Chapter in Book/Report/Conference proceedingConference contribution

9 Citations (Scopus)

Abstract

Cybersecurity in control systems has been actively discussed in recent years. In particular, networked control systems (NCSs) over the Internet are exposed to various types of cyberattacks such as false data injection attacks. This paper proposes a detection and mitigation method of the false data injection attacks in interactive NCSs, i.e., bilateral teleoperation systems. A bilateral teleoperation system exchanges position and force information through the Internet between the master and slave robots. The proposed method utilizes two redundant communication channels for both the master-to-slave and slave-to-master paths. The attacks are detected by a tamper detection observer (TDO) on each of the master and slave sides. The TDO compares the position responses of actual robots and robot models. A path selector on each side chooses the appropriate position and force responses from the responses received through the two communication channels, based on the outputs of the TDO. The proposed method is validated by simulations with attack models.

Original languageEnglish
Title of host publication2018 International Conference on Intelligence and Safety for Robotics, ISR 2018
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages7-12
Number of pages6
ISBN (Electronic)9781538655467
DOIs
Publication statusPublished - 2018 Nov 14
Event2018 International Conference on Intelligence and Safety for Robotics, ISR 2018 - Shenyang, China
Duration: 2018 Aug 242018 Aug 27

Publication series

Name2018 International Conference on Intelligence and Safety for Robotics, ISR 2018

Other

Other2018 International Conference on Intelligence and Safety for Robotics, ISR 2018
Country/TerritoryChina
CityShenyang
Period18/8/2418/8/27

ASJC Scopus subject areas

  • Artificial Intelligence
  • Mechanical Engineering
  • Safety, Risk, Reliability and Quality
  • Control and Optimization

Fingerprint

Dive into the research topics of 'Detection and Mitigation of False Data Injection Attacks for Secure Interactive Networked Control Systems'. Together they form a unique fingerprint.

Cite this