TY - GEN
T1 - Detection and Mitigation of False Data Injection Attacks for Secure Interactive Networked Control Systems
AU - Kubo, Ryogo
N1 - Funding Information:
This work was supported in part by JSPS KAKENHI Grant Numbers 18K11275 and 18H03236.
PY - 2018/11/14
Y1 - 2018/11/14
N2 - Cybersecurity in control systems has been actively discussed in recent years. In particular, networked control systems (NCSs) over the Internet are exposed to various types of cyberattacks such as false data injection attacks. This paper proposes a detection and mitigation method of the false data injection attacks in interactive NCSs, i.e., bilateral teleoperation systems. A bilateral teleoperation system exchanges position and force information through the Internet between the master and slave robots. The proposed method utilizes two redundant communication channels for both the master-to-slave and slave-to-master paths. The attacks are detected by a tamper detection observer (TDO) on each of the master and slave sides. The TDO compares the position responses of actual robots and robot models. A path selector on each side chooses the appropriate position and force responses from the responses received through the two communication channels, based on the outputs of the TDO. The proposed method is validated by simulations with attack models.
AB - Cybersecurity in control systems has been actively discussed in recent years. In particular, networked control systems (NCSs) over the Internet are exposed to various types of cyberattacks such as false data injection attacks. This paper proposes a detection and mitigation method of the false data injection attacks in interactive NCSs, i.e., bilateral teleoperation systems. A bilateral teleoperation system exchanges position and force information through the Internet between the master and slave robots. The proposed method utilizes two redundant communication channels for both the master-to-slave and slave-to-master paths. The attacks are detected by a tamper detection observer (TDO) on each of the master and slave sides. The TDO compares the position responses of actual robots and robot models. A path selector on each side chooses the appropriate position and force responses from the responses received through the two communication channels, based on the outputs of the TDO. The proposed method is validated by simulations with attack models.
UR - http://www.scopus.com/inward/record.url?scp=85059098087&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85059098087&partnerID=8YFLogxK
U2 - 10.1109/IISR.2018.8535978
DO - 10.1109/IISR.2018.8535978
M3 - Conference contribution
AN - SCOPUS:85059098087
T3 - 2018 International Conference on Intelligence and Safety for Robotics, ISR 2018
SP - 7
EP - 12
BT - 2018 International Conference on Intelligence and Safety for Robotics, ISR 2018
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 2018 International Conference on Intelligence and Safety for Robotics, ISR 2018
Y2 - 24 August 2018 through 27 August 2018
ER -