窃听
计算机科学
加密
计算机安全
可执行文件
脆弱性(计算)
背景(考古学)
数据完整性
判断
信息物理系统
计算机网络
法学
古生物学
政治学
生物
操作系统
作者
Yuchen Jiang,Shimeng Wu,Hongyan Yang,Hao Luo,Zhiwen Chen,Shen Yin,Okyay Kaynak
标识
DOI:10.1109/tsmc.2022.3164024
摘要
Threats of cyberattacks have penetrated from disclosing critical user information to destroying/manipulating industrial control systems. Study on data security during network transmission has raised increasing attention in the systems and control community, which is found very necessary and timely in the context of Industry 4.0. In most existing approaches, the protection of the transmitted data from eavesdropping attacks and the detection of malicious integrity attacks are usually carried out separately. In this study, an integrated data-driven framework applicable at the control level is proposed to deal with secure transmission and attack detection simultaneously. In the framework, a secure correlation-based encryption/decryption approach and a trustworthiness judgement approach are proposed. Comprehensive discussions are made regarding the analysis of the sensitivity to attacks, the introduced time delay, and the design degree-of-free. Executable algorithms are presented, corresponding to which hardware is modularized and can work standalone independent from the configuration of the monitoring and control systems or any third-party authentication agencies. Evaluation results on a simulated two-area frequency-load control power grid system are provided to show the effectiveness and performance of the proposed approaches.
科研通智能强力驱动
Strongly Powered by AbleSci AI