中间人攻击
计算机科学
试验台
加密
重放攻击
欺骗攻击
钥匙(锁)
网络数据包
计算机网络
路由器
协议(科学)
计算机安全
实时计算
认证(法律)
医学
替代医学
病理
作者
Akane Kosugi,Kaoru Teranishi,Kiminao Kogiso
出处
期刊:IEEE Access
[Institute of Electrical and Electronics Engineers]
日期:2024-01-01
卷期号:: 1-1
标识
DOI:10.1109/access.2024.3353289
摘要
In this study, the effectiveness of encrypted control systems in detecting attacks is experimentally demonstrated using a networked control system testbed that allows for man-in-the-middle (MITM) attacks. The developed testbed is a networked position control system for an industrial-use linear stage. Generally, an attacker can reroute and modify packet data via a wireless router, harnessing the address-resolution-protocol-spoofing technique, which allows for the execution of MITM attacks, such as falsification and replay attacks. The deployed MITM-attack-detection method is grounded on a threshold-based method that monitors control inputs. The demonstration examines falsification- and replay-attack scenarios across unencrypted, static-key, and key-updatable encrypted control systems. The results confirm that encrypted control systems are both effective and apt in detecting attacks in real time. Furthermore, the potential for developing alternative attack-detection schemes based on variations in processing times is discussed.
科研通智能强力驱动
Strongly Powered by AbleSci AI