Secure Networked Control via Software Rejuvenation

  • Paul Griffioen
  • , Raffaele Romagnoli
  • , Bruce H. Krogh
  • , Bruno Sinopoli

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

16 Scopus citations

Abstract

Software rejuvenation has been proposed as a prevention mechanism against unanticipated and undetectable attacks on cyber-physical systems. Without needing to implement any detection algorithm, the system is periodically refreshed with a secure and trusted copy of the control software to eliminate any malicious modifications to the run-time code and data that may have corrupted the controller. Previous work has considered using software rejuvenation while being able to disconnect from the network when recovering from dangerous situations. In contrast, we consider using software rejuvenation in cases where a network connection is needed in order for proper recovery to occur. We present an algorithm that satisfies the conditions necessary to ensure safe recovery in such situations where the system must become vulnerable in order to be safe. A procedure for calculating optimal parameters to achieve these conditions is presented, and our approach is illustrated via simulation.

Original languageEnglish
Title of host publication2019 IEEE 58th Conference on Decision and Control, CDC 2019
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages3878-3884
Number of pages7
ISBN (Electronic)9781728113982
DOIs
StatePublished - Dec 2019
Event58th IEEE Conference on Decision and Control, CDC 2019 - Nice, France
Duration: Dec 11 2019Dec 13 2019

Publication series

NameProceedings of the IEEE Conference on Decision and Control
Volume2019-December
ISSN (Print)0743-1546
ISSN (Electronic)2576-2370

Conference

Conference58th IEEE Conference on Decision and Control, CDC 2019
Country/TerritoryFrance
CityNice
Period12/11/1912/13/19

Fingerprint

Dive into the research topics of 'Secure Networked Control via Software Rejuvenation'. Together they form a unique fingerprint.

Cite this