TY - GEN
T1 - Secure Networked Control via Software Rejuvenation
AU - Griffioen, Paul
AU - Romagnoli, Raffaele
AU - Krogh, Bruce H.
AU - Sinopoli, Bruno
N1 - Publisher Copyright:
© 2019 IEEE.
PY - 2019/12
Y1 - 2019/12
N2 - Software rejuvenation has been proposed as a prevention mechanism against unanticipated and undetectable attacks on cyber-physical systems. Without needing to implement any detection algorithm, the system is periodically refreshed with a secure and trusted copy of the control software to eliminate any malicious modifications to the run-time code and data that may have corrupted the controller. Previous work has considered using software rejuvenation while being able to disconnect from the network when recovering from dangerous situations. In contrast, we consider using software rejuvenation in cases where a network connection is needed in order for proper recovery to occur. We present an algorithm that satisfies the conditions necessary to ensure safe recovery in such situations where the system must become vulnerable in order to be safe. A procedure for calculating optimal parameters to achieve these conditions is presented, and our approach is illustrated via simulation.
AB - Software rejuvenation has been proposed as a prevention mechanism against unanticipated and undetectable attacks on cyber-physical systems. Without needing to implement any detection algorithm, the system is periodically refreshed with a secure and trusted copy of the control software to eliminate any malicious modifications to the run-time code and data that may have corrupted the controller. Previous work has considered using software rejuvenation while being able to disconnect from the network when recovering from dangerous situations. In contrast, we consider using software rejuvenation in cases where a network connection is needed in order for proper recovery to occur. We present an algorithm that satisfies the conditions necessary to ensure safe recovery in such situations where the system must become vulnerable in order to be safe. A procedure for calculating optimal parameters to achieve these conditions is presented, and our approach is illustrated via simulation.
UR - https://www.scopus.com/pages/publications/85082441704
U2 - 10.1109/CDC40024.2019.9028924
DO - 10.1109/CDC40024.2019.9028924
M3 - Conference contribution
AN - SCOPUS:85082441704
T3 - Proceedings of the IEEE Conference on Decision and Control
SP - 3878
EP - 3884
BT - 2019 IEEE 58th Conference on Decision and Control, CDC 2019
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 58th IEEE Conference on Decision and Control, CDC 2019
Y2 - 11 December 2019 through 13 December 2019
ER -