scholarly journals Protecting Private Communications in Cyber-Physical Systems through Physical Unclonable Functions

Electronics ◽  
2019 ◽  
Vol 8 (4) ◽  
pp. 390 ◽  
Author(s):  
Marina Pérez-Jiménez ◽  
Borja Sánchez ◽  
Andrea Migliorini ◽  
Ramón Alcarria

Cyber-physical systems (CPS) are envisioned to change the whole of society. New engineered systems joining physical and digital solutions are being employed in industry, education, etc. These new systems are networked by default, and private information is shared among the different components related to users, critical infrastructures, or business operations. In this context, it is essential to encrypt those communication links to protect such information. However, even most complicated schemes based on hybrid (asymmetric and symmetric) solutions, finally require physical devices to store a secret key. This approach is cryptographically weak, as any person with physical access to the device could obtain that key. Therefore, in this paper we propose the use of physical unclonable functions (PUF) to generate secret keys for lightweight encryption schemes. Using PUFs, any attempt to capture the key is changing the original secret stream, and even manufacturers are not able to build two identical PUFs. The proposed key generator is based on magnetic materials and lightweight pseudorandom number generators to meet the low-cost and small size requirements of CPS. In particular, materials with an activated exchange-bias effect are employed, together with simple copper coils. The encryption process can be based on a simple XOR gate because of the robustness of the proposed key generator. In order to evaluate the performance of the proposed technology, an experimental validation based on simulation scenarios is also provided.

2015 ◽  
Vol 2015 ◽  
pp. 1-15 ◽  
Author(s):  
Nafaâ Jabeur ◽  
Nabil Sahli ◽  
Sherali Zeadally

Wireless sensor networks (WSNs) are key components in the emergent cyber physical systems (CPSs). They may include hundreds of spatially distributed sensors which interact to solve complex tasks going beyond their individual capabilities. Due to the limited capabilities of sensors, sensor actions cannot meet CPS requirements while controlling and coordinating the operations of physical and engineered systems. To overcome these constraints, we explore the ecosystem metaphor for WSNs with the aim of taking advantage of the efficient adaptation behavior and communication mechanisms of living organisms. By mapping these organisms onto sensors and ecosystems onto WSNs, we highlight shortcomings that prevent WSNs from delivering the capabilities of ecosystems at several levels, including structure, topology, goals, communications, and functions. We then propose an agent-based architecture that migrates complex processing tasks outside the physical sensor network while incorporating missing characteristics of autonomy, intelligence, and context awareness to the WSN. Unlike existing works, we use software agents to map WSNs to natural ecosystems and enhance WSN capabilities to take advantage of bioinspired algorithms. We extend our architecture and propose a new intelligent CPS framework where several control levels are embedded in the physical system, thereby allowing agents to support WSNs technologies in enabling CPSs.


Electronics ◽  
2019 ◽  
Vol 8 (11) ◽  
pp. 1220 ◽  
Author(s):  
Xiaogang Zhu ◽  
Gautam Srivastava ◽  
Reza M. Parizi

The new developments in smart cyber-physical systems can be shown to include smart cities, Internet of things (IoT), and for the most part smart anything. To improve the security of sensitive personal information (SPI) in cyber-physical systems, we present some novel ideas related to the encryption of SPI. Currently, there are issues in traditional encryption methods, such as low speed of information acquisition, low recognition rate, low utilization rate of effective information resources, and high delay of information query. To address these issues, we propose a novel efficient encryption algorithm for the security of incremental SPI. First, our proposed method analyzes user information resources and determines valid data to be encrypted. Next, it uses adaptive acquisition methods to collect information, and uses our encryption method to complete secure encryption of SPI according to the acquisition results. Our experimental analysis clearly shows that the algorithm effectively improves the speed of information acquisition as well as effective information recognition rate, thus enhancing the security of SPI. The encryption model in turn can provide a strong guarantee for user information security.


Author(s):  
Lee T. Maccarone ◽  
Daniel G. Cole

Abstract Cyber-physical systems are engineered systems that rely on the integration of physical processes and computational resources. While this integration enables advanced techniques for monitoring and controlling systems, it also exposes the physical process to cyber-threats. An attacker who is able to access control inputs and mask measurements could damage the system while remaining undetected. By masking certain measurement signals, an attacker may be able to render a portion of the state space unobservable, meaning that it is impossible to estimate or infer the value of those states. This is called an observability attack. A game-theoretic approach is presented to analyze observability attacks. The attacker's strategy set includes all possible combinations of masked measurements. The defender's strategy set includes all possible combinations of measurement reinforcements. The attacker's and defender's utilities are quantified using the responses of the observable and unobservable states. The observability attack game is analyzed for a nuclear balance of plant system. Multiple pure-strategy and mixed-strategy Nash equilibria are identified, and the conditions for their existence are presented. Using this procedure, a security and control engineer can select the optimal strategy to defend a cyber-physical system from observability attacks.


2019 ◽  
Vol 15 (8) ◽  
pp. 155014771986786 ◽  
Author(s):  
Min Wang ◽  
Kama Huang ◽  
Yi Wang ◽  
Zhen Wu ◽  
Zhibo Du

Security of cyber-physical systems against cyber attacks is an important yet challenging problem. Cyber-physical systems are prone to information leakage from the physical domain. The analog emissions, such as magnetic and power, can turn into side channel revealing valuable data, even the crypto key of the system. Template attack is a popular type of side-channel analysis using machine learning technology. Malicious attackers can use template attack to profile the analog emission, then recover the secret key of the system. But conventional template attack requires that the adversary has access to an identical experiment device that he can program to his choice. This study proposes a novel side-channel analysis for physical-domain security in cyber-physical systems. Our contributions are the following three points: (1) Major peak region method for finding points of interests correctly is proposed. (2) A method for establishing templates on the basis of those points of interest still without requiring knowledge of the key is proposed. Several techniques are proposed to improve the quality of the templates as well. (3) A method for choosing attacking traces is proposed to significantly improve the attacking efficiency. Our experiments on three devices show that the proposed method is significantly more effective than conventional template attack. By doing so, we will highlight the importance of performing similar analysis during design time to secure the cyber-physical system.


Electronics ◽  
2021 ◽  
Vol 10 (18) ◽  
pp. 2238
Author(s):  
Carlos M. Paredes ◽  
Diego Martínez-Castro ◽  
Vrani Ibarra-Junquera ◽  
Apolinar González-Potes

New applications of industrial automation request great flexibility in the systems, supported by the increase in the interconnection between its components, allowing access to all the information of the system and its reconfiguration based on the changes that occur during its operations, with the purpose of reaching optimum points of operation. These aspects promote the Smart Factory paradigm, integrating physical and digital systems to create smarts products and processes capable of transforming conventional value chains, forming the Cyber-Physical Systems (CPSs). This flexibility opens a large gap that affects the security of control systems since the new communication links can be used by people to generate attacks that produce risk in these applications. This is a recent problem in the control systems, which originally were centralized and later were implemented as interconnected systems through isolated networks. To protect these systems, strategies that have presented acceptable results in other environments, such as office environments, have been chosen. However, the characteristics of these applications are not the same, and the results achieved are not as expected. This problem has motivated several efforts in order to contribute from different approaches to increase the security of control systems. Based on the above, this work proposes an architecture based on artificial neural networks for detection and isolation of cyber attacks Denial of Service (DoS) and integrity in CPS. Simulation results of two test benches, the Secure Water Treatment (SWaT) dataset, and a tanks system, show the effectiveness of the proposal. Regarding the SWaT dataset, the scores obtained from the recall and F1 score metrics was 0.95 and was higher than other reported works, while, in terms of precision and accuracy, it obtained a score of 0.95 which is close to other proposed methods. With respect to the interconnected tank system, scores of 0.96,0.83,0.81, and 0.83 were obtained for the accuracy, precision, F1 score, and recall metrics, respectively. The high true negatives rate in both cases is noteworthy. In general terms, the proposal has a high effectiveness in detecting and locating the proposed attacks.


2015 ◽  
Vol 4 (1) ◽  
pp. 63-75 ◽  
Author(s):  
A. König ◽  
K. Thongpull

Abstract. Distributed integrated sensory systems enjoy increasing impact leveraged by the surging advance of sensor, communication, and integration technology in, e.g., the Internet of Things, cyber-physical systems, Industry 4.0, and ambient intelligence/assisted-living applications. Smart kitchens and "white goods" in general have become an active field of R&D. The goal of our research is to provide assistance for unskilled or challenged consumers by efficient sensory feedback or context on ingredient quality and cooking step results, which explicitly includes decay and contamination detection. As one front end of such a culinary-assistance system, an integrated, multi-sensor, low-cost, autonomous, smart spoon device, denoted as Lab-on-Spoon (LoS), has been conceived. The first realized instance presented here features temperature, color, and impedance spectroscopy sensing in a 3-D-printed spoon package. Acquired LoS data are subject to sensor fusion and decision making on the host system. LoS was successfully applied to liquid ingredient recognition and quality assessment, including contamination detection, in several applications, e.g., for glycerol detection in wine. In future work, improvement to sensors, electronics, and algorithms will be pursued to achieve an even more robust, dependable and self-sufficient LoS system.


2020 ◽  
Vol 4 (2) ◽  
pp. 1-20 ◽  
Author(s):  
Kai Li ◽  
Wei Ni ◽  
Yousef Emami ◽  
Yiran Shen ◽  
Ricardo Severino ◽  
...  

2016 ◽  
Vol 12 (1) ◽  
pp. 4 ◽  
Author(s):  
Pablo González-Nalda ◽  
Ismael Etxeberria-Agiriano ◽  
Isidro Calvo

This paper presents a generic architecture for the design of Cyber-Physical Systems (CPS) based on inexpensive and easily available hardware and open source software components. . This architecture provides a framework aimed at building CPS in a robust, flexible and modular way. The presented architecture intends to ease the construction of this kind of systems together with its evolution and management. The potential of the proposed architecture is illustrated by means of a case study consisting of a mobile robotics application built with low cost hardware modules modules. There is a large community of users for these components and plenty of related technical information is available. As a consequence, these inexpensive components were found suitable for being used at different application domains, including research and education.


Sign in / Sign up

Export Citation Format

Share Document