2017
DOI: 10.1145/3126518
|View full text |Cite
|
Sign up to set email alerts
|

Security-Aware Scheduling of Embedded Control Tasks

Abstract: In this work, we focus on securing cyber-physical systems (CPS) in the presence of network-based attacks, such as Man-in-the-Middle (MitM) attacks, where a stealthy attacker is able to compromise communication between system sensors and controllers. Standard methods for this type of attacks rely on the use of cryptographic mechanisms, such as Message Authentication Codes (MACs) to ensure data integrity. However, this approach incurs significant computation overhead, limiting its use in … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
43
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
2
1

Relationship

2
5

Authors

Journals

citations
Cited by 45 publications
(43 citation statements)
references
References 19 publications
0
43
0
Order By: Relevance
“…For both studies, sensor values are transmitted over an internal vehicle's network, such as commonly used CAN bus. Note that in [14], we provide additional automotive case-studies (and the overall scheduling framework) for intermittent authentication of CANbus messages from system sensors, and in [15] we show benefits of intermittent authentication on vehicle's ECU scheduling.…”
Section: Case Studiesmentioning
confidence: 98%
See 2 more Smart Citations
“…For both studies, sensor values are transmitted over an internal vehicle's network, such as commonly used CAN bus. Note that in [14], we provide additional automotive case-studies (and the overall scheduling framework) for intermittent authentication of CANbus messages from system sensors, and in [15] we show benefits of intermittent authentication on vehicle's ECU scheduling.…”
Section: Case Studiesmentioning
confidence: 98%
“…Related results from [20], [23], focus only on the detection function g k = z T k Q −1 z k and show only sufficient conditions for stealthy attacks -i.e., that in this case from a robustness condition ∆z k Q −1 ≤ α it follows that the the stealthiness condition β a k ≤ β + ε is satisfied. However, the equivalence between conditions ∆z k Q −1 ≤ α and β a k ≤ β +ε will enable us to reduce conservativeness of our analysis as well as analyze boundness of the reachability region for the general type of detection functions from (15), by allowing us to employ both conditions interchangeably.…”
Section: Remarkmentioning
confidence: 99%
See 1 more Smart Citation
“…For localization, the UAV mainly relies on a GPS sensor that can be compromised to effectively steer the UAV away from its original path. While aggressive attacks can be detected, some may remain stealthy by introducing only bounded errors at each step [20,26,22,16]. For example, Fig.…”
Section: Stochastic Gamesmentioning
confidence: 99%
“…We only deal with eavesdropping attacks here, but other types of attacks have also been studied [2]. Those include denialof-service attacks [3] and data-integrity attacks [4]- [8].…”
Section: Introductionmentioning
confidence: 99%