Secure networked control systems under data integrity attacks

@article{Pang2010SecureNC,
  title={Secure networked control systems under data integrity attacks},
  author={Zhong hua Pang and Guoping Liu},
  journal={Proceedings of the 29th Chinese Control Conference},
  year={2010},
  pages={5765-5771}
}
Networked control systems (NCSs) have been gaining popularity with their high potential in widespread applications and becoming realizable with the rapid developments in computer, communication and control technologies. This paper addresses the security issues of NCSs, especially data confidentiality and integrity. The data encryption standard (DES) and message digest 5 (MD5) are integrated with the application to encrypt the data transmitted on the network and detect their integrity. The… CONTINUE READING
Highly Cited
This paper has 33 citations. REVIEW CITATIONS

Citations

Publications citing this paper.
Showing 1-10 of 11 extracted citations

Security testing of a modular cryptosystem based on continuous cellular automata

2012 IEEE 11th International Conference on Cognitive Informatics and Cognitive Computing • 2012
View 3 Excerpts
Highly Influenced

Detection of data injection attack in industrial control system using long short term memory recurrent neural network

2018 13th IEEE Conference on Industrial Electronics and Applications (ICIEA) • 2018
View 1 Excerpt

Attack-tolerant networked control system in presence of the controller hijacking attack

2016 International Conference on Military Communications and Information Systems (ICMCIS) • 2016
View 1 Excerpt

Intelligent Generalized Predictive Control strategy for Networked Control System with an internal cyber-attack detector

2016 IEEE 21st International Conference on Emerging Technologies and Factory Automation (ETFA) • 2016
View 1 Excerpt

Towards distinguishing between faults and cyber-attacks in the networked control system

2016 World Congress on Industrial Control Systems Security (WCICSS) • 2016
View 1 Excerpt

Design of false data injection attacks for output tracking control of CARMA systems

2015 IEEE International Conference on Information and Automation • 2015
View 2 Excerpts

False data injection attacks for output tracking control systems

2015 34th Chinese Control Conference (CCC) • 2015
View 2 Excerpts

Comparison of cryptosystems using a single-scale statistical measure

2013 26th IEEE Canadian Conference on Electrical and Computer Engineering (CCECE) • 2013
View 2 Excerpts

Comparison of selected cryptosystems using single-scale and poly-scale measures

2013 IEEE 12th International Conference on Cognitive Informatics and Cognitive Computing • 2013
View 2 Excerpts

References

Publications referenced by this paper.
Showing 1-10 of 11 references

Performance assessment and compensation for secure networked control systems

2008 34th Annual Conference of IEEE Industrial Electronics • 2008

A survey of recent results in networked control systems

C. H. Wu Q. Zhang, J. D. Irwin
Proceedings of the IEEE • 2007

A unified architecture of MD 5 and RIPEMD160 hash algorithms

T. S. Ng C. W. Ng, K. W. Yip
Proceedings of the 2004 International Symposium on Circuits and Systems • 2005

Distributed device networks with security constraints

IEEE Transactions on Industrial Informatics • 2005

Security for industrial communication systems

L. Korba
Proceedings of the IEEE • 2005