Towards Trustworthy Data in Networked Control Systems: A Hardware-Based Approach

Thomas Ulz, Thomas Wolfgang Pieber, Christian Steger, Rainer Matischek, Holger Bock

Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

Abstract

The importance of Networked Control Systems (NCS) is steadily increasing due to recent trends such as smart factories. Correct functionality of such NCS needs to be protected as malfunctioning systems could have severe consequences for the controlled process or even threaten human lives. However, with the increase in NCS, also attacks targeting these systems are becoming more frequent. To mitigate attacks that utilize captured sensor data in an NCS, transferred data needs to be protected. While using well-known methods such as Transport Layer Security (TLS) might be suitable to protect the data, resource constraint devices such as sensors often are not powerful enough to perform the necessary cryptographic operations. Also, as we will show in this paper, applying simple encryption in an NCS may enable easy Denial-of-Service (DoS) attacks by attacking single bits of the encrypted data. Therefore, in this paper, we present a hardware-based approach that enables sensors to perform the necessary encryption while being robust against (injected) bit failures.
Original languageEnglish
Title of host publicationProceedings of the 2017 IEEE International Conference on Emerging Technologies and Factory Automation (ETFA)
PublisherIEEE Industrial Electronics Society
Number of pages8
Publication statusPublished - 2017
Event22nd IEEE International Conference on Emerging Technologies and Factory Automation: ETFA 2017 - Grand Resort Hotel, Limassol, Cyprus
Duration: 12 Sept 201715 Sept 2017
https://etfa2017.org/

Conference

Conference22nd IEEE International Conference on Emerging Technologies and Factory Automation
Country/TerritoryCyprus
CityLimassol
Period12/09/1715/09/17
Internet address

Fingerprint

Dive into the research topics of 'Towards Trustworthy Data in Networked Control Systems: A Hardware-Based Approach'. Together they form a unique fingerprint.

Cite this