Skip to main content

Security Challenges of Networked Control Systems

  • Chapter
  • First Online:
Sustainable Interdependent Networks

Abstract

Networked control systems (NCSs) are created by the integration of advanced communication networks, control systems, and computation techniques. This integration enhances efficiency and reliability at the expense of increased complexity and reduced security . For example, the reliance of NCSs on communication networks exposes these systems to attack vectors targeting generic networks. This chapter is an overview of pervasive NCSs’ applications, recent attacks on NCSs, and attack detection techniques. A mathematical framework for an NCS under common types of attack is presented, i.e., denial of service (DoS), false data injection (FDI), and time delay switch (TDS) attacks. Thereafter, the framework is used to developed an algorithm based on adaptive channel allocation and state estimation techniques to compensate for the destabilizing effects of TDS and FDI attacks simultaneously. Finally, the proposed algorithm is used in a case study to show the effect of injected attacks on different parts of an NCS and the capabilities of the detection algorithms. Simulation results show the algorithm can accurately detect attacks and can overcome the attack effects by adapting the communication channels.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. J. Slay, M. Miller, Lessons learned from the maroochy water breach. Crit. Infrastruct. Prot. 73–82 (2007)

    Google Scholar 

  2. R. Langner, Stuxnet: dissecting a cyberwarfare weapon. IEEE Secur. Priv. 9(3), 49–51 (2011)

    Google Scholar 

  3. S. Peterson, P. Faramarzi, Iran hijacked US drone, says Iranian engineer. Christ. Sci. Monit. 15 (2011)

    Google Scholar 

  4. Y. Shoukry, P. Martin, P. Tabuada, M. Srivastava, Non-invasive spoofing attacks for anti-lock braking systems, in International Workshop on Cryptographic Hardware and Embedded Systems (Springer, 2013), pp. 55–72

    Google Scholar 

  5. S. Sargolzaei, M. Cabrerizo, A. Sargolzaei, S. Noei, M. Adjouadi, Epilepsy, a cyberattack on brains networked control system, in 2016 15th IEEE International Conference on Machine Learning and Applications (ICMLA) (IEEE, 2016), pp. 622–625

    Google Scholar 

  6. A. Sargolzaei, M. Abdelghani, K.K. Yen, S. Sargolzaei, Sensorimotor control: computing the immediate future from the delayed present. BMC Bioinform. 17(7), 245 (2016)

    Google Scholar 

  7. J. Hare, X. Shi, S. Gupta, A. Bazzi, Fault diagnostics in smart micro-grids: a survey. Renew. Sustain. Energy Rev. 60, 1114–1124 (2016)

    Google Scholar 

  8. S. Amin, A.A. Cárdenas, S. Sastry, Safe and secure networked control systems under denial-of-service attacks, in HSCC, vol. 5469 (Springer, 2009), pp. 31–45

    Google Scholar 

  9. M.H. Amini, K.G. Boroojeni, T. Dragičević, A. Nejadpak, S. Iyengar, F. Blaabjerg, A comprehensive cloud-based real-time simulation framework for oblivious power routing in clusters of dc microgrids, in 2017 IEEE Second International Conference on DC Microgrids (ICDCM) (IEEE, 2017), pp. 270–273

    Google Scholar 

  10. M.H. Amini, B. Nabi, M.-R. Haghifam, Load management using multi-agent systems in smart distribution network, in 2013 IEEE Power and Energy Society General Meeting (PES) (IEEE, 2013), pp. 1–5

    Google Scholar 

  11. S. Gorman, Electricity grid in US penetrated by spies. Wall Str. J. 8 (2009)

    Google Scholar 

  12. H. Pidd, India blackouts leave 700 million without power. Guardian 31 (2012)

    Google Scholar 

  13. K. Zetter, Inside the cunning, unprecedented hack of Ukraines power grid. Wired (2016)

    Google Scholar 

  14. A. Farraj, E. Hammad, D. Kundur, A cyber-enabled stabilizing control scheme for resilient smart grid systems. IEEE Trans. Smart Grid 7(4), 1856–1865 (2016)

    Google Scholar 

  15. Y. Li, J. Wu, S. Li, Controllability and observability of CPSs under networked adversarial attacks. IET Control Theory Appl. 11(10), 1596–1602 (2017)

    Google Scholar 

  16. Q. Hu, D. Fooladivanda, Y.H. Chang, C.J. Tomlin, Secure state estimation and control for cyber security of the nonlinear power systems. IEEE Trans. Control Netw. Syst. (2017)

    Google Scholar 

  17. A. Sargolzaei, K.K. Yen, M.N. Abdelghani, Preventing time-delay switch attack on load frequency control in distributed power systems. IEEE Trans. Smart Grid 7(2), 1176–1185 (2016)

    Google Scholar 

  18. A. Sargolzaei, K. Yen, M. Abdelghani, Delayed inputs attack on load frequency control in smart grid, in 2014 IEEE PES Innovative Smart Grid Technologies Conference (ISGT) (IEEE, 2014), pp. 1–5

    Google Scholar 

  19. A. Sargolzaei, K.K. Yen, M. Abdelghani, Time-delay switch attack on load frequency control in smart grid. Adv. Commun. Technol. 5, 55–64 (2013)

    Google Scholar 

  20. A. Sargolzaei, K.K. Yen, M.N. Abdelghani, A. Mehbodniya, S. Sargolzaei, A novel technique for detection of time delay switch attack on load frequency control. Intell. Control Autom. 6(04), 205 (2015)

    Google Scholar 

  21. A. Abbaspour, P. Aboutalebi, K.K. Yen, A. Sargolzaei, Neural adaptive observer-based sensor and actuator fault detection in nonlinear systems: application in UAV. ISA Trans. 67, 317–329 (2017)

    Google Scholar 

  22. A. Abbaspour, K.K. Yen, S. Noei, A. Sargolzaei, Detection of fault data injection attack on UAV using adaptive neural network. Procedia Comput. Sci. 95, 193–200 (2016)

    Google Scholar 

  23. M.M. Rana, Attack resilient wireless sensor networks for smart electric vehicles. IEEE Sens. Lett. 1(2), 1–4 (2017)

    Google Scholar 

  24. S. Noei, A. Sargolzaei, A. Abbaspour, K. Yen, A decision support system for improving resiliency of cooperative adaptive cruise control systems. Procedia Comput. Sci. 95, 489–496 (2016)

    Google Scholar 

  25. M. Ghanavati, A. Chakravarthy, P. Menon, Pde-based analysis of automotive cyber-attacks on highways, in American Control Conference (ACC), 2017 (IEEE, 2017), pp. 1833–1838

    Google Scholar 

  26. P. Quinn-Judge, Cracks in the system. TIME Mag. (2002)

    Google Scholar 

  27. J. Leyden, Polish teen derails tram after hacking train network. Register 11 (2008)

    Google Scholar 

  28. P. Boulos, A. Sargolzaei, A. Ziaei, S. Sargolzaei, Pacemakers: a survey on development history, cyber-security threats and countermeasures. Int. J. Innov. Stud. Sci. Eng. Technol. 2(8) (2016)

    Google Scholar 

  29. A. Sargolzaei, K. Yen, M. Abdelghani, A. Abbaspour, S. Sargolzaei, Generalized attack model for networked control systems, evaluation of control methods. Intell. Control Autom. 8(3), 164–174 (2017)

    Google Scholar 

  30. A. Sargolzaei, K.K. Yen, M. Abdelghani, Control of nonlinear heartbeat models under time-delay-switched feedback using emotional learning control. Int. J. Recent Trends Eng. Technol. 10(2), 85 (2014)

    Google Scholar 

  31. G. O’Brien, S. Edwards, K. Littlefield, N. McNab, S. Wang, K. Zheng, Securing wireless infusion pumps (NIST Special Publication, 1800), p. 8B

    Google Scholar 

  32. B. Satchidanandan, P. Kumar, Dynamic watermarking: active defense of networked cyber-physical systems. Proc. IEEE 105(2), 219–240 (2017)

    Google Scholar 

  33. M. Pajic, I. Lee, G.J. Pappas, Attack-resilient state estimation for noisy dynamical systems. IEEE Trans. Control Netw. Syst. 4(1), 82–92 (2017)

    Google Scholar 

  34. D. Ding, G. Wei, S. Zhang, Y. Liu, F.E. Alsaadi, On scheduling of deception attacks for discrete-time networked systems equipped with attack detectors. Neurocomputing 219, 99–106 (2017)

    Google Scholar 

  35. D. Ding, Z. Wang, D.W. Ho, G. Wei, Observer-based event-triggering consensus control for multiagent systems with lossy sensors and cyber-attacks. IEEE Trans. Cybern. (2016)

    Google Scholar 

  36. F.-Y. Wang, D. Liu, Networked control systems, in Theory and Applications (Springer, London, 2008)

    Google Scholar 

  37. A. Sargolzaei, Time-delay switch attack on networked control systems, effects and countermeasures (2015)

    Google Scholar 

  38. Y.W. Law, T. Alpcan, M. Palaniswami, Security games for risk minimization in automatic generation control. IEEE Trans. Power Syst. 30(1), 223–232 (2015)

    Google Scholar 

  39. J. Weiss, Industrial control system (ICS) cyber security for water and wastewater systems, in Securing Water and Wastewater Systems (Springer, 2014), pp. 87–105

    Google Scholar 

  40. A. Cardenas, S. Amin, B. Sinopoli, A. Giani, A. Perrig, S. Sastry, Challenges for securing cyber physical systems, in Workshop on Future Directions in Cyber-physical Systems Security, vol. 5 (2009)

    Google Scholar 

  41. J. Meserve, Sources: staged cyber attack reveals vulnerability in power grid, CNN.com, vol. 26, 2007

    Google Scholar 

  42. A. Greenberg, Hackers cut cities power. Forbes (Jaunuary, 2008)

    Google Scholar 

  43. E. Byres, J. Lowe, The myths and facts behind cyber security risks for industrial control systems, in Proceedings of the VDE Kongress, vol. 116 (2004), pp. 213–218

    Google Scholar 

  44. A.A. Cárdenas, S. Amin, S. Sastry, Research challenges for the security of control systems, in HotSec (2008)

    Google Scholar 

  45. Y. Liu, P. Ning, M.K. Reiter, False data injection attacks against state estimation in electric power grids. ACM Trans. Inf. Syst. Secur. (TISSEC) 14(1), 13 (2011)

    Google Scholar 

  46. N. Rashid, J. Wan, G. Quirós, A. Canedo, M.A. Al Faruque, Modeling and simulation of cyberattacks for resilient cyber-physical systems

    Google Scholar 

  47. J. Wan, A. Canedo, M.A. Al Faruque, Security-aware functional modeling of cyber-physical systems, in 2015 IEEE 20th Conference on Emerging Technologies & Factory Automation (ETFA) (IEEE, 2015), pp. 1–4

    Google Scholar 

  48. H.C. Chen, M.A.A. Faruque, P.H. Chou, Security and privacy challenges in iot-based machine-to-machine collaborative scenarios, in Proceedings of the Eleventh IEEE/ACM/IFIP International Conference on Hardware/Software Codesign and System Synthesis (ACM, 2016), p. 30

    Google Scholar 

  49. A. Sargolzaei, C.D. Crane, A. Abbaspour, S. Noei, A machine learning approach for fault detection in vehicular cyber-physical systems, in 2016 15th IEEE International Conference on Machine Learning and Applications (ICMLA) (IEEE, 2016), pp. 636–640

    Google Scholar 

  50. A. Sargolzaei, K.K. Yen, M. Abdelghani, S. Sargolzaei, B. Carbunar, Resilient design of networked control systems under time delay switch attacks, application in smart grid. IEEE Access (2017)

    Google Scholar 

  51. M. Ma, H. Chen, X. Liu, F. Allgöwer, Distributed model predictive load frequency control of multi-area interconnected power system. Int. J. Electr. Power Energy Syst. 62, 289–298 (2014)

    Google Scholar 

  52. C.-T. Chen, Linear System Theory and Design (Oxford University Press, Inc., 1995)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Arman Sargolzaei .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Sargolzaei, A., Abbaspour, A., Al Faruque, M.A., Salah Eddin, A., Yen, K. (2018). Security Challenges of Networked Control Systems. In: Amini, M., Boroojeni, K., Iyengar, S., Pardalos, P., Blaabjerg, F., Madni, A. (eds) Sustainable Interdependent Networks. Studies in Systems, Decision and Control, vol 145. Springer, Cham. https://doi.org/10.1007/978-3-319-74412-4_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-74412-4_6

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-74411-7

  • Online ISBN: 978-3-319-74412-4

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics