A Novel Method for Resilient Networked Industrial Control System Security

Authors(1) :-M. Umashankar

Current Industry processing is using the digital data which are coming from different geographical location and different environmental resources with the help of internet. Here no one can be trusted and it is possible more than a few kind threads come from different directions. Multidimensional approach to the network security is the only way able to crash these challenges. Diffusion methods or canned attacks which are recommended by the conventional network security system are outdated and impractical. It is essential to create a new resilient architecture that can survive the different types of attack and then need the speedy recovery if a breach does occur. Resilient Industrial networked control system is very important for every organization which is using a number of decisive infrastructures. Proposed method provide a framework of the control system application to build effective security mechanism that integrate all aspects of cyber security, incorporating desktop and business computing systems with industrial automation and control systems through a novel attack resilient algorithm. This paper to recommend the path to reduce the complexity of the control system and provide the safety mechanism for reliable system which is decreased the threads and increase the data integrity with privacy in all kind of organizational processing.

Authors and Affiliations

M. Umashankar
Department of MCA, Sona College of Technology, Salem, Tamilnadu, India

Wireless security, resilient control system, cyber security, data fusion, integrated system.

  1. C. G. Rieger, D. I. Gertman, and M. A. McQueen, "Resilient control systems: Next generation design research," 2nd Conference on Human System Interactions, Catania, Italy, pp. 632 636, May 2009.
  2. C. G. Rieger, "Notional examples and benchmark aspects of a resilient control system," 3rd International Symposium on Resilient Control Systems, August, 2010.
  3. Q. Zhu, C. Rieger and T. Bas¸ar, "A hierarchical security architecture for cyber-physical systems," in Proc. of the 4th Intl. Symposium on Resilient Control Systems (ISRCS), Boise, ID, Aug. 9 - 11, 2011.
  4. Q. Zhu and T. Bas¸ar, "Robust and resilient control design for cyberphysical systems with an application to power systems," in Proc. Of 50th IEEE Conference on Decision and Control and European Control Conference (CDC/ECC), Orlando, Florida, Dec. 12 - 15, 2011.
  5. Q. Zhu and T. Bas¸ar, "A dynamic game-theoretic approach to resilient control system design for cascading failures," in Proc. of International Conference on High Confidence Networked Systems (HiCoNS) at CPSWeek 2012, in Beijing, China.
  6. M. H. Manshaei, Q. Zhu, T. Alpcan, T. Bas¸ar, J.-P. Hubaux, "Game theory meets network security and privacy," Accepted and to appear in ACM Survey, 2012.
  7. Q. Zhu and T. Bas¸ar, "Indices of power in optimal IDS default configuration: theory and examples," in Proc. of 2nd Conference on Decision and Game Theory (GameSec 2011), College Park, MD, USA. Nov. 14 - 15, 2011.
  8. Q. Zhu and T. Bas¸ar, "Dynamic policy-based IDS configuration," in Proc. of 48th IEEE Conference on Decision and Control (CDC), Shanghai, China, Dec. 2009.
  9. Q. Zhu, H. Tembine and T. Bas¸ar, "Network security configuration: a nonzero-sum stochastic game approach," in IEEE Proc. of 2010 American Control Conference (ACC), Baltimore, MD, 2010.
  10. Craig G. Rieger†, Senior Member, IEEE, David I. Gertman†, Miles. A. McQueen†, Member, IEEE †Idaho National Laboratory, Idaho Falls, Idaho, USA, Next Generation Design Research
  11. H. B. Mitchell, Multi-Sensor Data Fusion, Springer-Verlag, Berlin, 2007.
  12. S.P. Meyn, Control Techniques for Complex Networks, Cambridge University Press, New York, NY, 2008.
  13. E. Hollnagel, D. D. Woods, and N. Leveson, Resilience Engineering: Concepts and Precepts, Ashgate Publishing, Aldershot Hampshire, UK, 2006.
  14. Luigi Atzori, Antonio Iera, and Giacomo Morabito. 2010. The internet of things:A survey. Computer Networks, 54(15):2787–2805.
  15. K. C. Sou, H. Sandberg, and K.H. Johansson. 2013b. On the exact solution to a smart grid cyber-security analysis problem. IEEE Transactions on Smart Grid, 4(2):856–865.
  16. A.A. Cardenas, S. Amin, and S.S. Sastry. 2008b. Research challenges for the security of control systems. In Proceedings of the 3rd USENIX Workshop on Hot Topics in Security.
  17. A. A. Cardenas, S. Amin, Z. Lin, Y. Huang, C. Huang, and S. S. Sastry. 2011. Attacks against process control systems: risk assessment, detection, and response. In Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, ASIACCS.
  18. M.Umashankar, "Privacy Preserving Healthcare System using secured cloud environment ", International Journal Of Engineering And Computer Science ISSN:2319-7242,Volume 6 Issue 6 June 2017, Page No. 21814-21817
  19. F. Pasqualetti, R. Carli, and F. Bullo, "A distributed method for state estimation and false data detection in power networks," in Proc. IEEE Int. Conf. Smart Grid Communications, Oct. 2011, pp. 469–474.
  20. A. Teixeira, S. Amin, H. Sandberg, K. H. Johansson, and S. S. Sastry, "Cyber security analysis of state estimators in electric power systems," in Proc. IEEE Int. Conf. Decision and Control, Atlanta, GA, Dec. 2010, pp. 5991–5998.
  21. L. Xie, Y. Mo, and B. Sinopoli, "False data injection attacks in electricity markets," in Proc. IEEE Int. Conf. on Smart Grid Communications, Gaithersburg, MD, Oct. 2010, pp. 226–231.
  22. Y. Mo and B. Sinopoli, "Secure control against replay attacks," in Allerton Conf. on Communications, Control and Computing, UrbanaChampaign, IL, Sep. 2009.
  23. F. Pasqualetti, A. Bicchi, and F. Bullo, "Consensus computation in unreliable networks: A system theoretic approach," IEEE Trans. Autom. Control, vol. 57, no. 1, pp. 90–104, Jan. 2012
  24. S. Sundaram and C. N. Hadjicostis, "Distributed function calculation via linear iterative strategies in the presence of malicious agents," IEEE Trans. Autom. Control, vol. 56, no. 7, pp. 1731–1742, Jul. 2011.
  25. M. Zhu and S. Martínez, "Attack-resilient distributed formation control via online adaptation," in IEEE Int. Conf. on Decision and Control, Orlando, FL, Dec. 2011, pp. 6624–6629.
  26. M. Zhu and S. Martínez, "Stackelberg game analysis of correlated attacks in cyber-physical system," in Proc. American Control Conf., Jun. 2011, pp. 4063–4068.
  27. M. Zhu and S. Martínez, "On distributed resilient consensus against replay attacks in adversarial networks," in Proc. American Control Conf., Montreal, QC, Canada, Jun. 2012, pp. 3553–3558
  28. M. Zhu and S. Martínez, "On the performance analysis of resilient networked control systems under replay attack," 2013. [Online]. Available: http://arxiv.org/abs/1307.2790
  29. Heegyun Jeon,1 Sungmin Aum,1 Hyungbo Shim,2 and Yongsoon Eun1 ‘Resilient State Estimation for Control Systems Using Multiple Observers and Median Operation " Hindawi Publishing Corporation Mathematical Problems in Engineering Volume 2016, Article ID 3750264, 9 pages http://dx.doi.org/10.1155/2016/3750264
  30. Umashankar M and Chandrasekar C., "Energy Efficient Secured Data Fusion Assurance Mechanism For Wireless Sensor Networks", European Journal Of Scientific Research, Vol.49, No.3, pp. 455-463, February – 2011. ISSN : 1450-216X/1450-202X

Publication Details

Published in : Volume 4 | Issue 1 | January-February 2018
Date of Publication : 2018-02-28
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 388-392
Manuscript Number : IJSRSET184152
Publisher : Technoscience Academy

Print ISSN : 2395-1990, Online ISSN : 2394-4099

Cite This Article :

M. Umashankar, " A Novel Method for Resilient Networked Industrial Control System Security, International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 4, Issue 1, pp.388-392, January-February-2018.
Journal URL : http://ijsrset.com/IJSRSET184152

Article Preview

Follow Us

Contact Us