Logo PTI Logo FedCSIS

Proceedings of the 17th Conference on Computer Science and Intelligence Systems

Annals of Computer Science and Information Systems, Volume 30

Sensor Data Protection in Cyber-Physical Systems

, , ,

DOI: http://dx.doi.org/10.15439/2022F12

Citation: Proceedings of the 17th Conference on Computer Science and Intelligence Systems, M. Ganzha, L. Maciaszek, M. Paprzycki, D. Ślęzak (eds). ACSIS, Vol. 30, pages 855859 ()

Full text

Abstract. Cyber-Physical Systems (CPS) always have a physical part that can interact with sensors and actuators. The data that is read from sensors and the data generated to drive actuators is crucial for the correct operation of this class of devices. The majority of the implementations trust the data being read from sensors and the outputted data to actuators. Real-time validation of the input and output of data for any system is crucial for the safety of its operation. This paper proposes an architecture for handling this issue through smart data guards, which are detached from sensors and controllers and act solely on the data. This mitigates potential issues of malfunctioning sensors and faulty control signals, and intentional sensor and controller attacks. The data guards know the expected data, can detect anomalies and can correct them in real-time. This approach adds more guarantees for fault-tolerant behavior in the presence of attacks and failures.

References

  1. Y. Zhang and K. Rasmussen, “Detection of electromagnetic interference attacks on sensor systems,” in 2020 IEEE Symposium on Security and Privacy (SP). Los Alamitos, CA, USA: IEEE Computer Society, may 2020, pp. 1–1. [Online]. Available: https://doi.ieeecomputersociety.org/10.1109/SP.2020.00001
  2. H. Pearce, S. Pinisetty, P. S. Roop, M. M. Y. Kuo, and A. Ukil, “Smart i/o modules for mitigating cyber-physical attacks on industrial control systems,” IEEE Transactions on Industrial Informatics, vol. 16, no. 7, pp. 4659–4669, 2020.
  3. J. Park, R. Ivanov, J. Weimer, M. Pajic, and I. Lee, “Sensor attack detection in the presence of transient faults,” in Proceedings of the ACM/IEEE Sixth International Conference on Cyber-Physical Systems, ser. ICCPS ’15. New York, NY, USA: Association for Computing Machinery, 2015, p. 1–10. [Online]. Available: https://doi.org/10.1145/2735960.2735984
  4. E. Balestrieri, P. Daponte, L. De Vito, and F. Lamonaca, “Sensors and measurements for unmanned systems: An overview,” Sensors, vol. 21, no. 4, 2021. [Online]. Available: https://www.mdpi.com/1424-8220/21/4/1518
  5. J.-P. A. Yaacoub, H. N. Noura, O. Salman, and A. Chehab, “Robotics cyber security: vulnerabilities, attacks, countermeasures, and recommendations,” International Journal of Information Security, pp. 1–44, 2021.
  6. D. Muniraj and M. Farhood, “Detection and mitigation of actuator attacks on small unmanned aircraft systems,” Control Engineering Practice, vol. 83, no. C. [Online]. Available: https://par.nsf.gov/biblio/10086394
  7. D. de Niz, B. Andersson, and G. Moreno, “Safety enforcement for the verification of autonomous systems,” in Autonomous Systems: Sensors, Vehicles, Security, and the Internet of Everything, M. C. Dudzik and J. C. Ricklin, Eds., vol. 10643, International Society for Optics and Photonics. SPIE, 2018, pp. 1 – 10. [Online]. Available: https://doi.org/10.1117/12.2307575
  8. H. Choi, W.-C. Lee, Y. Aafer, F. Fei, Z. Tu, X. Zhang, D. Xu, and X. Xinyan, “Detecting attacks against robotic vehicles: A control invariant approach,” Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018.
  9. L. Meier, D. Honegger, and M. Pollefeys, “Px4: A node-based multithreaded open source robotics framework for deeply embedded platforms,” in 2015 IEEE International Conference on Robotics and Automation (ICRA), 2015, pp. 6235–6240.
  10. A. Paikan, V. Tikhanoff, G. Metta, and L. Natale, “Enhancing software module reusability using port plug-ins: an experiment with the icub robot,” in 2014 IEEE/RSJ International Conference on Intelligent Robots and Systems. IEEE, 2014, pp. 1555–1562.
  11. J. Park, R. Ivanov, J. Weimer, M. Pajic, and I. Lee, “Sensor attack detection in the presence of transient faults,” in Proceedings of the ACM/IEEE Sixth International Conference on Cyber-Physical Systems, ser. ICCPS ’15. New York, NY, USA: Association for Computing Machinery, 2015, p. 1–10. [Online]. Available: https://doi.org/10.1145/2735960.2735984
  12. M. T. Leccadito, “A hierarchical architectural framework for securing unmanned aerial systems,” 2017.
  13. A. Allouch, O. Cheikhrouhou, A. Koubaa, M. Khalgui, and T. Abbes, “Mavsec: Securing the mavlink protocol for ardupilot/px4 unmanned aerial systems,” 2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC), pp. 621–628, 2019.
  14. J. Zeng, L. T. Yang, M. Lin, H. Ning, and J. Ma, “A survey: Cyber-physical-social systems and their system- level design methodology,” Future Generation Computer Systems, vol. 105, pp. 1028–1042, 2020. [Online]. Available: https://www.sciencedirect.com/science/article/pii/S0167739X1630228X
  15. M. Wu, H. Zeng, C. Wang, and H. Yu, “Invited: Safety guard: Runtime enforcement for safety-critical cyber-physical systems,” in 2017 54th ACM/EDAC/IEEE Design Automation Conference (DAC), 2017, pp. 1–6.
  16. A. Beugnard, J.-M. Jezequel, N. Plouzeau, and D. Watkins, “Making components contract aware,” Computer, vol. 32, no. 7, pp. 38–45, 1999.
  17. A. Sangiovanni-Vincentelli, W. Damm, and R. Passerone, “Taming dr. frankenstein: Contract-based design for cyber-physical systems,” European journal of control, vol. 18, no. 3, pp. 217–238, 2012.
  18. A. Benveniste, B. Caillaud, D. Nickovic, R. Passerone, J.-B. Raclet, P. Reinkemeier, A. Sangiovanni-Vincentelli, W. Damm, T. A. Henzinger, and K. G. Larsen, Contracts for System Design, 2018.
  19. Y. Liu and C. Cunningham, “Software component specification using design by contract,” 03 2002.
  20. M. Sadraey, Unmanned Aircraft Design: A Review of Fundamentals, 2017.
  21. E. Ebeid, M. Skriver, K. H. Terkildsen, K. Jensen, and U. P. Schultz, “A survey of open-source uav flight controllers and flight simulators,” Microprocessors and Microsystems, vol. 61, pp. 11–20, 2018. [Online]. Available: https://www.sciencedirect.com/science/article/pii/S0141933118300930
  22. A. Kouba, A. Allouch, M. Alajlan, Y. Javed, A. Belghith, and M. Khalgui, “Micro air vehicle link (mavlink) in a nutshell: A survey,” IEEE Access, vol. 7, pp. 87 658–87 680, 2019.
  23. M. Lauer, M. Amy, J.-C. Fabre, M. Roy, W. Excoffon, and M. Stoicescu, “Engineering adaptive fault-tolerance mechanisms for resilient computing on ros,” in 2016 IEEE 17th International Symposium on High Assurance Systems Engineering (HASE), 2016, pp. 94–101.
  24. I. Malavolta, G. Lewis, B. Schmerl, P. Lago, and D. Garlan, “How do you architect your robots? state of the practice and guidelines for rosbased systems,” in 2020 IEEE/ACM 42nd International Conference on Software Engineering: Software Engineering in Practice (ICSE-SEIP), 2020, pp. 31–40.
  25. J.-L. Colaço, B. Pagano, and M. Pouzet, “Scade 6: A formal language for embedded critical software development (invited paper),” in 2017 International Symposium on Theoretical Aspects of Software Engineering (TASE), 2017, pp. 1–11.