Glenn A. Fink, Richard L. Griswold, Zachary W. Beech
{"title":"Quantifying cyber-resilience against resource-exhaustion attacks","authors":"Glenn A. Fink, Richard L. Griswold, Zachary W. Beech","doi":"10.1109/ISRCS.2014.6900093","DOIUrl":"https://doi.org/10.1109/ISRCS.2014.6900093","url":null,"abstract":"Resilience in the information sciences is notoriously difficult to define much less to measure. But in mechanical engineering, the resilience of a substance is mathematically well-defined as an area under the stress-strain curve. We combined inspiration from mechanics of materials and axioms from queuing theory in an attempt to define resilience precisely for information systems. We first examine the meaning of resilience in linguistic and engineering terms and then translate these definitions to information sciences. As a general assessment of our approach's fitness, we quantify how resilience may be measured in a simple queuing system. By using a very simple model we allow clear application of established theory while being flexible enough to apply to many other engineering contexts in information science and cyber security. We tested our definitions of resilience via simulation and analysis of networked queuing systems. We conclude with a discussion of the results and make recommendations for future work.","PeriodicalId":205922,"journal":{"name":"2014 7th International Symposium on Resilient Control Systems (ISRCS)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130906099","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yan Zhang, D. Subbaram Naidu, H. M. Nguyen, Chenxiao Cai, Y. Zou
{"title":"Time scale analysis and synthesis for Model Predictive Control under stochastic environments","authors":"Yan Zhang, D. Subbaram Naidu, H. M. Nguyen, Chenxiao Cai, Y. Zou","doi":"10.1109/ISRCS.2014.6900085","DOIUrl":"https://doi.org/10.1109/ISRCS.2014.6900085","url":null,"abstract":"This paper presents a method of time-scale analysis and synthesis for Model Predictive Control (MPC) under stochastic environment. A high-order plant is decoupled into slow and fast subsystems using time-scale method with high-order accuracy. Based on the two subsystems, Kalman filters and sub-controllers are designed separately for the subsystems. Then a composite model predictive controller is obtained. The method is illustrated by applying the proposed method to wind energy conversion system. The response of the output from the composite model predictive controller is compared to that of the original MPC showing the simplicity and reduction in computation effort of the proposed method for Model Predictive Control.","PeriodicalId":205922,"journal":{"name":"2014 7th International Symposium on Resilient Control Systems (ISRCS)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127937248","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Priority-based broadcasting of sensitive data in error-prone wireless networks","authors":"P. Ostovari, Jie Wu, Ying Dai","doi":"10.1109/ISRCS.2014.6900087","DOIUrl":"https://doi.org/10.1109/ISRCS.2014.6900087","url":null,"abstract":"Providing reliable transmission in wireless communication networks is an important problem which is typically addressed using feedback and acknowledgment messages. In the networks where using feedbacks is not possible, such as real-time systems, an alternative approach is to maximize the possible gain that the destination nodes are expected to receive. In this paper, we consider transmission of data with different priorities, and study the problem of maximizing the total gain in the case that partial data retrieval is acceptable. We propose an optimal solution that benefits from network coding. We also consider the case of burst errors and discuss how can we make our proposed method robust to this type of error. We evaluate our proposed priority-based data transmission method using both simulations and results from the implementation on a USRP testbed.","PeriodicalId":205922,"journal":{"name":"2014 7th International Symposium on Resilient Control Systems (ISRCS)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117208643","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Gonçalo Martins, Anirban Bhattacharjee, A. Dubey, X. Koutsoukos
{"title":"Performance evaluation of an authentication mechanism in time-triggered networked control systems","authors":"Gonçalo Martins, Anirban Bhattacharjee, A. Dubey, X. Koutsoukos","doi":"10.1109/ISRCS.2014.6900098","DOIUrl":"https://doi.org/10.1109/ISRCS.2014.6900098","url":null,"abstract":"An important challenge in networked control systems is to ensure the confidentiality and integrity of the message in order to secure the communication and prevent attackers or intruders from compromising the system. However, security mechanisms may jeopardize the temporal behavior of the network data communication because of the computation and communication overhead. In this paper, we study the effect of adding Hash Based Message Authentication (HMAC) to a time-triggered networked control system. Time Triggered Architectures (TTAs) provide a deterministic and predictable timing behavior that is used to ensure safety, reliability and fault tolerance properties. The paper analyzes the computation and communication overhead of adding HMAC and the impact on the performance of the time-triggered network. Experimental validation and performance evaluation results using a TTEthernet network are also presented.","PeriodicalId":205922,"journal":{"name":"2014 7th International Symposium on Resilient Control Systems (ISRCS)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116430392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yan Zhang, D. Subbaram Naidu, Chenxiao Cai, Y. Zou
{"title":"Nonlinear Model Predictive Control for regulation of a class of Nonlinear Singularly Perturbed discrete-time systems","authors":"Yan Zhang, D. Subbaram Naidu, Chenxiao Cai, Y. Zou","doi":"10.1109/ISRCS.2014.6900104","DOIUrl":"https://doi.org/10.1109/ISRCS.2014.6900104","url":null,"abstract":"In this paper, a class of discrete-time nonlinear systems having two-time-scale property is investigated. Using the theory of singular perturbations and time scales, the nonlinear system is decoupled into reduced slow and fast (boundary layer) subsystems. Then, a Nonlinear Model Predictive Control (NMPC) method is developed using the state-dependent Riccati equation for the slow and fast subsystems. It is proved that the original, closed-loop system with a composite control composed of slow and fast MPC subcontrollers, is locally asymptotically stable. Finally, an example is given to show the effectiveness of the developed method.","PeriodicalId":205922,"journal":{"name":"2014 7th International Symposium on Resilient Control Systems (ISRCS)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129233403","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Lanier, Sacha Duff, Jesse Flint, N. Nguyen, Stephen Young, Bonnie Kudrick
{"title":"Aptitude testing for selection, specialization, and training, of airport security X-ray imaging operators (X-APT)","authors":"R. Lanier, Sacha Duff, Jesse Flint, N. Nguyen, Stephen Young, Bonnie Kudrick","doi":"10.1109/ISRCS.2014.6900089","DOIUrl":"https://doi.org/10.1109/ISRCS.2014.6900089","url":null,"abstract":"X-ray image analysis and interpretation of carry-on items at airports is a primary responsibility for security personnel. This task is one of the most difficult and critical in ensuring the safety of commercial air travel for the public. There are several factors that contribute to the difficulty. X-ray imaging aptitude testing (X-APT) is focused on the individual aptitudes that are influential in acquiring, performing and retaining the perceptual and cognitive skills that are associated with the airport check-point X-ray threat detection. X-APT is a computer based battery of assessment tests derived from validated psychometric assessment tools. The battery is presented on a self-contained portable Tablet, with interactive graphics to increase user engagement. A pilot study of the X-APT prototype was conducted with current Transportation Security Administration X-ray imaging operators to refine and validate the system design. A full scale field evaluation is being conducted at several major airports. The evaluation compares X-APT performance aptitude based predictions with archived image analysis performance results. X-APT provides a valid tool for selection and classification of security personnel, and has the potential to enable self-paced training and skills improvement.","PeriodicalId":205922,"journal":{"name":"2014 7th International Symposium on Resilient Control Systems (ISRCS)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125259174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A framework for resilient remote monitoring","authors":"M. Atighetchi, A. Adler","doi":"10.1109/ISRCS.2014.6900090","DOIUrl":"https://doi.org/10.1109/ISRCS.2014.6900090","url":null,"abstract":"Today's activities in cyber space are more connected than ever before, driven by the ability to dynamically interact and share information with a changing set of partners over a wide variety of networks. To support dynamic sharing, computer systems and network are stood up on a continuous basis to support changing mission critical functionality. However, configuration of these systems remains a manual activity, with misconfigurations staying undetected for extended periods, unneeded systems remaining in place long after they are needed, and systems not getting updated to include the latest protections against vulnerabilities. This environment provides a rich environment for targeted cyber attacks that remain undetected for weeks to months and pose a serious national security threat. To counter this threat, technologies have started to emerge to provide continuous monitoring across any network-attached device for the purpose of increasing resiliency by virtue of identifying and then mitigating targeted attacks. For these technologies to be effective, it is of utmost importance to avoid any inadvertent increase in the attack surface of the monitored system. This paper describes the security architecture of Gestalt, a next-generation cyber information management platform that aims to increase resiliency by providing ready and secure access to granular cyber event data available across a network. Gestalt's federated monitoring architecture is based on the principles of strong isolation, least-privilege policies, defense-in-depth, crypto-strong authentication and encryption, and self-regeneration. Remote monitoring functionality is achieved through an orchestrated workflow across a distributed set of components, linked via a specialized secure communication protocol, that together enable unified access to cyber observables in a secure and resilient way.","PeriodicalId":205922,"journal":{"name":"2014 7th International Symposium on Resilient Control Systems (ISRCS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129801180","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Zane R. Franklin, C. Patterson, L. Lerner, R.J. Prado
{"title":"Isolating trust in an industrial control system-on-chip architecture","authors":"Zane R. Franklin, C. Patterson, L. Lerner, R.J. Prado","doi":"10.1109/ISRCS.2014.6900096","DOIUrl":"https://doi.org/10.1109/ISRCS.2014.6900096","url":null,"abstract":"A distributed industrial control system (ICS) also distributes trust across many software and hardware components. There is a need for some malware countermeasures to be independent of application, supervisory or driver software, which can introduce vulnerabilities. We describe the Trustworthy Autonomic Interface Guardian Architecture (TAIGA) that provides an on-chip, digital, security version of classic mechanical interlocks. In order to enhance trust in critical embedded processes, TAIGA redistributes responsibilities and authorities between a Programmable Logic Controller (PLC) processor and a hardware-implemented interface controller, simplifying PLC software without significantly degrading performance while separating trusted components from updatable software. The interface controller is synthesized from C code, formally analyzed, and permits runtime checked, authenticated updates to certain system parameters but not code. TAIGA's main focus is ensuring process stability even if this requires overriding commands from the processor or supervisory nodes. The TAIGA architecture is mapped to a commercial, configurable system-on-chip platform.","PeriodicalId":205922,"journal":{"name":"2014 7th International Symposium on Resilient Control Systems (ISRCS)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133812514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Bogdan Niemoczynski, S. Biswas, J. Kollmer, F. Ferrese
{"title":"Hovering synchronization of a fleet of quadcopters","authors":"Bogdan Niemoczynski, S. Biswas, J. Kollmer, F. Ferrese","doi":"10.1109/ISRCS.2014.6900102","DOIUrl":"https://doi.org/10.1109/ISRCS.2014.6900102","url":null,"abstract":"Multi-agent concepts are applied to a fleet of quadcopters for a synchronized hovering flight. Each quadcopter system is represented by a simple dynamic model which is linearized with respect to a hovering state. A two stage controller is proposed consisting of a local feedback loop for stabilization of individual platforms, and a global system-level feedback loop for synchronization. It is shown that with appropriate feedback, the fleet maintains stability of hovering formation. It is also shown that the controller maintains collective stability of the fleet in the event of failure of individual quadcopters. Simulation results are presented showing synchronized hovering in the horizontal and vertical planes.","PeriodicalId":205922,"journal":{"name":"2014 7th International Symposium on Resilient Control Systems (ISRCS)","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115968455","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Qiangguo Ren, Li Bai, S. Biswas, F. Ferrese, Q. Dong
{"title":"A BDI multi-agent approach for power restoration","authors":"Qiangguo Ren, Li Bai, S. Biswas, F. Ferrese, Q. Dong","doi":"10.1109/ISRCS.2014.6900105","DOIUrl":"https://doi.org/10.1109/ISRCS.2014.6900105","url":null,"abstract":"The objective of this paper is to design and develop a Belief-Desire-Intention (BDI) agent-based approach for power system restoration. We describe a multiple bus electrical power system (multi-bus power system) as a market environment that consists of BDI bus agents representing two different characters, consumer and producer. These bus agents are able to balance the power system between power generation and load consumption while consumers explore the market and trade the power resource with producers. In addition, the power system will be naturally and efficiently split into power branches by the bus agents. When a fault occurs in the system, the bus agents can maximize the capacity of the served loads or minimize the loss of power loads (when load shedding may be the only option) in a timely manner. The proposed BDI multi-agent approach can be applied to any size or structure of the multi-bus power systems. It is shown from our simulation and results comparison that the proposed approach becomes more effective and efficient when the scale of the multi-bus power system expands.","PeriodicalId":205922,"journal":{"name":"2014 7th International Symposium on Resilient Control Systems (ISRCS)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132628003","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}