当前位置: X-MOL 学术IEEE Control Syst. › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
Encrypted Control for Networked Systems: An Illustrative Introduction and Current Challenges
IEEE Control Systems ( IF 3.9 ) Pub Date : 2021-10-19 , DOI: 10.1109/mcs.2021.3062956
Moritz Schulze Darup , Andreea B. Alexandru , Daniel E. Quevedo , George J. Pappas

Cloud computing and distributed computing are becoming ubiquitous in many modern control areas such as smart grids, building automation, robot swarms, and intelligent transportation systems. Compared to “isolated” control systems, the main advantages of cloud-based and distributed control systems are resource pooling and outsourcing, rapid scalability, and high performance. However, these capabilities do not come without risks. In fact, the involved communication and processing of sensitive data via public networks and on third-party platforms promote (among other cyberthreats) eavesdropping and the manipulation of data (see “Summary”). That these threats are relevant to real-world applications is apparent from an increasing number of cyberattacks explicitly addressing industrial control systems [68]. Prominent examples are the malwares Stuxnet, Duqu, Industroyer, and Triton [14] as well as inference attacks arising from smart meters used as surveillance devices [30, 46].

中文翻译:


网络系统的加密控制:说明性介绍和当前挑战



云计算和分布式计算在智能电网、楼宇自动化、机器人群和智能交通系统等许多现代控制领域变得无处不在。与“孤立”的控制系统相比,基于云的分布式控制系统的主要优势是资源池化和外包、快速扩展和高性能。然而,这些功能并非没有风险。事实上,通过公共网络和第三方平台进行的敏感数据通信和处理会促进(以及其他网络威胁)窃听和数据操纵(参见“摘要”)。从越来越多明确针对工业控制系统的网络攻击中可以明显看出,这些威胁与现实世界的应用相关[68]。突出的例子是恶意软件 Stuxnet、Duqu、Industroyer 和 Triton [14] 以及用作监控设备的智能电表引起的推理攻击 [30, 46]。
更新日期:2021-10-19
down
wechat
bug