A journal of IEEE and CAA , publishes high-quality papers in English on original theoretical/experimental research and development in all areas of automation

【Featured Article】New control architecture defends complex interconnected systems against cyberattacks

  • Date:
  • 2021-02-04
  • Visited:
  • 10
  • Share:

Distributed systems are becoming more and more essential in everyday life. From power plants to autonomous vehicles, modular, interconnected systems, colloquially referred to as Cyber-Physical Systems (CPS), provide crucial services and capabilities while being technologically cost effective. Researchers have developed a novel control architecture that defends complex, interconnected systems previously vulnerable to cyberattacks.

Paper Information

G. Franzè, D. Famularo, W. Lucia, and F. Tedesco, "A Resilient Control Strategy for Cyber-Physical Systems Subject to Denial of Service Attacks: A Leader-Follower Set-Theoretic Approach," IEEE/CAA J. Autom. Sinica, vol. 7, no. 5, pp. 1204-1214, Sept. 2020.

Fulltext:

http://www.ieee-jas.net/en/article/doi/10.1109/JAS.2020.1003189

While well-suited for many applications, these architectures are particularly vulnerable to cyberattacks. These systems typically operate via an open communication structure, allowing the individual components to rapidly communicate with each other in order to maintain stability and precise control. Due to the nature of this network topology and the frequent connections necessary for optimal operation, CPS are particularly vulnerable to denial of service (DoS) attacks. DoS attacks can infect a portion of a CPS and through the open communication structure subsequently cascade through the entire system, degrading overall performance and even causing total failure.

Through clever implementation of a set theory-based, novel control paradigm, researchers from Italy and Canada have found a way to mitigate these particularly damaging cyberattacks by implementing a Leader-Follower approach. This approach uses one portion of the network to manage communications to the rest of the network. By assigning different roles to different portions of a CPS, the team was able to design an algorithm that can detect when and where a DoS attack occurs in the network. Upon detection, the algorithm is then able to cut off the infected portion of the network to prevent large-scale degradation while also dynamically adapting to the now-modified network structure. The algorithm can even assign new roles to different portions of the network in response to infection, increasing the robustness of the system against targeted DoS attacks.

“Organizing the distributed controllers in a Leader-Follower paradigm allows us to reduce the data exchange and provide the entire system with a modular capability so that it is possible to disconnect the attacked sub-subsystems without affecting the global operations” said Dr. Francesco Tedesco of the University of Calabria, corresponding author of the study. “Therefore, the success chance of the adversary attack can be significantly mitigated.” 

Tedesco goes on to say that the algorithm is not only secure; it is computationally efficient. “The required computational resources -- CPUs power, memory resources and bandwidth requirements -- are modest which clearly leads to a low economic impact.”

As for what’s next, the team is working to detect and apply more specific actions to counter cyberattacks based on predictive ideas, decreasing response time and further dampening the undesirable cascading effect of cyberattacks against interconnected systems.

IEEE/CAA Journal of Automatica Sinica

  • JCR Impact Factor 2019: 5.129
    Rank:Top 17% (11/63), Category of Automation & Control Systems
    Quantile: The 1st (SCI Q1)
    CiteScore 2019 : 8.3
    Rank: Top 9% (Category of Computer Science: Information System) , Top 11% (Category of Control and Systems Engineering), Top 12% (Category of Artificial Intelligence)
    Quantile: The 1st (Q1)