1. State Key Laboratory of Industrial Control Technology, Zhejiang University, Hangzhou 310027, China; 2. Engineering at Electrical and Computer Engineering Department, University of Toronto M4Y1M7, Canada
Abstract:For those industrial control systems (ICS) whose field data need to be encrypted, a model, based on stability criterion is designed to assess the feasibility of the encrypted transmition mechanism. Combined with D-subdivision solution to transcentdental equation, a method to solve the feasible region of the length of encrypted data quantitatively is proposed. Integral absolute error (IAE) is improved to introduce the truncated IAE (TIAE)-based index, which is designed for evaluating the real-time performance influenced by the length in the feasible region. In terms of the relationship between execute time of encryption algorithm and length measured on embedded platform, two symmetric encryption algorithms for the control system of separately excited DC motor are evaluated, the accuracy of solution to the feasible region is verified, and the change law between real-time performance and length is obtained.
1 Knowles W, Prince D, Hutchison D, Disso J F P, Jones K. A survey of cyber security management in industrial control systems. International Journal of Critical Infrastructure Protection, 2015, 9:52-80 2 ICS-CERT. ICS-CERT Monitor[Online], available:https://ics-cert.us-cert.gov/monitors/ICS-MM201512, May 3, 2016. 3 Pang Z H, Liu G P, Zhou D H, Hou F Y, Sun D H. Two-channel false data injection attacks against output tracking control of networked systems. IEEE Transactions on Industrial Electronics, 2016, 63(5):3242-3251 4 Tang B X, Alvergue L D, Gu G X. Secure networked control systems against replay attacks without injecting authentication noise. In:Proceedings of the 2015 American Control Conference (ACC). Chicago, USA:IEEE, 2015. 6028-6033 5 Zijlstra P. Cryptography for a Networked Control System using Asynchronous Event-Triggered Control[Master dissertation], Delft University of Technology, Netherlands, 2016. 6 Zhang L Y, Xie L, Li W Z, Wang Z L. Security solutions for networked control systems based on des algorithm and improved grey prediction model. International Journal of Computer Network and Information Security (IJCNIS), 2013, 6(1):78-85 7 Wei M K, Wang W Y. Safety can be dangerous:secure communications impair smart grid stability under emergencies. In:Proceedings of the 2015 IEEE Global Communications Conference (GLOBECOM). San Diego, USA:IEEE, 2015. 1-6 8 Sipahi R, Niculescu S I, Abdallah C T, Michiels W, Gu K Q. Stability and stabilization of systems with time delay. IEEE Control Systems, 2011, 31(1):38-65 9 Sipahi R, Olgac N. A unique methodology for the stability robustness of multiple time delay systems. Systems & Control Letters, 2006, 55(10):819-825 10 Olgac N, Sipahi R. An exact method for the stability analysis of time-delayed linear time-invariant (LTI) systems. IEEE Transactions on Automatic Control, 2002, 47(5):793-797 11 Harris T J. Assessment of control loop performance. The Canadian Journal of Chemical Engineering, 1989, 67(5):856-861 12 Eriksson P G, Isaksson A J. Some aspects of control loop performance monitoring. In:Proceedings of the 3rd IEEE Conference on Control Applications. Scotland, UK:IEEE, 1994. 1029-1034 13 Gupta R A, Chow M Y. Performance assessment and compensation for secure networked control systems. In:Proceedings of the 34th Annual Conference of IEEE Industrial Electronics. Orlando, USA:IEEE, 2008. 2929-2934 14 Zeng W T, Chow M Y. Optimal tradeoff between performance and security in networked control systems based on coevolutionary algorithms. IEEE Transactions on Industrial Electronics, 2012, 59(7):3016-3025 15 Yu Z P, Wang J D, Huang B, Bi Z F. Performance assessment of PID control loops subject to setpoint changes. Journal of Process Control, 2011, 21(8):1164-1171 16 Smith R S. Covert misappropriation of networked control systems:presenting a feedback structure. IEEE Control Systems, 2015, 35(1):82-92