Security-aware Routing and Scheduling for Control Applications on Ethernet TSN Networks

Author:

Mahfouzi Rouhollah1,Aminifar Amir2,Samii Soheil3,Eles Petru1,Peng Zebo1

Affiliation:

1. Embedded Systems Laboratory, Linköping University, Sweden

2. Embedded Systems Laboratory, École Polytechnique Fédérale de Lausanne (EPFL), Switzerland

3. General Motors R8D, MI, USA and Embedded Systems Laboratory, Linköping University, Sweden

Abstract

Today, it is common knowledge in the cyber-physical systems domain that the tight interaction between the cyber and physical elements provides the possibility of substantially improving the performance of these systems that is otherwise impossible. On the downside, however, this tight interaction with cyber elements makes it easier for an adversary to compromise the safety of the system. This becomes particularly important, since such systems typically are composed of several critical physical components, e.g., adaptive cruise control or engine control that allow deep intervention in the driving of a vehicle. As a result, it is important to ensure not only the reliability of such systems, e.g., in terms of schedulability and stability of control plants, but also resilience to adversarial attacks. In this article, we propose a security-aware methodology for routing and scheduling for control applications in Ethernet networks. The goal is to maximize the resilience of control applications within these networked control systems to malicious interference while guaranteeing the stability of all control plants, despite the stringent resource constraints in such cyber-physical systems. Our experimental evaluations demonstrate that careful optimization of available resources can significantly improve the resilience of these networked control systems to attacks.

Publisher

Association for Computing Machinery (ACM)

Subject

Electrical and Electronic Engineering,Computer Graphics and Computer-Aided Design,Computer Science Applications

Reference52 articles.

1. Jfair: a scheduling algorithm to stabilize control applications

2. Optimization of Message Encryption for Real-Time Applications in Embedded Systems

3. Control-Quality-Driven Design of Embedded Control Systems with Stability Guarantees

4. K. J. Åström and B. Wittenmark. 1997. Computer-Controlled Systems (3rd ed.). Prentice Hall. K. J. Åström and B. Wittenmark. 1997. Computer-Controlled Systems (3rd ed.). Prentice Hall.

Cited by 17 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. Immunity-Empowered Collaboration Security Protection for Mega Smart Cities;Electronics;2024-05-21

2. Real-Time Scheduling for 802.1Qbv Time-Sensitive Networking (TSN): A Systematic Review and Experimental Study;2024 IEEE 30th Real-Time and Embedded Technology and Applications Symposium (RTAS);2024-05-13

3. A Systematic Review on Security Attacks and Countermeasures in Automotive Ethernet;ACM Computing Surveys;2024-01-22

4. Scheduling Threats and Their Defenses in Time-Sensitive Networks;GLOBECOM 2022 - 2022 IEEE Global Communications Conference;2022-12-04

5. Dependability‐aware routing and scheduling for Time‐Sensitive Networking;IET Cyber-Physical Systems: Theory & Applications;2022-03-15

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3