Architecture to Secure Electrical Control System in Cyber-Physical System ()
1. Introduction
In the past, cyber-attacks have not been introduced to our world. The malfunction of the control system has only been treated as a mechanical device failure. Customers’ safety is rarely threatened by hackers via remote access cyber channels. Nowadays, electronic control systems are vulnerable to different kinds of attacks. Automobiles, for instance, can be manipulated by hackers through a variety of attack vectors [1]-[4]. In this paper, we would like to find the right operator when malicious ones are trying to take it over.
Previously, control systems such as automobiles, robots, and so on were handled only by onsite human operators. Gradually, control privileges have been granted to industrial autonomic control systems and, then, be granted to remote access cyber systems through network communication channels. This paradigm shift offers incredible productivity and much more convenience. But a security concern has also been introduced: it is possible that autonomic control systems have been taken over by the wrong hand: the human operator can act maliciously, the autonomic control system can be infected, and the remote access cyber system can be compromised by hackers. The recent growth of misbehavior activities covers all possible aspects of Cyber Physical Systems (CPS) [1]-[4]. This paper’s major motivation is that since adversaries could potentially launch attacks from every channel, we should mitigate the risks by identifying the malicious controllers and then preventing their attacks.
This paper intends to propose a theoretical framework that protects control systems against malicious operations launched by attackers, ranging from human operators to automation control systems to remote access cyber control systems. This paper, specifically, focuses on a system with more than one controller. Each of them can independently operate the control system. The main questions we want to address are 1) how to detect the malicious CPS controllers; 2) how to protect the control system after the malicious CPS controller is identified.
This paper cannot totally solve the problems above. But, to partially answer these questions, the new ideas are to 1) Propose the Physical, Human and Cyber Triad; and 2) Establish a quantitative framework that aims to develop a set of metrics which are used to assess and analyze the security condition of each controller instance. The driverless vehicle is used as a case study to verify this idea.
This paper can neither eliminate any attacks nor develop any real-time systems. Its goal is to lightly mitigate risks resulting from the aforementioned misbehaviors by proposing a framework.
2. Related Works
From the perspective of human operators, various guides, manuals or frameworks are published to regulate operations impacting safety, reliability and security [1] [5] [6]. As an example of an automation control system, the Supervisor Control and Data Acquisition (SCADA) control system was analyzed in areas of malware that could compromise critical infrastructure systems [7].
To study the problem of human-in-the-loop feedback control systems, modeling human behavior and incorporating the model into the formal feedback control system are briefly addressed [8]. A cyber-physical-social based security architecture (namely, IPM) studied three critical security perspectives: information, physical, and management [9]. Physical security is addressed by artificial immunity, and management security is achieved through social strategies. But, to the best of my knowledge, less attention is paid to studying critical topics: 1) effectively preventing malicious activities in CPS over the control system and 2) withdrawing the access right from misbehavior controllers have not been carefully studied.
To evaluate malicious activities and to prevent cyber-attacks, the reputation of hosts has been widely studied, which can detect, filter and block the misbehavior activities such as spam, unauthorized access control, etc. [10].
3. Theoretical Background
3.1. Group Key Scheme
In order to grant/withdraw the access right over the control system, we will leverage the Group Key Scheme [11], based on which the new CPS controller can join and the malicious CPS controller can be forced to leave. In this paper, each controller’s activities will be viewed/audited by other peer controllers in real time.
The group key scheme we utilized includes two components: 1) efficient and reliable group key agreement; 2) virtual synchrony view. The former ensures that only the present group members contain the current group key. Malicious controllers will be expelled based on their misbehavior. The group key is a symmetric key shared among all current group members in such a way that the control commands or measured statuses will be encrypted by the group key during their transmission over control systems. A group key scheme should satisfy two privacies: 1) Forward secrecy: previous group members who know contiguous subsets of old group keys must not be able to discover subsequent group keys after they leave the group. 2) Backward secrecy: current group members who know a contiguous subset of current group keys must not be able to discover preceding group keys. The virtual synchrony view means that, if processes
and
install the same new view
in the same previous view
, then any message received by
in
is also received by
in
. So,
(1)
Authentication and integrity will be provided for group keys to prevent attacks, e.g., Man-In-The-Middle attacks, etc. But we will not explain the details here.
3.2. Supervisory Control Theory
Our research tries to isolate the malicious CPS controllers from the control system by employing the supervisory control theory in which discrete state spaces and event-driven dynamics are widely used. From the viewpoint of discrete event systems, the control system under protection can be modelled as a plant to which the supervisory controllers send control actions. The control system is treated as the feedback control of dynamic systems, the specification of which is represented as finite-state automata over the set of discrete events. Any actions from the controllers will force the control system to make discrete changes and, consequently, generate a sequence of discrete events that can formulate transition-based, event-driven models. Research focusing on the models can analyze the security, safety, reliability, etc. [12]. Due to its capability to quickly detect and isolate malfunctions, the fault detection and diagnosis methodology synthesizing to discrete state event-driven dynamics is further studied to model the control system’s activities and to further deduce controllers’ misbehavior [13]. However, it is still a concern that they are sensitive to noises, which may easily lead to false alarms during normal operations.
3.3. Rejection for Cyber Misbehaviors
The reputation of a host [10] has been treated as a vital metric which measures the security condition of a host. Based on the reputation value, some systems construct a list of rejections. The purpose is to block/filter the inbound or outbound traffic sent from/forwarded to hosts in the list.
4. Overview of the Proposed System
4.1. Problem Descriptions
A control system, for example, a driverless vehicle, could be driven by a few controllers. At each time point
, the vehicle received a few control commands, one of which was issued by the controller in charge. Our decision is based on the current status of the vehicle (e.g. speed, engine brake, gas, light, etc.), context around the vehicle (e.g. other vehicles at the same lane or different lanes, road condition, etc.), and the mission of this trip. Then, we need to figure out how to evaluate which control command is safe. If the control command in charge is malicious, how can we find the right from others? To be more generic, let us assume the controller may be physical, cyber or human operators, namely,
, where
. Let
denote the control system, say, driverless vehicle which is fed with a number of control commands from different controllers at every time point. Therefore, at a sequence of time points,
, there are a series of control commands
. At each time point, the mobile control system could be at a status,
where
and
and
are integers. Note that
represents a block of key parameters which are measured from object,
. The problem we would like to address is that, at time point
, we need to select a control command
in a sense that
will lead driverless vehicle from status
to
in which the condition
is safe. The challenge is (1) how to validate
in case of the context set
and the mission
where
is one element of context, (2) how to drop the malicious commands and (3) how to punish the corresponding unsafe controller.
4.2. Physical-Human-Cyber Triad
As depicted in Figure 1, our paper proposes a new physical, human and cyber triad system, which is comprised of three components (sketched as circles), each denoting one type of controller.
The system under protection is represented by the “control system” blocks (sketched as rectangles), which abstract a general model with such instances as modern vehicles, unmanned robots, etc. The solid, directional links connecting controller elements and the control system blocks denote the capability of the control privilege, and the dashed links represent functions of collecting statuses from control systems.
A controller operates control systems through three channels: the human operators drive the handle, e.g., function lever, the automation control systems execute embedded operational instructions in firmware, and the remote access cyber systems forward control commands that are encapsulated in packets through cyber communication channels.
Figure 1. Physical, Human and Cyber (PHC) Triad.
This paper assumes that any controller in a physical, human and cyber triad could act maliciously since, even if not hostile at the beginning, it may potentially be compromised by attackers in future. The paper will use this conceptual architecture to offer a quantitative, abstract model to assess the compromised controller based on their misbehavior activities and to further provide a mechanism which can withdraw the control privileges after the detection of corresponding attacks.
4.3. Architecture
This paper seeks to mitigate the threat introduced by the following problems for each physical, human and cyber controller: 1) Define a variety of metrics to model the misbehaviors over the control systems; 2) Construct the quantitative framework to evaluate the security conditions of the control system based on the captured operational commands and the corresponding results; and 3) Define reputation index thresholds in the quantitative framework and withdraw adversary controller’s control privilege when its reputation index is beyond the threshold.
Note that this paper only proposes the framework rather than studying the details due to the limited space.
So, the following work will not be considered in this paper. But they can be accomplished in our future work:
1) Fulfill numerous data collection, data separation, and data analyses over not only control commands instructed by all physical, human and cyber controllers but also the status result data measured over the control system for both before and after the control commands are executed;
2) Construct a generic model to measure a set of essential metrics which can not only evaluate the security condition of control systems but also assess other critical parameters such as reliability, safety and so on;
3) Design the quantitative framework indicating the security level for each controller, namely, the autonomic controller, human operators, and remote access cyber controllers. Security conditions will be assessed by discrete-state event-driven fault-diagnosis theories [14] [15], by human operation manuals [1] [5] [6], by finite-state machines, and by reputation systems [10], and;
4) Withdraw the malicious controllers’ control privileges via group key schemes [11] after attacks are detected.
5. Our System
We outline our system here, but the detailed implementation will be our future task. As depicted in Figure 2, our architecture includes four layers.
Figure 2. Architecture of our system.
In the control layer, control commands are issued by physical (autonomic control system), remote access cyber, and human operators.
In the quantitative layer, a set of metrics is established for each controller in the physical, human and cyber triad. Each controller’s metric indicator decides whether this controller instance is malicious or not. In the access control layer, the detected malicious controller instance will be expelled from the group key agreement in such a way that a new group key is generated, and the expelled group member cannot access the new group key. So, there is no chance for it to send its control commands to the control system.
In the system layer, the control system decrypts the ciphertext command by using the new group key and then executes the command. Malicious/illegal controller instances’ ciphertext cannot be correctly decrypted since they cannot hold the current group key. Just notice that the controller instance can access the control systems by utilizing wearable devices such as a master card/token.
Note that after executions, the monitored statuses of the control system will be used to analyze the behavior of each control command. If the result is unsafe/negative or even an alarm is triggered, the negative value will be reflected in the metric indicators of corresponding controllers. The loopback of the control system is critical for this paper as it demonstrates each controller’s behavior, which impacts its reputation index.
5.1. Subsystem
Capture Control Commands and Statuses:
We collect the control commands that are issued by physical, human, and cyber controllers, as well as a finite sequence of statuses of control systems. Those raw data will be de-noised, stored, classified, filtered and evaluated through a set of pre-processing operations or algorithms.
Autonomic control system (P): we first map a sequence of observable events
to a set of control actions
. Function
. Our intrusion detection system is defined as
(a fault-diagnosis function). The control loop
(where A: finite-state automation) is named as a potential attack if the action
is misbehavior and if the
is one of the fault states of the control system. Combining the active fault-diagnosis theory and the finite-state automation method, the intrusion detection
could abstract the control system as discrete-state event-driven dynamic and identify the misbehavior or attacks as an active fault event. If a fault even occurs, the corresponding action
will be traced back to its controller, whose reputation index, in turn, will be impacted.
Human Operator (H): wrong human operations can negatively impact the control systems, which are shown as different kinds of symptoms. We can collect a number of symptoms led by the misbehavior which will be treated as complementary to some well-known guides or user manuals [1] [5] [6]. They altogether can correct the mis-operation and stop adversaries.
Cyber remote control (C): we will analyze the malicious activities launched from remote access cyber controller through the method for data collection and measurement. Its result reflects the reputation index of each specific remote host, based on which the list of rejection can be constructed.
Misbehavior Abstraction, Profiling and Modeling:
While analyzing control commands, we aim to identify, profile, model and filter attacks based on a formal method via utilizing finite-state machine, namely
, which is listed below:
(2)
(3)
(4)
where
S is the state,
C is the control command sequence,
O is the output,
cn is each control command.
Record Misbehavior:
Regarding each control command ci on the list of rejection, the controller which sends out ci, will be impacted for its reputation index.
Access Control (group key scheme):
The group key will be rekeyed, which can guarantee both forward privacy and backward privacy. Thus, the expelled controller cannot get the subsequent group keys. The control system is assumed to always hold the current group key and therefore can decrypt the ciphertext. The other advantage is that peer and legal controllers can audit others’ activities in order to prevent the misbehavior via group key.
5.2. Case Study
Let us take a driverless car as an example: at a time point
, a few controllers,
,
and
represent the human driver, the physical automation control device in the vehicle and the remote access cyber control program, respectively. They issue control command
. In our paper, since each of
,
and
could be malicious, we will choose the right control command
for driverless vehicle
based on the current context set
and the vehicle statuses,
. The context set
could include the road traffic, the speed of other vehicles in front/behind the vehicle or at neighbor lanes, the pedestrian on the road, the condition of the road, parking space, gas level, map service, and so on. In a word, the context, together with the current status of the vehicle as well as the mission of the trip, can decide whether the vehicle is safe or not. Our future work includes both simulation and real-world experiments.
6. Conclusion
In this paper, the proposed solution can decide which control command is malicious and how to select the right one from the others. We also record the malicious commands/misbehavior, which will impact the controller’s reputation index. The scheme could lightly mitigate the attacks from a variety of control vectors for CPS. Furthermore, this paper not only provides a framework to identify the misbehavior of the adversary controllers in the Physical, Human and Cyber triad, but also briefly explains how to construct a dataset. The dataset contains the misbehavior based on the specific status of the driverless vehicle and the corresponding context set. The goal of this paper is the development of a framework for protecting control systems against malicious operations. We cannot completely eliminate the attack but rather mitigate the risk resulting from misbehaviors.