Low-complexity secure protocols to defend cyber-physical systems against network isolation attacks

Dong Hoon Shin, Jinkyu Koo, Lei Yang, Xiaojun Lin, Saurabh Bagchi, Junshan Zhang

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Scopus citations

Abstract

This paper studies the network isolation attack, a devastating type of attacks on cyber-physical systems. In this attack, an adversary compromises a set of nodes that enclose a region in order to isolate the region from the rest of the network. Assuming that the compromised nodes wish not to be detected, we propose a solution to defend against the network isolation attack. Our goal is to achieve the following security guarantee: either a legitimate node can successfully deliver a message to another legitimate node, or the network control center can identify a small set of suspect nodes, which are guaranteed to contain a compromised node. Toward achieving this goal, we develop two protocols: one is for secure delivery of messages among nodes and the other is for secure collection of messages from nodes at the network control center. We show that our proposed protocols are provably secure, i.e., attain the aforementioned security guarantee. Further, our protocols achieve this guarantee with overhead that is orders-of-magnitude smaller than existing baseline protocols. Our proposed protocols are thus scalable for large networks.

Original languageEnglish (US)
Title of host publication2013 IEEE Conference on Communications and Network Security, CNS 2013
PublisherIEEE Computer Society
Pages91-99
Number of pages9
ISBN (Print)9781479908950
DOIs
StatePublished - Jan 1 2013
Event1st IEEE International Conference on Communications and Network Security, CNS 2013 - Washington, DC, United States
Duration: Oct 14 2013Oct 16 2013

Publication series

Name2013 IEEE Conference on Communications and Network Security, CNS 2013

Other

Other1st IEEE International Conference on Communications and Network Security, CNS 2013
CountryUnited States
CityWashington, DC
Period10/14/1310/16/13

ASJC Scopus subject areas

  • Computer Networks and Communications

Fingerprint Dive into the research topics of 'Low-complexity secure protocols to defend cyber-physical systems against network isolation attacks'. Together they form a unique fingerprint.

  • Cite this

    Shin, D. H., Koo, J., Yang, L., Lin, X., Bagchi, S., & Zhang, J. (2013). Low-complexity secure protocols to defend cyber-physical systems against network isolation attacks. In 2013 IEEE Conference on Communications and Network Security, CNS 2013 (pp. 91-99). [6682696] (2013 IEEE Conference on Communications and Network Security, CNS 2013). IEEE Computer Society. https://doi.org/10.1109/CNS.2013.6682696