Loading...
Please wait, while we are loading the content...
Similar Documents
Poster : Toward a Secure Controller Framework for Flight in Physical , Human and Cyber Triad
| Content Provider | Semantic Scholar |
|---|---|
| Author | Li, Depeng |
| Copyright Year | 2015 |
| Abstract | At 2015, after locking the plane’s pilot out of the cockpit, the co-pilot A. Lubitz flew Germanwings Flight 4U 9525 into a mountain committing murder-suicide [1]. At 2014, Malaysia Airlines flight MH370, a more mysterious incident, disappeared carrying more than 200 passengers and crew members. Explanations to sudden disappearance range from mis-operations of suicidal pilots to cyber-attacks [3]. In fact, electronic control systems maybe vulnerable to malicious controllers, inside or outside: military robots may rebel their human masters [2] and hackers can manipulate modern automobiles or unmanned military aerial drones from a variety of attack surfaces [4]. The problem we endeavor to solve is that, when malicious controllers are trying to take it over, can we present a secure control framework to protect the control system e.g. aircraft with higher level of security? Motivation: Traditionally, control systems such as aircrafts are handled by onsite human operators. Gradually, electronic automation control systems can partially participate in the control and then so does remote access control systems which forward control commands through cyber communication channels. This paradigm shift offers customers more options, incredible productivities and significant convenience but meanwhile the security concerns remain: it is possible that the control system falls to the wrong hand: the human operator can act maliciously, the automation control system can be infected or may be born with vulnerabilities, and the remote access control system through cyber channels can be compromised. A recent evident growth in misbehavior activities covering all possible aspects of Physical, Human and Cyber (Phc) [2], [4], serves a major motivation for this paper: adversaries could potentially launch attacks from all channels and we should mitigate the risks by well-designed access control mechanism as well as identifying and preventing the malicious controllers. Contributions: To answer these questions, our new ideas are to (a) Propose the Physical, Human and Cyber Triad (b) Generate an access control mechanism that can grant a controller access right to a control action (c) Ensure that a control action cannot be executed without at least t out of n controllers’ approval via secret sharing scheme. (d) Establish a quantitative framework that aims to develop a set of metrics which are used to assess the evilness of each controller. Flight is treated as a case study to verify it. Related works: To evaluate the malicious activities and to prevent the cyber-attacks, the reputation of hosts has been widely studied which can detect, filter and block the misbehavior activities such as spams, unauthorized access control, etc. [7]. A cyber-physical-social based security architecture (namely, IPM) studied three critical security perspectives: information, physical, and management [6]. The cyber–physical system security for aeronautical communications is analyzed [8]. But, as the best of our knowledge, less attention is paid to study critical topics, (1) Phc triad over flight control system, (2) specific access control mechanism for flight, and (3) identify misbehavior controllers as well as withdraw their access rights. |
| File Format | PDF HTM / HTML |
| Alternate Webpage(s) | http://www.ieee-security.org/TC/SP2015/posters/paper_69.pdf |
| Alternate Webpage(s) | https://www.ieee-security.org/TC/SP2015/posters/paper_69.pdf |
| Language | English |
| Access Restriction | Open |
| Content Type | Text |
| Resource Type | Poster |