Implementation of Sequential Detection of Replay Attacks for a Cloud Native Controller

Sinchan Biswas, Fatemeh Akbarian, Maria Kihl

Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceedingpeer-review

Abstract

This paper focuses on the investigation of a sequential detection policy for combating the effect of the replay attack on a cloud-native controller. In reply attacks, an external attacker records true signals for some time duration and replays them later. The effect of such an attack is mitigated by adding random signals to the optimal control signal before the actuation process, which is known as the watermarking policy. We study the effectiveness of this joint scheme of sequential detection with watermarking in a cloud-native controller with varying levels of delay introduced in the communication network between the cloud server and the physical plant. Our study shows that the scheme performs well for the cloud-native controller and that the scheme is able to mitigate the effect of the replay attack when the control signals arrive in a timely fashion, i.e., without significant delay from the controller to the physical plant.
Original languageEnglish
Title of host publicationThe 31st International Conference on Software, Telecommunications and Computer Networks (SoftCOM 2023)
PublisherIEEE - Institute of Electrical and Electronics Engineers Inc.
ISBN (Print)979-8-3503-0107-6
DOIs
Publication statusPublished - 2023 Oct 10
Event31st International Conference on Software, Telecommunications and Computer Networks, SoftCOM 2023 - Split, Croatia
Duration: 2023 Sept 212023 Sept 23

Conference

Conference31st International Conference on Software, Telecommunications and Computer Networks, SoftCOM 2023
Country/TerritoryCroatia
CitySplit
Period2023/09/212023/09/23

Subject classification (UKÄ)

  • Control Engineering

Fingerprint

Dive into the research topics of 'Implementation of Sequential Detection of Replay Attacks for a Cloud Native Controller'. Together they form a unique fingerprint.

Cite this