Security-aware routing and scheduling for control applications on ethernet TSN networks

Rouhollah Mahfouzi, Amir Aminifar, Soheil Samii, Petru Eles, Zebo Peng

Research output: Contribution to journalArticlepeer-review

Abstract

Today, it is common knowledge in the cyber-physical systems domain that the tight interaction between the cyber and physical elements provides the possibility of substantially improving the performance of these systems that is otherwise impossible. On the downside, however, this tight interaction with cyber elements makes it easier for an adversary to compromise the safety of the system. This becomes particularly important, since such systems typically are composed of several critical physical components, e.g., adaptive cruise control or engine control that allow deep intervention in the driving of a vehicle. As a result, it is important to ensure not only the reliability of such systems, e.g., in terms of schedulability and stability of control plants, but also resilience to adversarial attacks. In this article, we propose a security-aware methodology for routing and scheduling for control applications in Ethernet networks. The goal is to maximize the resilience of control applications within these networked control systems to malicious interference while guaranteeing the stability of all control plants, despite the stringent resource constraints in such cyber-physical systems. Our experimental evaluations demonstrate that careful optimization of available resources can significantly improve the resilience of these networked control systems to attacks.

Original languageEnglish
Article number1
JournalACM Transactions on Design Automation of Electronic Systems
Volume25
Issue number1
DOIs
Publication statusPublished - 2019 Dec
Externally publishedYes

Subject classification (UKÄ)

  • Control Engineering
  • Computer Science

Free keywords

  • Ethernet TSN
  • Joint routing and scheduling
  • Real-time control systems
  • Resilience optimization

Fingerprint

Dive into the research topics of 'Security-aware routing and scheduling for control applications on ethernet TSN networks'. Together they form a unique fingerprint.

Cite this