Font Size: a A A

Researches On Effective Defensive Strategies For Deception Attacks In The Cyber-Physical Systems

Posted on:2021-07-14Degree:MasterType:Thesis
Country:ChinaCandidate:X W RenFull Text:PDF
GTID:2518306557986659Subject:Cyberspace security
Abstract/Summary:PDF Full Text Request
The cyber-physical systems(CPSs)closely integrate the computing process and the physical process through 3C technologies(Communication technology,Computer technology and Control technology),and have broad application prospects in the fields of smart health,smart transportation,smart grid,smart home and public safety.Whether for the Industrial Internet of US in 2012 or for the Industry 4.0 of Germany in 2013,CPSs have all been regarded as the core ingredient of the 4th industrial revolution.In the literature,cyber attacks on the CPSs are investigated mainly from the perspective of network protocols or cybernetics.Up till now,lots of novel results have been obtained.However,most of them have their own limitations or weak application potentials.A new structure of the hash-based message authentication code(HMAC)algorithm is designed in this paper to withstand the common deception attacks in CPSs.By changing the number of times that the hash function is called at each time,a lightweight recursive hash algorithm is applied to calculate the stochastic sequence in order to resist the recent attacks on the HMAC that include chosen message attacks.Then feasibility of the stochastic HMAC(SHMAC)is proved/discussed in detail,and simulation results also show the randomness of the message authentication codes.Finally,the proposals of key management of SHMAC algorithm are put forward.To avoid the eavesdropping,falsifying and hijacking of information,the communication process between the sensors and the controllers in CPSs is carefully designed.Moreover,strategies are provided to withstand the possible replay attacks,deception attacks and denail-of-service attacks in CPSs.
Keywords/Search Tags:Cyber-Physical Systems, HMAC, Integrity Detection, SHMAC, Cyber Attacks
PDF Full Text Request
Related items