SlideShare a Scribd company logo
1 of 11
Download to read offline
December 18 Fri., 2015, 13:30-13:50, Regular Session: Networked Control Systems 2, Frb09.1 @ 1003
Cyber-‐‑‒Security  Enhancements  of  
Networked  Control  Systems  Using  
Homomorphic  Encryption
Kiminao Kogiso
University of Electro-Communications
Tokyo, Japan
Takahiro Fujita
Yokogawa Denshikiki Co., Ltd.
The 54 Conference on Decision and Control
Osaka International Convention Center, Osaka, Japan
December 15 to 18, 2015
Outline
2
Introduction  
Problem  Statement  
Controller  Encryption  
Simulation  &  Validation  
Conclusion
Introduction
3
Controller device is important, but exposed to threats of hacking and targeted attacks.
signals: modeling, stealing recipe, management policy and know-how
parameters: knowledges about system designs and operations
Attacks on networked control system
plantcontroller
ref. (recipe)
control signals
feedback signals
parameters
[1] Sandberg et al., 2015. [2] Sato et al., 2015. [3] Pang et al., 2011
Related works
aiming to conceal the signals
control-theoretical approach: detection[1], positive use of noises[2]
cryptography-based approach: encryption of communication links[3]
no studies considering encryption of the controller or its inside…
control
(cipher)
feedback
(cipher)
EncDec
Enc Dec
plantcontroller
ref.
ref.
(cipher)
Enc Dec
Introduction
4
Objective of this work
Realize a cryptography-based control law to conceal both the signals & parameters.
control
(cipher)
feedback
(cipher)
EncDec
Enc Dec
plantcontroller
ref.
ref.
(cipher)
Enc Dec
conventional:
control
(cipher)
feedback
(cipher)
Enc
Dec
plantencrypted
controller
ref.
ref.
(cipher)
Enc
parameters
(cipher)
proposed:
Concept of encrypted controller:
calculates an encrypted control directly from an encrypted feedback signal & an encrypted
reference using encrypted parameters,
is achieved by incorporating homomorphic encryption scheme into the control law.
Problem Statement
5
Encryption of linear controller
Consider a linear controller: f
Controller Encryption Problem:
Given an encryption scheme , for a control law realize an encrypted law .fE fE
Define an encrypted control law , given an encryption scheme , satisfyingfE E

x[k + 1]
u[k]
=

A B
C D

x[k]
y[k]
:= ⇠[k] := f( , ⇠[k])
: parameter matrix
: plant output
: control inputu
y
5
control
(cipher)
feedback
(cipher)
Enc
Dec
plant
parameters
(cipher)
Enc(y)
Enc(u) u
y
Enc( )
fE (Enc( ), Enc(⇠))
fE (Enc( ), Enc(⇠)) = Enc(f( , ⇠))
RSA encryption[4,5] (deterministic) & ElGamal encryption[6] (stochastic)
ElGamal encryption scheme[4]
key generation: public , and private (random)
encryption:
decryption:
Controller Encryption 1/3
6[4] Rivest, “A Method for Obtaining Digital Signatures and Public-Key Cryptosystem”, 1978. [5] Rivest, “On Data Banks and Privacy Homomorphisms”, 1978.
Homomorphic encryption schemes
RSA: Rivest-Shamir-Adelman
Dec(c1, c2) = c2 ⇥ c s
1 mod p
g, p, s 2 N(g, p) s
r 2 N:  randomEnc(m) = (gr
mod p, m ⇥ gsr
mod p)
= c1 = c2 m: integer in plaintext space
: integer in ciphertext spacec1, c2
Homomorphism
definition
Enc(m1 • m2) = Enc(m1) ⇤ Enc(m2)
in the case of ElGamal
·: multiplication ⇤ : modulo operation
plaintext  
space
ciphertext  
space
m1
m2
⇥
⇥
⇥
m2•m1
⇥
⇥
⇥
Enc(m1)
Enc(m2)
N N2
Enc
Enc
Enc
Controller Encryption 2/3
7
Idea for controller encryption
Divide the linear operation to apply the homomorphism.
f = f+
f⇥
f⇥
( , ⇠) =
⇥
1⇠1 2⇠2 · · · L⇠L
⇤
=:
←  executed  after  the  decryption
←  executed  in  the  controller  device
modification of the decryption process to update the decryption algorithm with “Dec+
”.
Dec+
Configuration using ElGamal encryption scheme
signals
(cipher)
feedback
(cipher)
Enc
Dec
plant
parameters
(cipher)
Enc( )
Enc( )
f+
f⇥
Enc(⇠)
x[k + 1]
u[k]
⇠
fE (Enc( ), Enc(⇠))
f+
( ) =
LX
l=1
l
with and sufficient large, rounding (quantization) error can be made small.a
encrypted
controller
u[k]
y[k]
Enc
Enc(KpM)
Enc(yM[k])
Enc(uM[k])
a 2
yM[k]
uM[k]
ba•e
plant
Dec+
n
Controller Encryption 3/3
8
a 2 N
b•e : round function
KpM = ba ⇥ Kpe
yM[k] = ba ⇥ y[k]e
uM[k] = KpMyM[k]
Kp
y[k]
u[k] = Kpy[k]
example: , then .Kp = 0.83, a = 1000 KpM = b1000 ⇥ 0.83e = 830
Remarks
Signals & parameters are real; Plaintext is integer.
need a map: multiplying by a natural number and rounding off to an integer, i.e.,
Simulation: Controller Encryption
9
(key length 25bit)
Things seen in controller
encrypted
controller
normal:
proposed:
u[k]
y[k]
controller
n = 67108913 g = 3
Enc( )
=
2
4
1 0.0063 0
0 0.3678 0.0063
10 99.90 3
3
5
=

Enc(x[k])
Enc(y[k])
Enc(⇠[k])
Enc( [k])
0 1 2 3 4 5
-3
-2
-1
0
1
0 1 2 3 4 5
-0.5
0
0.5
1
1.5
time [s] time [s]
control output
0 1 2 3 4 5
time [s]
0
1
2
3
4
× 107
0 1 2 3 4 5
time [s]
0
1
2
3
4
× 107
0 1 2 3 4 5
time [s]
0
1
2
3
4
× 107
0 1 2 3 4 5
time [s]
0
1
2
3
4
× 107
0 1 2 3 4 5
time [s]
0
1
2
3
4
× 107
0 1 2 3 4 5
time [s]
0
1
2
3
4
× 107
0 1 2 3 4 5
0
1
2
3
4
× 107
0 1 2 3 4 5
0
1
2
3
4
× 107
6 signals related to control
2 signals related to output
0 1 2 3 4 5
-0.5
0
0.5
1
1.5
0 1 2 3 4 5
-3
-2
-1
0
1
Enc( )2 =
2
4
14170023 24305287 4114472
24817983 26559389 33379406
29922594 31813162 24125985
3
5
Enc( )1 =
2
4
16354115 11333831 12428094
25939844 22437363 17650745
23018684 228286 8037052
3
5
Validation: Protection from Stealing
10
System identification (n4sid)
-150
-100
-50
0
50
10-2
100
102
-270
-225
-180
-135
-90
-45
0
frequency [rad/s]
gain[dB]phase[deg]
original closed loop system
without encryption
with encryption(RSA)
with encryption(ElGamal)
Conclusion
11
Introduction
Problem Statement
controller encryption problem
Encrypted Controller
homomorphism of specific encryption scheme
remarks in quantization error
Simulation & Validation
enable to conceal signals & parameters inside
the controller device in terms of cryptography.
enable to hide dynamics of the control system.
Future works
incorporate an attack detection method.
validate computation cost of encrypted controller.
-150
-100
-50
0
50
10-2
100
102
-270
-225
-180
-135
-90
-45
0
frequency [rad/s]
gain[dB]phase[deg]
original closed loop system
without encryption
with encryption(RSA)
with encryption(ElGamal)
0 1 2 3 4 5
time [s]
0
1
2
3
4
× 107
0 1 2 3 4 5
time [s]
0
1
2
3
4
× 107
0 1 2 3 4 5
time [s]
0
1
2
3
4
× 107
0 1 2 3 4 5
time [s]
0
1
2
3
4
× 107
0 1 2 3 4 5
time [s]
0
1
2
3
4
× 107
0 1 2 3 4 5
time [s]
0
1
2
3
4
× 107
0 1 2 3 4 5
0
1
2
3
4
× 107
0 1 2 3 4 5
0
1
2
3
4
× 107

More Related Content

Viewers also liked

Transition Models of Equilibrium Assessment in Bayesian Game
Transition Models of Equilibrium Assessment in Bayesian GameTransition Models of Equilibrium Assessment in Bayesian Game
Transition Models of Equilibrium Assessment in Bayesian GameKiminao Kogiso
 
Homomorphic Encryption
Homomorphic EncryptionHomomorphic Encryption
Homomorphic EncryptionGöktuğ Serez
 
Homomorphic encryption in_cloud
Homomorphic encryption in_cloudHomomorphic encryption in_cloud
Homomorphic encryption in_cloudShivam Singh
 
Homomorphic Encryption
Homomorphic EncryptionHomomorphic Encryption
Homomorphic EncryptionVipin Tejwani
 
Partial Homomorphic Encryption
Partial Homomorphic EncryptionPartial Homomorphic Encryption
Partial Homomorphic Encryptionsecurityxploded
 
Homomorphic encryption
Homomorphic encryptionHomomorphic encryption
Homomorphic encryptionNamit Sinha
 

Viewers also liked (6)

Transition Models of Equilibrium Assessment in Bayesian Game
Transition Models of Equilibrium Assessment in Bayesian GameTransition Models of Equilibrium Assessment in Bayesian Game
Transition Models of Equilibrium Assessment in Bayesian Game
 
Homomorphic Encryption
Homomorphic EncryptionHomomorphic Encryption
Homomorphic Encryption
 
Homomorphic encryption in_cloud
Homomorphic encryption in_cloudHomomorphic encryption in_cloud
Homomorphic encryption in_cloud
 
Homomorphic Encryption
Homomorphic EncryptionHomomorphic Encryption
Homomorphic Encryption
 
Partial Homomorphic Encryption
Partial Homomorphic EncryptionPartial Homomorphic Encryption
Partial Homomorphic Encryption
 
Homomorphic encryption
Homomorphic encryptionHomomorphic encryption
Homomorphic encryption
 

Similar to Cyber-Security Enhancements of Networked Control Systems Using Homomorphic Encryption

Data Security Using Elliptic Curve Cryptography
Data Security Using Elliptic Curve CryptographyData Security Using Elliptic Curve Cryptography
Data Security Using Elliptic Curve CryptographyIJCERT
 
Implementation of RSA Algorithm with Chinese Remainder Theorem for Modulus N ...
Implementation of RSA Algorithm with Chinese Remainder Theorem for Modulus N ...Implementation of RSA Algorithm with Chinese Remainder Theorem for Modulus N ...
Implementation of RSA Algorithm with Chinese Remainder Theorem for Modulus N ...CSCJournals
 
One to many (new scheme for symmetric cryptography)
One to many (new scheme for symmetric cryptography)One to many (new scheme for symmetric cryptography)
One to many (new scheme for symmetric cryptography)TELKOMNIKA JOURNAL
 
Cryptosystem An Implementation of RSA Using Verilog
Cryptosystem An Implementation of RSA Using VerilogCryptosystem An Implementation of RSA Using Verilog
Cryptosystem An Implementation of RSA Using Verilogijcncs
 
Lattice based Merkle for post-quantum epoch
Lattice based Merkle for post-quantum epochLattice based Merkle for post-quantum epoch
Lattice based Merkle for post-quantum epochDefCamp
 
CS8451 - Design and Analysis of Algorithms
CS8451 - Design and Analysis of AlgorithmsCS8451 - Design and Analysis of Algorithms
CS8451 - Design and Analysis of AlgorithmsKrishnan MuthuManickam
 
New Technique Using Multiple Symmetric keys for Multilevel Encryption
New Technique Using Multiple Symmetric keys for Multilevel EncryptionNew Technique Using Multiple Symmetric keys for Multilevel Encryption
New Technique Using Multiple Symmetric keys for Multilevel EncryptionIJERA Editor
 
Fast and Precise Symbolic Analysis of Concurrency Bugs in Device Drivers
Fast and Precise Symbolic Analysis of Concurrency Bugs in Device DriversFast and Precise Symbolic Analysis of Concurrency Bugs in Device Drivers
Fast and Precise Symbolic Analysis of Concurrency Bugs in Device DriversPantazis Deligiannis
 
DIT-Radix-2-FFT in SPED
DIT-Radix-2-FFT in SPEDDIT-Radix-2-FFT in SPED
DIT-Radix-2-FFT in SPEDAjay Kumar
 
ch09_rsa_nemo.ppt
ch09_rsa_nemo.pptch09_rsa_nemo.ppt
ch09_rsa_nemo.pptChandraB15
 
Presentation Slides - Genetic algorithm based key generation for fully homomo...
Presentation Slides - Genetic algorithm based key generation for fully homomo...Presentation Slides - Genetic algorithm based key generation for fully homomo...
Presentation Slides - Genetic algorithm based key generation for fully homomo...MajedahAlkharji
 
Python Programming - IX. On Randomness
Python Programming - IX. On RandomnessPython Programming - IX. On Randomness
Python Programming - IX. On RandomnessRanel Padon
 

Similar to Cyber-Security Enhancements of Networked Control Systems Using Homomorphic Encryption (20)

F010243136
F010243136F010243136
F010243136
 
Data Security Using Elliptic Curve Cryptography
Data Security Using Elliptic Curve CryptographyData Security Using Elliptic Curve Cryptography
Data Security Using Elliptic Curve Cryptography
 
Implementation of RSA Algorithm with Chinese Remainder Theorem for Modulus N ...
Implementation of RSA Algorithm with Chinese Remainder Theorem for Modulus N ...Implementation of RSA Algorithm with Chinese Remainder Theorem for Modulus N ...
Implementation of RSA Algorithm with Chinese Remainder Theorem for Modulus N ...
 
One to many (new scheme for symmetric cryptography)
One to many (new scheme for symmetric cryptography)One to many (new scheme for symmetric cryptography)
One to many (new scheme for symmetric cryptography)
 
cryptography
cryptographycryptography
cryptography
 
EEG, MEG and FieldTrip
EEG, MEG and FieldTripEEG, MEG and FieldTrip
EEG, MEG and FieldTrip
 
D44091720
D44091720D44091720
D44091720
 
Cryptosystem An Implementation of RSA Using Verilog
Cryptosystem An Implementation of RSA Using VerilogCryptosystem An Implementation of RSA Using Verilog
Cryptosystem An Implementation of RSA Using Verilog
 
Lattice based Merkle for post-quantum epoch
Lattice based Merkle for post-quantum epochLattice based Merkle for post-quantum epoch
Lattice based Merkle for post-quantum epoch
 
CS8451 - Design and Analysis of Algorithms
CS8451 - Design and Analysis of AlgorithmsCS8451 - Design and Analysis of Algorithms
CS8451 - Design and Analysis of Algorithms
 
New Technique Using Multiple Symmetric keys for Multilevel Encryption
New Technique Using Multiple Symmetric keys for Multilevel EncryptionNew Technique Using Multiple Symmetric keys for Multilevel Encryption
New Technique Using Multiple Symmetric keys for Multilevel Encryption
 
Fast and Precise Symbolic Analysis of Concurrency Bugs in Device Drivers
Fast and Precise Symbolic Analysis of Concurrency Bugs in Device DriversFast and Precise Symbolic Analysis of Concurrency Bugs in Device Drivers
Fast and Precise Symbolic Analysis of Concurrency Bugs in Device Drivers
 
DIT-Radix-2-FFT in SPED
DIT-Radix-2-FFT in SPEDDIT-Radix-2-FFT in SPED
DIT-Radix-2-FFT in SPED
 
15
1515
15
 
15
1515
15
 
ch09_rsa_nemo.ppt
ch09_rsa_nemo.pptch09_rsa_nemo.ppt
ch09_rsa_nemo.ppt
 
Unit --3.ppt
Unit --3.pptUnit --3.ppt
Unit --3.ppt
 
Presentation Slides - Genetic algorithm based key generation for fully homomo...
Presentation Slides - Genetic algorithm based key generation for fully homomo...Presentation Slides - Genetic algorithm based key generation for fully homomo...
Presentation Slides - Genetic algorithm based key generation for fully homomo...
 
WiFi Security Explained
WiFi Security ExplainedWiFi Security Explained
WiFi Security Explained
 
Python Programming - IX. On Randomness
Python Programming - IX. On RandomnessPython Programming - IX. On Randomness
Python Programming - IX. On Randomness
 

More from Kiminao Kogiso

Parameterization of Equilibrium Assessment in Bayesian Game with Its Applicat...
Parameterization of Equilibrium Assessment in Bayesian Game with Its Applicat...Parameterization of Equilibrium Assessment in Bayesian Game with Its Applicat...
Parameterization of Equilibrium Assessment in Bayesian Game with Its Applicat...Kiminao Kogiso
 
Player's Belief Estimation for Super Human Sports
Player's Belief Estimation for Super Human SportsPlayer's Belief Estimation for Super Human Sports
Player's Belief Estimation for Super Human SportsKiminao Kogiso
 
Hybrid Nonlinear Model of McKibben Pneumatic Artificial Muscle Systems Incorp...
Hybrid Nonlinear Model of McKibben Pneumatic Artificial Muscle Systems Incorp...Hybrid Nonlinear Model of McKibben Pneumatic Artificial Muscle Systems Incorp...
Hybrid Nonlinear Model of McKibben Pneumatic Artificial Muscle Systems Incorp...Kiminao Kogiso
 
Application of ElGamal Encryption Scheme to Control System for Security Enhan...
Application of ElGamal Encryption Scheme to Control System for Security Enhan...Application of ElGamal Encryption Scheme to Control System for Security Enhan...
Application of ElGamal Encryption Scheme to Control System for Security Enhan...Kiminao Kogiso
 
Considerations on model predictive control of McKibben pneumatic artificial m...
Considerations on model predictive control of McKibben pneumatic artificial m...Considerations on model predictive control of McKibben pneumatic artificial m...
Considerations on model predictive control of McKibben pneumatic artificial m...Kiminao Kogiso
 
Estimating Player's Belief in Bayesian Game by Feedback Control
Estimating Player's Belief in Bayesian Game by Feedback ControlEstimating Player's Belief in Bayesian Game by Feedback Control
Estimating Player's Belief in Bayesian Game by Feedback ControlKiminao Kogiso
 
Modeling of McKibben pneumatic artificial muscle system using pressure-depend...
Modeling of McKibben pneumatic artificial muscle system using pressure-depend...Modeling of McKibben pneumatic artificial muscle system using pressure-depend...
Modeling of McKibben pneumatic artificial muscle system using pressure-depend...Kiminao Kogiso
 
Experimental Validation of McKibben Pneumatic Artificial Muscle Model
Experimental Validation of McKibben Pneumatic Artificial Muscle ModelExperimental Validation of McKibben Pneumatic Artificial Muscle Model
Experimental Validation of McKibben Pneumatic Artificial Muscle ModelKiminao Kogiso
 
Identification Procedure for McKibben Pneumatic Artificial Muscle Systems
Identification Procedure for McKibben Pneumatic Artificial Muscle SystemsIdentification Procedure for McKibben Pneumatic Artificial Muscle Systems
Identification Procedure for McKibben Pneumatic Artificial Muscle SystemsKiminao Kogiso
 

More from Kiminao Kogiso (9)

Parameterization of Equilibrium Assessment in Bayesian Game with Its Applicat...
Parameterization of Equilibrium Assessment in Bayesian Game with Its Applicat...Parameterization of Equilibrium Assessment in Bayesian Game with Its Applicat...
Parameterization of Equilibrium Assessment in Bayesian Game with Its Applicat...
 
Player's Belief Estimation for Super Human Sports
Player's Belief Estimation for Super Human SportsPlayer's Belief Estimation for Super Human Sports
Player's Belief Estimation for Super Human Sports
 
Hybrid Nonlinear Model of McKibben Pneumatic Artificial Muscle Systems Incorp...
Hybrid Nonlinear Model of McKibben Pneumatic Artificial Muscle Systems Incorp...Hybrid Nonlinear Model of McKibben Pneumatic Artificial Muscle Systems Incorp...
Hybrid Nonlinear Model of McKibben Pneumatic Artificial Muscle Systems Incorp...
 
Application of ElGamal Encryption Scheme to Control System for Security Enhan...
Application of ElGamal Encryption Scheme to Control System for Security Enhan...Application of ElGamal Encryption Scheme to Control System for Security Enhan...
Application of ElGamal Encryption Scheme to Control System for Security Enhan...
 
Considerations on model predictive control of McKibben pneumatic artificial m...
Considerations on model predictive control of McKibben pneumatic artificial m...Considerations on model predictive control of McKibben pneumatic artificial m...
Considerations on model predictive control of McKibben pneumatic artificial m...
 
Estimating Player's Belief in Bayesian Game by Feedback Control
Estimating Player's Belief in Bayesian Game by Feedback ControlEstimating Player's Belief in Bayesian Game by Feedback Control
Estimating Player's Belief in Bayesian Game by Feedback Control
 
Modeling of McKibben pneumatic artificial muscle system using pressure-depend...
Modeling of McKibben pneumatic artificial muscle system using pressure-depend...Modeling of McKibben pneumatic artificial muscle system using pressure-depend...
Modeling of McKibben pneumatic artificial muscle system using pressure-depend...
 
Experimental Validation of McKibben Pneumatic Artificial Muscle Model
Experimental Validation of McKibben Pneumatic Artificial Muscle ModelExperimental Validation of McKibben Pneumatic Artificial Muscle Model
Experimental Validation of McKibben Pneumatic Artificial Muscle Model
 
Identification Procedure for McKibben Pneumatic Artificial Muscle Systems
Identification Procedure for McKibben Pneumatic Artificial Muscle SystemsIdentification Procedure for McKibben Pneumatic Artificial Muscle Systems
Identification Procedure for McKibben Pneumatic Artificial Muscle Systems
 

Recently uploaded

UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduitsrknatarajan
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 

Recently uploaded (20)

UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 

Cyber-Security Enhancements of Networked Control Systems Using Homomorphic Encryption

  • 1. December 18 Fri., 2015, 13:30-13:50, Regular Session: Networked Control Systems 2, Frb09.1 @ 1003 Cyber-‐‑‒Security  Enhancements  of   Networked  Control  Systems  Using   Homomorphic  Encryption Kiminao Kogiso University of Electro-Communications Tokyo, Japan Takahiro Fujita Yokogawa Denshikiki Co., Ltd. The 54 Conference on Decision and Control Osaka International Convention Center, Osaka, Japan December 15 to 18, 2015
  • 2. Outline 2 Introduction   Problem  Statement   Controller  Encryption   Simulation  &  Validation   Conclusion
  • 3. Introduction 3 Controller device is important, but exposed to threats of hacking and targeted attacks. signals: modeling, stealing recipe, management policy and know-how parameters: knowledges about system designs and operations Attacks on networked control system plantcontroller ref. (recipe) control signals feedback signals parameters [1] Sandberg et al., 2015. [2] Sato et al., 2015. [3] Pang et al., 2011 Related works aiming to conceal the signals control-theoretical approach: detection[1], positive use of noises[2] cryptography-based approach: encryption of communication links[3] no studies considering encryption of the controller or its inside… control (cipher) feedback (cipher) EncDec Enc Dec plantcontroller ref. ref. (cipher) Enc Dec
  • 4. Introduction 4 Objective of this work Realize a cryptography-based control law to conceal both the signals & parameters. control (cipher) feedback (cipher) EncDec Enc Dec plantcontroller ref. ref. (cipher) Enc Dec conventional: control (cipher) feedback (cipher) Enc Dec plantencrypted controller ref. ref. (cipher) Enc parameters (cipher) proposed: Concept of encrypted controller: calculates an encrypted control directly from an encrypted feedback signal & an encrypted reference using encrypted parameters, is achieved by incorporating homomorphic encryption scheme into the control law.
  • 5. Problem Statement 5 Encryption of linear controller Consider a linear controller: f Controller Encryption Problem: Given an encryption scheme , for a control law realize an encrypted law .fE fE Define an encrypted control law , given an encryption scheme , satisfyingfE E  x[k + 1] u[k] =  A B C D  x[k] y[k] := ⇠[k] := f( , ⇠[k]) : parameter matrix : plant output : control inputu y 5 control (cipher) feedback (cipher) Enc Dec plant parameters (cipher) Enc(y) Enc(u) u y Enc( ) fE (Enc( ), Enc(⇠)) fE (Enc( ), Enc(⇠)) = Enc(f( , ⇠))
  • 6. RSA encryption[4,5] (deterministic) & ElGamal encryption[6] (stochastic) ElGamal encryption scheme[4] key generation: public , and private (random) encryption: decryption: Controller Encryption 1/3 6[4] Rivest, “A Method for Obtaining Digital Signatures and Public-Key Cryptosystem”, 1978. [5] Rivest, “On Data Banks and Privacy Homomorphisms”, 1978. Homomorphic encryption schemes RSA: Rivest-Shamir-Adelman Dec(c1, c2) = c2 ⇥ c s 1 mod p g, p, s 2 N(g, p) s r 2 N:  randomEnc(m) = (gr mod p, m ⇥ gsr mod p) = c1 = c2 m: integer in plaintext space : integer in ciphertext spacec1, c2 Homomorphism definition Enc(m1 • m2) = Enc(m1) ⇤ Enc(m2) in the case of ElGamal ·: multiplication ⇤ : modulo operation plaintext   space ciphertext   space m1 m2 ⇥ ⇥ ⇥ m2•m1 ⇥ ⇥ ⇥ Enc(m1) Enc(m2) N N2 Enc Enc Enc
  • 7. Controller Encryption 2/3 7 Idea for controller encryption Divide the linear operation to apply the homomorphism. f = f+ f⇥ f⇥ ( , ⇠) = ⇥ 1⇠1 2⇠2 · · · L⇠L ⇤ =: ←  executed  after  the  decryption ←  executed  in  the  controller  device modification of the decryption process to update the decryption algorithm with “Dec+ ”. Dec+ Configuration using ElGamal encryption scheme signals (cipher) feedback (cipher) Enc Dec plant parameters (cipher) Enc( ) Enc( ) f+ f⇥ Enc(⇠) x[k + 1] u[k] ⇠ fE (Enc( ), Enc(⇠)) f+ ( ) = LX l=1 l
  • 8. with and sufficient large, rounding (quantization) error can be made small.a encrypted controller u[k] y[k] Enc Enc(KpM) Enc(yM[k]) Enc(uM[k]) a 2 yM[k] uM[k] ba•e plant Dec+ n Controller Encryption 3/3 8 a 2 N b•e : round function KpM = ba ⇥ Kpe yM[k] = ba ⇥ y[k]e uM[k] = KpMyM[k] Kp y[k] u[k] = Kpy[k] example: , then .Kp = 0.83, a = 1000 KpM = b1000 ⇥ 0.83e = 830 Remarks Signals & parameters are real; Plaintext is integer. need a map: multiplying by a natural number and rounding off to an integer, i.e.,
  • 9. Simulation: Controller Encryption 9 (key length 25bit) Things seen in controller encrypted controller normal: proposed: u[k] y[k] controller n = 67108913 g = 3 Enc( ) = 2 4 1 0.0063 0 0 0.3678 0.0063 10 99.90 3 3 5 =  Enc(x[k]) Enc(y[k]) Enc(⇠[k]) Enc( [k]) 0 1 2 3 4 5 -3 -2 -1 0 1 0 1 2 3 4 5 -0.5 0 0.5 1 1.5 time [s] time [s] control output 0 1 2 3 4 5 time [s] 0 1 2 3 4 × 107 0 1 2 3 4 5 time [s] 0 1 2 3 4 × 107 0 1 2 3 4 5 time [s] 0 1 2 3 4 × 107 0 1 2 3 4 5 time [s] 0 1 2 3 4 × 107 0 1 2 3 4 5 time [s] 0 1 2 3 4 × 107 0 1 2 3 4 5 time [s] 0 1 2 3 4 × 107 0 1 2 3 4 5 0 1 2 3 4 × 107 0 1 2 3 4 5 0 1 2 3 4 × 107 6 signals related to control 2 signals related to output 0 1 2 3 4 5 -0.5 0 0.5 1 1.5 0 1 2 3 4 5 -3 -2 -1 0 1 Enc( )2 = 2 4 14170023 24305287 4114472 24817983 26559389 33379406 29922594 31813162 24125985 3 5 Enc( )1 = 2 4 16354115 11333831 12428094 25939844 22437363 17650745 23018684 228286 8037052 3 5
  • 10. Validation: Protection from Stealing 10 System identification (n4sid) -150 -100 -50 0 50 10-2 100 102 -270 -225 -180 -135 -90 -45 0 frequency [rad/s] gain[dB]phase[deg] original closed loop system without encryption with encryption(RSA) with encryption(ElGamal)
  • 11. Conclusion 11 Introduction Problem Statement controller encryption problem Encrypted Controller homomorphism of specific encryption scheme remarks in quantization error Simulation & Validation enable to conceal signals & parameters inside the controller device in terms of cryptography. enable to hide dynamics of the control system. Future works incorporate an attack detection method. validate computation cost of encrypted controller. -150 -100 -50 0 50 10-2 100 102 -270 -225 -180 -135 -90 -45 0 frequency [rad/s] gain[dB]phase[deg] original closed loop system without encryption with encryption(RSA) with encryption(ElGamal) 0 1 2 3 4 5 time [s] 0 1 2 3 4 × 107 0 1 2 3 4 5 time [s] 0 1 2 3 4 × 107 0 1 2 3 4 5 time [s] 0 1 2 3 4 × 107 0 1 2 3 4 5 time [s] 0 1 2 3 4 × 107 0 1 2 3 4 5 time [s] 0 1 2 3 4 × 107 0 1 2 3 4 5 time [s] 0 1 2 3 4 × 107 0 1 2 3 4 5 0 1 2 3 4 × 107 0 1 2 3 4 5 0 1 2 3 4 × 107