Attacks on Distributed Sequential Control in Manufacturing Automation
Autor: | Zivana Jakovljevic, Miroslav Pajic, Vuk Lesi |
---|---|
Rok vydání: | 2021 |
Předmět: |
Supervisory control theory
business.industry Event (computing) Computer science Distributed computing 020208 electrical & electronic engineering Reconfigurability Control reconfiguration 02 engineering and technology Modular design Automation Computer Science Applications Control and Systems Engineering Control system 0202 electrical engineering electronic engineering information engineering Electrical and Electronic Engineering business Information Systems Vulnerability (computing) |
Zdroj: | IEEE Transactions on Industrial Informatics. 17:775-786 |
ISSN: | 1941-0050 1551-3203 |
DOI: | 10.1109/tii.2020.2987629 |
Popis: | Industrial Internet of Things (IIoT) represents a backbone of modern reconfigurable manufacturing systems (RMS), which enable manufacturing of a high product variety through rapid and easy reconfiguration of manufacturing equipment. In IIoT-enabled RMS, modular equipment is built from smart devices, each performing its own tasks, whereas the global functioning is achieved through their networking and intensive communication. Although device communication contributes to the system reconfigurability, it also opens up new security challenges due to potential vulnerability of communication links. In this article, we present security analysis for a major part of RMS in which manufacturing equipment is sequentially controlled and can be modeled as discrete event systems (DES). Control distribution within DES implies communication of certain events between smart modules. Specifically, in this work, we focus on attacks on communication of these events. In particular, we develop a method for modeling such attacks, including event insertion and removal attacks, in distributed sequential control; the method is based on the supervisory control theory framework. We show how the modeled attacks can be detected and provide a method for identification of communication links that require protection to avoid catastrophic damage of the system. Finally, we illustrate and experimentally validate applicability of our methodology on a real-world industrial case study with reconfigurable manufacturing equipment. |
Databáze: | OpenAIRE |
Externí odkaz: |