Information Security and Cryptology

N/ACitations
Citations of this article
120Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Recently, the security of Industrial Control Systems (ICSs) is widely concerned all over the world. In this paper, the security issues in remote state estimation process of ICSs will be considered. The com- munication channel between sensor nodes and the remote state estima- tor may be maliciously interfaced and manipulated by the internal or external attacker. With resources constraints for both the sensor and the attacker side, the interactive decision making process of whether to send or receive data packets or not for estimation process and whether to launch an attack on some data packets or not for an attacker are stud- ied in this paper. A game theory based framework is formulated in the paper and it has been proved that a Nash equilibrium of the final pay-off arbitration game is existed. For the practical computation convenience, an on-line updating algorithm is proposed. What’s more, the simulation of the game-based framework described in this paper is demonstrated to verify the validity and efficiency of this framework. The experimental results have shown that the game-based framework could improve per- formance of the decision making and estimation process and mitigate the impact of the attack. It may provide a novel and feasible approach to protect the state estimation process and improve the intrusion tolerance in ICSs.

Cite

CITATION STYLE

APA

Information Security and Cryptology. (2008). Information Security and Cryptology. Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-540-79499-8

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free