DocumentCode :
2567946
Title :
The wireless control network: Monitoring for malicious behavior
Author :
Sundaram, Shreyas ; Pajic, Miroslav ; Hadjicostis, Christoforos N. ; Mangharam, Rahul ; Pappas, George J.
Author_Institution :
Dept. of Electr. & Comput. Eng., Univ. of Waterloo, Waterloo, ON, Canada
fYear :
2010
fDate :
15-17 Dec. 2010
Firstpage :
5979
Lastpage :
5984
Abstract :
We consider the problem of stabilizing a plant with a network of resource constrained wireless nodes. In a companion paper, we developed a protocol where each node repeatedly transmits an appropriate (stabilizing) linear combination of the values in its neighborhood. In this paper, we design an Intrusion Detection System (IDS) for this control scheme, which observes the transmissions of certain nodes and uses that information to (a) recover the plant outputs (for data-logging and diagnostic purposes) and (b) identify malicious behavior by any of the wireless nodes in the network. We show that if the connectivity of the network is sufficiently high, the IDS only needs to observe a subset of the nodes in the network in order to achieve this objective. Our approach provides a characterization of the set of nodes that should be observed, a systematic procedure for the IDS to use to identify the malicious nodes and recover the outputs of the plant, and an upper bound on the delay required to obtain the necessary information.
Keywords :
radio networks; security of data; telecommunication control; telecommunication security; IDS; intrusion detection system; malicious behavior; resource constrained wireless node; wireless control network; Joining processes; Linear systems; Monitoring; Network topology; Sensors; Transfer functions; Wireless communication;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Decision and Control (CDC), 2010 49th IEEE Conference on
Conference_Location :
Atlanta, GA
ISSN :
0743-1546
Print_ISBN :
978-1-4244-7745-6
Type :
conf
DOI :
10.1109/CDC.2010.5717166
Filename :
5717166
Link To Document :
بازگشت