Confidentiality attacks against encrypted control systems

Encrypted control systems were introduced to enhance the security of cyber-physical systems, which outsource control action computations to a third-party platform. To protect the confidentiality of the transmitted data, homomorphic encryption schemes are particularly appealing for their capability o...

Full description

Saved in:
Bibliographic Details
Published inCyber-physical systems Vol. 9; no. 3; pp. 224 - 243
Main Authors Naseri, Amir Mohammad, Lucia, Walter, Youssef, Amr
Format Journal Article
LanguageEnglish
Published Taylor & Francis 03.07.2023
Subjects
Online AccessGet full text

Cover

Loading…
Abstract Encrypted control systems were introduced to enhance the security of cyber-physical systems, which outsource control action computations to a third-party platform. To protect the confidentiality of the transmitted data, homomorphic encryption schemes are particularly appealing for their capability of allowing computations on encrypted data. By considering the popular ElGamal and Paillier encryption schemes, this paper shows that encrypted control systems are vulnerable to attackers leveraging the inherently small domains of the plaintext data in control systems and the randomisation process required to make the utilised ciphers semantically secure. Finally, we present some countermeasures to defend against these attacks.
AbstractList Encrypted control systems were introduced to enhance the security of cyber-physical systems, which outsource control action computations to a third-party platform. To protect the confidentiality of the transmitted data, homomorphic encryption schemes are particularly appealing for their capability of allowing computations on encrypted data. By considering the popular ElGamal and Paillier encryption schemes, this paper shows that encrypted control systems are vulnerable to attackers leveraging the inherently small domains of the plaintext data in control systems and the randomisation process required to make the utilised ciphers semantically secure. Finally, we present some countermeasures to defend against these attacks.
Author Naseri, Amir Mohammad
Lucia, Walter
Youssef, Amr
Author_xml – sequence: 1
  givenname: Amir Mohammad
  orcidid: 0000-0002-8405-7172
  surname: Naseri
  fullname: Naseri, Amir Mohammad
  organization: Concordia University
– sequence: 2
  givenname: Walter
  orcidid: 0000-0003-3776-8331
  surname: Lucia
  fullname: Lucia, Walter
  email: walter.lucia@concordia.ca
  organization: Concordia University
– sequence: 3
  givenname: Amr
  orcidid: 0000-0002-4284-8646
  surname: Youssef
  fullname: Youssef, Amr
  organization: Concordia University
BookMark eNp9kM1KAzEUhYNUsNY-gjAvMPUmaSadnTKoFQpudB3u5Eei06QkAZm3d0qrSzfnHg73nMV3TWYhBkvILYUVhQ3cMc65kFKuGDA2iaAM2gsyP-a1kBsx-_NSXpFlzp8AQNftFMo5absYnDc2FI-DL2OFpaD-yhV-oA-5VDboNB6KNZWOoaQ4VHnMxe7zDbl0OGS7PN8FeX96fOu29e71-aV72NWaMVHqpuWMMr4GA711rHcCYdNTMFY2vEHRyF5a1xvDUQrBOILWjlE7_XLZ9pIviDjt6hRzTtapQ_J7TKOioI4I1C8CdUSgzgim3v2p54OLaY_fMQ1GFRyHmFzCoH1W_P-JH1RXZRs
CitedBy_id crossref_primary_10_1007_s10462_023_10563_8
crossref_primary_10_1109_LCSYS_2023_3269390
crossref_primary_10_53759_181X_JCNS202202014
Cites_doi 10.1145/3203245
10.23919/ICCAS50221.2020.9268374
10.1109/CPSNA.2016.9
10.1145/1666420.1666444
10.1109/SP.2016.10
10.1145/362375.362389
10.1109/ICAS49788.2021.9551155
10.1016/j.arcontrol.2019.04.011
10.1109/CDC.2018.8619600
10.1109/TVT.2020.2980137
10.1109/TAC.2020.2992445
10.1145/2633600
10.1109/CDC40024.2019.9029356
10.1109/TAC.2020.2982611
10.1007/3-540-48910-X_16
10.1109/CDC.2018.8619569
10.1016/0377-0427(90)90346-2
10.1007/3-540-44448-3_3
10.1007/978-3-319-12229-8
10.1016/j.ifacol.2016.10.390
10.3390/inventions4040061
10.1155/2007/13801
10.1007/978-3-662-46447-2_3
10.1016/j.ifacol.2016.10.392
10.1109/CDC.2015.7403296
10.1016/j.procs.2019.06.012
10.1016/j.ifacol.2019.12.171
10.1109/CDC.2018.8619221
10.1109/TIT.1985.1057074
10.1109/MCS.2021.3062956
10.1007/978-3-662-44371-2_26
10.1109/WFCS.2014.6837587
10.1109/TSMC.2018.2875250
10.1109/LCSYS.2020.3033059
ContentType Journal Article
Copyright 2022 Informa UK Limited, trading as Taylor & Francis Group 2022
Copyright_xml – notice: 2022 Informa UK Limited, trading as Taylor & Francis Group 2022
DBID AAYXX
CITATION
DOI 10.1080/23335777.2022.2051209
DatabaseName CrossRef
DatabaseTitle CrossRef
DatabaseTitleList
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
Sciences (General)
EISSN 2333-5785
EndPage 243
ExternalDocumentID 10_1080_23335777_2022_2051209
2051209
Genre Research Articles
GroupedDBID 0BK
30N
AALDU
AAMIU
AAPUL
AAQRR
ABLIJ
ABXUL
ACGFS
ADCVX
ADFNY
ADGTB
AECIN
AEISY
AFHWD
AFWLO
AGDLA
AIJEM
AKBVH
AKOOK
ALMA_UNASSIGNED_HOLDINGS
ALQZU
BLEHA
CCCUG
EBS
EUPTU
GTTXZ
IPNFZ
KYCEM
LJTGL
M4Z
RIG
RNANH
ROSJB
RTWRZ
SOJIQ
TEN
TFL
TFT
TFW
TTHFI
UK1
ZGOLN
0R~
AAYXX
ABJNI
ABPAQ
ABXYU
AEEWU
AHDZW
AWYRJ
CITATION
DGEBU
H13
TBQAZ
TDBHL
TUROJ
ID FETCH-LOGICAL-c225t-693212340d0bef2bf5a08b10de7636a567b7efbdd3a75523a0ccf21eef2379b73
ISSN 2333-5777
IngestDate Fri Aug 23 03:18:39 EDT 2024
Tue Jun 13 07:05:11 EDT 2023
IsPeerReviewed true
IsScholarly true
Issue 3
Language English
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-c225t-693212340d0bef2bf5a08b10de7636a567b7efbdd3a75523a0ccf21eef2379b73
ORCID 0000-0002-4284-8646
0000-0002-8405-7172
0000-0003-3776-8331
PageCount 20
ParticipantIDs informaworld_taylorfrancis_310_1080_23335777_2022_2051209
crossref_primary_10_1080_23335777_2022_2051209
PublicationCentury 2000
PublicationDate 07/03/2023
PublicationDateYYYYMMDD 2023-07-03
PublicationDate_xml – month: 07
  year: 2023
  text: 07/03/2023
  day: 03
PublicationDecade 2020
PublicationTitle Cyber-physical systems
PublicationYear 2023
Publisher Taylor & Francis
Publisher_xml – name: Taylor & Francis
References cit0011
cit0033
cit0012
cit0034
cit0031
cit0010
cit0032
cit0030
Park J. (cit0029) 2003
Latham D.C (cit0026) 1986
cit0019
Goldberg I. (cit0036) 1996
cit0017
cit0039
cit0018
cit0015
cit0037
cit0016
cit0038
cit0013
cit0035
cit0014
cit0022
cit0001
cit0023
cit0021
cit0040
cit0041
cit0008
cit0009
cit0006
cit0028
cit0007
cit0004
cit0005
cit0027
cit0002
Baba R. (cit0020) 2018
cit0024
cit0003
cit0025
References_xml – ident: cit0003
  doi: 10.1145/3203245
– ident: cit0023
  doi: 10.23919/ICCAS50221.2020.9268374
– ident: cit0018
  doi: 10.1109/CPSNA.2016.9
– ident: cit0028
  doi: 10.1145/1666420.1666444
– ident: cit0037
  doi: 10.1109/SP.2016.10
– year: 1996
  ident: cit0036
  publication-title: Dr. Dobb's Journal
  contributor:
    fullname: Goldberg I.
– ident: cit0024
  doi: 10.1145/362375.362389
– ident: cit0002
– ident: cit0005
  doi: 10.1109/ICAS49788.2021.9551155
– ident: cit0001
  doi: 10.1016/j.arcontrol.2019.04.011
– ident: cit0031
  doi: 10.1109/CDC.2018.8619600
– ident: cit0006
  doi: 10.1109/TVT.2020.2980137
– ident: cit0030
  doi: 10.1109/TAC.2020.2992445
– ident: cit0027
  doi: 10.1145/2633600
– ident: cit0016
  doi: 10.1109/CDC40024.2019.9029356
– ident: cit0004
  doi: 10.1109/TAC.2020.2982611
– ident: cit0013
  doi: 10.1007/3-540-48910-X_16
– ident: cit0032
  doi: 10.1109/CDC.2018.8619569
– ident: cit0034
  doi: 10.1016/0377-0427(90)90346-2
– ident: cit0041
  doi: 10.1007/3-540-44448-3_3
– ident: cit0033
  doi: 10.1007/978-3-319-12229-8
– ident: cit0014
  doi: 10.1016/j.ifacol.2016.10.390
– ident: cit0039
– volume-title: Practical data acquisition for instrumentation and control systems
  year: 2003
  ident: cit0029
  contributor:
    fullname: Park J.
– ident: cit0040
  doi: 10.3390/inventions4040061
– ident: cit0011
  doi: 10.1155/2007/13801
– ident: cit0035
  doi: 10.1007/978-3-662-46447-2_3
– ident: cit0015
  doi: 10.1016/j.ifacol.2016.10.392
– year: 1986
  ident: cit0026
  publication-title: Depart Def
  contributor:
    fullname: Latham D.C
– ident: cit0010
  doi: 10.1109/CDC.2015.7403296
– ident: cit0017
  doi: 10.1016/j.procs.2019.06.012
– ident: cit0022
  doi: 10.1016/j.ifacol.2019.12.171
– ident: cit0021
  doi: 10.1109/CDC.2018.8619221
– ident: cit0012
  doi: 10.1109/TIT.1985.1057074
– ident: cit0019
– ident: cit0008
  doi: 10.1109/MCS.2021.3062956
– ident: cit0038
  doi: 10.1007/978-3-662-44371-2_26
– ident: cit0009
  doi: 10.1109/WFCS.2014.6837587
– start-page: 244
  volume-title: SICE Annual Conference
  year: 2018
  ident: cit0020
  contributor:
    fullname: Baba R.
– ident: cit0007
  doi: 10.1109/TSMC.2018.2875250
– ident: cit0025
  doi: 10.1109/LCSYS.2020.3033059
SSID ssj0001492337
Score 2.2720656
Snippet Encrypted control systems were introduced to enhance the security of cyber-physical systems, which outsource control action computations to a third-party...
SourceID crossref
informaworld
SourceType Aggregation Database
Publisher
StartPage 224
SubjectTerms cyber-physical systems security
Encrypted control systems
homomorphic encryption
Title Confidentiality attacks against encrypted control systems
URI https://www.tandfonline.com/doi/abs/10.1080/23335777.2022.2051209
Volume 9
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1NT9wwELUKvcABFVrER4ty6KEIGbz2Ot4cV1URqlROoHKLxokDHHZZJeEAv55xbCdeQKj0Eq2s7ORjnmbGzrxnQr4L4CAmCqhExFCbsSikStBSa8xWBljayTH8OU_PLse_r-TV0MrbsUtafVw8vsor-R-v4hj61bJk3-HZ3igO4G_0Lx7Rw3j8Jx9but5tx7R11TS0raXMH8E1zveb9gjvtX5Y2JoydKQ3kUB50Cd40Kami-Cv-Ay7SAyBjD6d3dYYAm5gNoOy7-O5L1y37d_us3sUQ5rGOL3HWR2vLHDRdaGKIQBxIQSVym-zYuIxt81OiKBZBBQRR0NHj_aJlTs9phcx2zU5WsP2Wjhl55YgJy2pd0hS4cP8s9zVdxSOvNRpMJNbM7k3s0I-coxDNgAKdj4swVlxuk5VtX_SwPGasJNXb2ipelnSto2qkotPZMNPJ5Kpw8Ym-WDmW2Q9EpncIps-fDfJD68xfviZZM-gk3joJB46SQ-dxEMn8cD4Qi5Pf138PKN-Fw1aYKxuaYoVOpYnY1YybSquKwlsokesNJhaUpCp0spUuiwFKCm5AFYUFR8ZPFeoTCuxTVbnd3OzQ5JxBUyVpaVnT8aFrDJRoDEsyDGSA4DaJcfh7eQLJ5aSv-mYXZLF7zBvu1Wqym0pk4s3_7v33ovtk7UB5V_Jalvfm29YUbb6oMPFE8RXbCk
link.rule.ids 315,783,787,27936,27937,60214,61003
linkProvider Taylor & Francis
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV09T8MwED1BGYABaAFRPj0wwOCSxnHcjAhRFWg7tVK3yE5sVCGVqk0H-PX4nESkSLCw5yznbN-9s-49A1wz6UvWEZJyu2MoZiwqQ8FoqpTNVlp6oZNjGAzD3jh4nvBJhQuDbZVYQ5tcKMLFajzceBldtsTd-YwxLoSw5Z2PZCqOBNBN2ApRAAxpHN7w-54FFcicdCZaUTQriTy_jbSWotYETCupp7sPSTnpvOPkrbXKVCv5_KHn-L-_OoC9ApmS-3wr1WFDzxqwW9ErbEC9iARLclPIVd8eQoSkwanj-zpMT2SWIXGfyFc5teCTWIvFx9wiW1L0xZNcPnp5BOPu4-ihR4sHGWhij31GQwv2bKYLvNRT2vjKcOl1VNtLtY1SoeShUEIblaZMCm4rXOklifHb2n7LRKQEO4ba7H2mT4AERnoiTZHp2wkSbiKW2MEstrNBQUopmtAq1yCe57obcbuQMy0dFaOj4sJRTYiqKxVn7sLD5K-TxOxP29N_2F7Bdm806Mf9p-HLGezga_Sum5edQy1brPSFxSyZunSb8guSSdym
linkToPdf http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV09T8MwED1BkRAMQAuI8umBAYYUN47jZkRAVb4qBiqxReckRhVSqdp0gF_POXFEiwQLe85y7PPds3XvHcCpQB9FR6EnyWM8m7E8DJXwUq0pW2XIw0KO4bEf9gbB3YusqgmnrqzS3qFNKRRRxGp7uMepqSriLnwhhFRK0e3Ot1wqafmfy7BCSIBbVxe8__3MYgXICuVMa-VZs4rH89tICxlqQb90LvN0N0FXcy4LTt5as1y3ks8fco7_-qkt2HC4lF2WjlSHpWzUgPU5tcIG1F0cmLIzJ1Z9vg2RpQwOC7ZvgegZ5rml7TN8xSFBT0YWk48x4VrmquJZKR493YFB9-b5que5dgxeQoc-90KCepTnAp5ynRlfG4m8o9s8zShGhShDpVVmdJoKVJLut8iTxPjtjL4VKtJK7EJt9D7K9oAFBrlKU8vz7QSJNJFIaDBCdhQSEFE1oVVtQTwuVTfithMzrRYqtgsVu4VqQjS_UXFePHeYsjdJLP603f-H7QmsPl1344fb_v0BrNlW9EUprziEWj6ZZUcEWHJ9XLjkFwTt21M
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Confidentiality+attacks+against+encrypted+control+systems&rft.jtitle=Cyber-physical+systems&rft.au=Naseri%2C+Amir+Mohammad&rft.au=Lucia%2C+Walter&rft.au=Youssef%2C+Amr&rft.date=2023-07-03&rft.issn=2333-5777&rft.eissn=2333-5785&rft.volume=9&rft.issue=3&rft.spage=224&rft.epage=243&rft_id=info:doi/10.1080%2F23335777.2022.2051209&rft.externalDBID=n%2Fa&rft.externalDocID=10_1080_23335777_2022_2051209
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2333-5777&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2333-5777&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2333-5777&client=summon