Confidentiality attacks against encrypted control systems
Encrypted control systems were introduced to enhance the security of cyber-physical systems, which outsource control action computations to a third-party platform. To protect the confidentiality of the transmitted data, homomorphic encryption schemes are particularly appealing for their capability o...
Saved in:
Published in | Cyber-physical systems Vol. 9; no. 3; pp. 224 - 243 |
---|---|
Main Authors | , , |
Format | Journal Article |
Language | English |
Published |
Taylor & Francis
03.07.2023
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | Encrypted control systems were introduced to enhance the security of cyber-physical systems, which outsource control action computations to a third-party platform. To protect the confidentiality of the transmitted data, homomorphic encryption schemes are particularly appealing for their capability of allowing computations on encrypted data. By considering the popular ElGamal and Paillier encryption schemes, this paper shows that encrypted control systems are vulnerable to attackers leveraging the inherently small domains of the plaintext data in control systems and the randomisation process required to make the utilised ciphers semantically secure. Finally, we present some countermeasures to defend against these attacks. |
---|---|
AbstractList | Encrypted control systems were introduced to enhance the security of cyber-physical systems, which outsource control action computations to a third-party platform. To protect the confidentiality of the transmitted data, homomorphic encryption schemes are particularly appealing for their capability of allowing computations on encrypted data. By considering the popular ElGamal and Paillier encryption schemes, this paper shows that encrypted control systems are vulnerable to attackers leveraging the inherently small domains of the plaintext data in control systems and the randomisation process required to make the utilised ciphers semantically secure. Finally, we present some countermeasures to defend against these attacks. |
Author | Naseri, Amir Mohammad Lucia, Walter Youssef, Amr |
Author_xml | – sequence: 1 givenname: Amir Mohammad orcidid: 0000-0002-8405-7172 surname: Naseri fullname: Naseri, Amir Mohammad organization: Concordia University – sequence: 2 givenname: Walter orcidid: 0000-0003-3776-8331 surname: Lucia fullname: Lucia, Walter email: walter.lucia@concordia.ca organization: Concordia University – sequence: 3 givenname: Amr orcidid: 0000-0002-4284-8646 surname: Youssef fullname: Youssef, Amr organization: Concordia University |
BookMark | eNp9kM1KAzEUhYNUsNY-gjAvMPUmaSadnTKoFQpudB3u5Eei06QkAZm3d0qrSzfnHg73nMV3TWYhBkvILYUVhQ3cMc65kFKuGDA2iaAM2gsyP-a1kBsx-_NSXpFlzp8AQNftFMo5absYnDc2FI-DL2OFpaD-yhV-oA-5VDboNB6KNZWOoaQ4VHnMxe7zDbl0OGS7PN8FeX96fOu29e71-aV72NWaMVHqpuWMMr4GA711rHcCYdNTMFY2vEHRyF5a1xvDUQrBOILWjlE7_XLZ9pIviDjt6hRzTtapQ_J7TKOioI4I1C8CdUSgzgim3v2p54OLaY_fMQ1GFRyHmFzCoH1W_P-JH1RXZRs |
CitedBy_id | crossref_primary_10_1007_s10462_023_10563_8 crossref_primary_10_1109_LCSYS_2023_3269390 crossref_primary_10_53759_181X_JCNS202202014 |
Cites_doi | 10.1145/3203245 10.23919/ICCAS50221.2020.9268374 10.1109/CPSNA.2016.9 10.1145/1666420.1666444 10.1109/SP.2016.10 10.1145/362375.362389 10.1109/ICAS49788.2021.9551155 10.1016/j.arcontrol.2019.04.011 10.1109/CDC.2018.8619600 10.1109/TVT.2020.2980137 10.1109/TAC.2020.2992445 10.1145/2633600 10.1109/CDC40024.2019.9029356 10.1109/TAC.2020.2982611 10.1007/3-540-48910-X_16 10.1109/CDC.2018.8619569 10.1016/0377-0427(90)90346-2 10.1007/3-540-44448-3_3 10.1007/978-3-319-12229-8 10.1016/j.ifacol.2016.10.390 10.3390/inventions4040061 10.1155/2007/13801 10.1007/978-3-662-46447-2_3 10.1016/j.ifacol.2016.10.392 10.1109/CDC.2015.7403296 10.1016/j.procs.2019.06.012 10.1016/j.ifacol.2019.12.171 10.1109/CDC.2018.8619221 10.1109/TIT.1985.1057074 10.1109/MCS.2021.3062956 10.1007/978-3-662-44371-2_26 10.1109/WFCS.2014.6837587 10.1109/TSMC.2018.2875250 10.1109/LCSYS.2020.3033059 |
ContentType | Journal Article |
Copyright | 2022 Informa UK Limited, trading as Taylor & Francis Group 2022 |
Copyright_xml | – notice: 2022 Informa UK Limited, trading as Taylor & Francis Group 2022 |
DBID | AAYXX CITATION |
DOI | 10.1080/23335777.2022.2051209 |
DatabaseName | CrossRef |
DatabaseTitle | CrossRef |
DatabaseTitleList | |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering Sciences (General) |
EISSN | 2333-5785 |
EndPage | 243 |
ExternalDocumentID | 10_1080_23335777_2022_2051209 2051209 |
Genre | Research Articles |
GroupedDBID | 0BK 30N AALDU AAMIU AAPUL AAQRR ABLIJ ABXUL ACGFS ADCVX ADFNY ADGTB AECIN AEISY AFHWD AFWLO AGDLA AIJEM AKBVH AKOOK ALMA_UNASSIGNED_HOLDINGS ALQZU BLEHA CCCUG EBS EUPTU GTTXZ IPNFZ KYCEM LJTGL M4Z RIG RNANH ROSJB RTWRZ SOJIQ TEN TFL TFT TFW TTHFI UK1 ZGOLN 0R~ AAYXX ABJNI ABPAQ ABXYU AEEWU AHDZW AWYRJ CITATION DGEBU H13 TBQAZ TDBHL TUROJ |
ID | FETCH-LOGICAL-c225t-693212340d0bef2bf5a08b10de7636a567b7efbdd3a75523a0ccf21eef2379b73 |
ISSN | 2333-5777 |
IngestDate | Fri Aug 23 03:18:39 EDT 2024 Tue Jun 13 07:05:11 EDT 2023 |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 3 |
Language | English |
LinkModel | OpenURL |
MergedId | FETCHMERGED-LOGICAL-c225t-693212340d0bef2bf5a08b10de7636a567b7efbdd3a75523a0ccf21eef2379b73 |
ORCID | 0000-0002-4284-8646 0000-0002-8405-7172 0000-0003-3776-8331 |
PageCount | 20 |
ParticipantIDs | informaworld_taylorfrancis_310_1080_23335777_2022_2051209 crossref_primary_10_1080_23335777_2022_2051209 |
PublicationCentury | 2000 |
PublicationDate | 07/03/2023 |
PublicationDateYYYYMMDD | 2023-07-03 |
PublicationDate_xml | – month: 07 year: 2023 text: 07/03/2023 day: 03 |
PublicationDecade | 2020 |
PublicationTitle | Cyber-physical systems |
PublicationYear | 2023 |
Publisher | Taylor & Francis |
Publisher_xml | – name: Taylor & Francis |
References | cit0011 cit0033 cit0012 cit0034 cit0031 cit0010 cit0032 cit0030 Park J. (cit0029) 2003 Latham D.C (cit0026) 1986 cit0019 Goldberg I. (cit0036) 1996 cit0017 cit0039 cit0018 cit0015 cit0037 cit0016 cit0038 cit0013 cit0035 cit0014 cit0022 cit0001 cit0023 cit0021 cit0040 cit0041 cit0008 cit0009 cit0006 cit0028 cit0007 cit0004 cit0005 cit0027 cit0002 Baba R. (cit0020) 2018 cit0024 cit0003 cit0025 |
References_xml | – ident: cit0003 doi: 10.1145/3203245 – ident: cit0023 doi: 10.23919/ICCAS50221.2020.9268374 – ident: cit0018 doi: 10.1109/CPSNA.2016.9 – ident: cit0028 doi: 10.1145/1666420.1666444 – ident: cit0037 doi: 10.1109/SP.2016.10 – year: 1996 ident: cit0036 publication-title: Dr. Dobb's Journal contributor: fullname: Goldberg I. – ident: cit0024 doi: 10.1145/362375.362389 – ident: cit0002 – ident: cit0005 doi: 10.1109/ICAS49788.2021.9551155 – ident: cit0001 doi: 10.1016/j.arcontrol.2019.04.011 – ident: cit0031 doi: 10.1109/CDC.2018.8619600 – ident: cit0006 doi: 10.1109/TVT.2020.2980137 – ident: cit0030 doi: 10.1109/TAC.2020.2992445 – ident: cit0027 doi: 10.1145/2633600 – ident: cit0016 doi: 10.1109/CDC40024.2019.9029356 – ident: cit0004 doi: 10.1109/TAC.2020.2982611 – ident: cit0013 doi: 10.1007/3-540-48910-X_16 – ident: cit0032 doi: 10.1109/CDC.2018.8619569 – ident: cit0034 doi: 10.1016/0377-0427(90)90346-2 – ident: cit0041 doi: 10.1007/3-540-44448-3_3 – ident: cit0033 doi: 10.1007/978-3-319-12229-8 – ident: cit0014 doi: 10.1016/j.ifacol.2016.10.390 – ident: cit0039 – volume-title: Practical data acquisition for instrumentation and control systems year: 2003 ident: cit0029 contributor: fullname: Park J. – ident: cit0040 doi: 10.3390/inventions4040061 – ident: cit0011 doi: 10.1155/2007/13801 – ident: cit0035 doi: 10.1007/978-3-662-46447-2_3 – ident: cit0015 doi: 10.1016/j.ifacol.2016.10.392 – year: 1986 ident: cit0026 publication-title: Depart Def contributor: fullname: Latham D.C – ident: cit0010 doi: 10.1109/CDC.2015.7403296 – ident: cit0017 doi: 10.1016/j.procs.2019.06.012 – ident: cit0022 doi: 10.1016/j.ifacol.2019.12.171 – ident: cit0021 doi: 10.1109/CDC.2018.8619221 – ident: cit0012 doi: 10.1109/TIT.1985.1057074 – ident: cit0019 – ident: cit0008 doi: 10.1109/MCS.2021.3062956 – ident: cit0038 doi: 10.1007/978-3-662-44371-2_26 – ident: cit0009 doi: 10.1109/WFCS.2014.6837587 – start-page: 244 volume-title: SICE Annual Conference year: 2018 ident: cit0020 contributor: fullname: Baba R. – ident: cit0007 doi: 10.1109/TSMC.2018.2875250 – ident: cit0025 doi: 10.1109/LCSYS.2020.3033059 |
SSID | ssj0001492337 |
Score | 2.2720656 |
Snippet | Encrypted control systems were introduced to enhance the security of cyber-physical systems, which outsource control action computations to a third-party... |
SourceID | crossref informaworld |
SourceType | Aggregation Database Publisher |
StartPage | 224 |
SubjectTerms | cyber-physical systems security Encrypted control systems homomorphic encryption |
Title | Confidentiality attacks against encrypted control systems |
URI | https://www.tandfonline.com/doi/abs/10.1080/23335777.2022.2051209 |
Volume | 9 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1NT9wwELUKvcABFVrER4ty6KEIGbz2Ot4cV1URqlROoHKLxokDHHZZJeEAv55xbCdeQKj0Eq2s7ORjnmbGzrxnQr4L4CAmCqhExFCbsSikStBSa8xWBljayTH8OU_PLse_r-TV0MrbsUtafVw8vsor-R-v4hj61bJk3-HZ3igO4G_0Lx7Rw3j8Jx9but5tx7R11TS0raXMH8E1zveb9gjvtX5Y2JoydKQ3kUB50Cd40Kami-Cv-Ay7SAyBjD6d3dYYAm5gNoOy7-O5L1y37d_us3sUQ5rGOL3HWR2vLHDRdaGKIQBxIQSVym-zYuIxt81OiKBZBBQRR0NHj_aJlTs9phcx2zU5WsP2Wjhl55YgJy2pd0hS4cP8s9zVdxSOvNRpMJNbM7k3s0I-coxDNgAKdj4swVlxuk5VtX_SwPGasJNXb2ipelnSto2qkotPZMNPJ5Kpw8Ym-WDmW2Q9EpncIps-fDfJD68xfviZZM-gk3joJB46SQ-dxEMn8cD4Qi5Pf138PKN-Fw1aYKxuaYoVOpYnY1YybSquKwlsokesNJhaUpCp0spUuiwFKCm5AFYUFR8ZPFeoTCuxTVbnd3OzQ5JxBUyVpaVnT8aFrDJRoDEsyDGSA4DaJcfh7eQLJ5aSv-mYXZLF7zBvu1Wqym0pk4s3_7v33ovtk7UB5V_Jalvfm29YUbb6oMPFE8RXbCk |
link.rule.ids | 315,783,787,27936,27937,60214,61003 |
linkProvider | Taylor & Francis |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV09T8MwED1BGYABaAFRPj0wwOCSxnHcjAhRFWg7tVK3yE5sVCGVqk0H-PX4nESkSLCw5yznbN-9s-49A1wz6UvWEZJyu2MoZiwqQ8FoqpTNVlp6oZNjGAzD3jh4nvBJhQuDbZVYQ5tcKMLFajzceBldtsTd-YwxLoSw5Z2PZCqOBNBN2ApRAAxpHN7w-54FFcicdCZaUTQriTy_jbSWotYETCupp7sPSTnpvOPkrbXKVCv5_KHn-L-_OoC9ApmS-3wr1WFDzxqwW9ErbEC9iARLclPIVd8eQoSkwanj-zpMT2SWIXGfyFc5teCTWIvFx9wiW1L0xZNcPnp5BOPu4-ihR4sHGWhij31GQwv2bKYLvNRT2vjKcOl1VNtLtY1SoeShUEIblaZMCm4rXOklifHb2n7LRKQEO4ba7H2mT4AERnoiTZHp2wkSbiKW2MEstrNBQUopmtAq1yCe57obcbuQMy0dFaOj4sJRTYiqKxVn7sLD5K-TxOxP29N_2F7Bdm806Mf9p-HLGezga_Sum5edQy1brPSFxSyZunSb8guSSdym |
linkToPdf | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV09T8MwED1BkRAMQAuI8umBAYYUN47jZkRAVb4qBiqxReckRhVSqdp0gF_POXFEiwQLe85y7PPds3XvHcCpQB9FR6EnyWM8m7E8DJXwUq0pW2XIw0KO4bEf9gbB3YusqgmnrqzS3qFNKRRRxGp7uMepqSriLnwhhFRK0e3Ot1wqafmfy7BCSIBbVxe8__3MYgXICuVMa-VZs4rH89tICxlqQb90LvN0N0FXcy4LTt5as1y3ks8fco7_-qkt2HC4lF2WjlSHpWzUgPU5tcIG1F0cmLIzJ1Z9vg2RpQwOC7ZvgegZ5rml7TN8xSFBT0YWk48x4VrmquJZKR493YFB9-b5que5dgxeQoc-90KCepTnAp5ynRlfG4m8o9s8zShGhShDpVVmdJoKVJLut8iTxPjtjL4VKtJK7EJt9D7K9oAFBrlKU8vz7QSJNJFIaDBCdhQSEFE1oVVtQTwuVTfithMzrRYqtgsVu4VqQjS_UXFePHeYsjdJLP603f-H7QmsPl1344fb_v0BrNlW9EUprziEWj6ZZUcEWHJ9XLjkFwTt21M |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Confidentiality+attacks+against+encrypted+control+systems&rft.jtitle=Cyber-physical+systems&rft.au=Naseri%2C+Amir+Mohammad&rft.au=Lucia%2C+Walter&rft.au=Youssef%2C+Amr&rft.date=2023-07-03&rft.issn=2333-5777&rft.eissn=2333-5785&rft.volume=9&rft.issue=3&rft.spage=224&rft.epage=243&rft_id=info:doi/10.1080%2F23335777.2022.2051209&rft.externalDBID=n%2Fa&rft.externalDocID=10_1080_23335777_2022_2051209 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2333-5777&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2333-5777&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2333-5777&client=summon |