SlideShare a Scribd company logo
December 18 Fri., 2015, 13:30-13:50, Regular Session: Networked Control Systems 2, Frb09.1 @ 1003
Cyber-‐‑‒Security  Enhancements  of  
Networked  Control  Systems  Using  
Homomorphic  Encryption
Kiminao Kogiso
University of Electro-Communications
Tokyo, Japan
Takahiro Fujita
Yokogawa Denshikiki Co., Ltd.
The 54 Conference on Decision and Control
Osaka International Convention Center, Osaka, Japan
December 15 to 18, 2015
Outline
2
Introduction  
Problem  Statement  
Controller  Encryption  
Simulation  &  Validation  
Conclusion
Introduction
3
Controller device is important, but exposed to threats of hacking and targeted attacks.
signals: modeling, stealing recipe, management policy and know-how
parameters: knowledges about system designs and operations
Attacks on networked control system
plantcontroller
ref. (recipe)
control signals
feedback signals
parameters
[1] Sandberg et al., 2015. [2] Sato et al., 2015. [3] Pang et al., 2011
Related works
aiming to conceal the signals
control-theoretical approach: detection[1], positive use of noises[2]
cryptography-based approach: encryption of communication links[3]
no studies considering encryption of the controller or its inside…
control
(cipher)
feedback
(cipher)
EncDec
Enc Dec
plantcontroller
ref.
ref.
(cipher)
Enc Dec
Introduction
4
Objective of this work
Realize a cryptography-based control law to conceal both the signals & parameters.
control
(cipher)
feedback
(cipher)
EncDec
Enc Dec
plantcontroller
ref.
ref.
(cipher)
Enc Dec
conventional:
control
(cipher)
feedback
(cipher)
Enc
Dec
plantencrypted
controller
ref.
ref.
(cipher)
Enc
parameters
(cipher)
proposed:
Concept of encrypted controller:
calculates an encrypted control directly from an encrypted feedback signal & an encrypted
reference using encrypted parameters,
is achieved by incorporating homomorphic encryption scheme into the control law.
Problem Statement
5
Encryption of linear controller
Consider a linear controller: f
Controller Encryption Problem:
Given an encryption scheme , for a control law realize an encrypted law .fE fE
Define an encrypted control law , given an encryption scheme , satisfyingfE E

x[k + 1]
u[k]
=

A B
C D

x[k]
y[k]
:= ⇠[k] := f( , ⇠[k])
: parameter matrix
: plant output
: control inputu
y
5
control
(cipher)
feedback
(cipher)
Enc
Dec
plant
parameters
(cipher)
Enc(y)
Enc(u) u
y
Enc( )
fE (Enc( ), Enc(⇠))
fE (Enc( ), Enc(⇠)) = Enc(f( , ⇠))
RSA encryption[4,5] (deterministic) & ElGamal encryption[6] (stochastic)
ElGamal encryption scheme[4]
key generation: public , and private (random)
encryption:
decryption:
Controller Encryption 1/3
6[4] Rivest, “A Method for Obtaining Digital Signatures and Public-Key Cryptosystem”, 1978. [5] Rivest, “On Data Banks and Privacy Homomorphisms”, 1978.
Homomorphic encryption schemes
RSA: Rivest-Shamir-Adelman
Dec(c1, c2) = c2 ⇥ c s
1 mod p
g, p, s 2 N(g, p) s
r 2 N:  randomEnc(m) = (gr
mod p, m ⇥ gsr
mod p)
= c1 = c2 m: integer in plaintext space
: integer in ciphertext spacec1, c2
Homomorphism
definition
Enc(m1 • m2) = Enc(m1) ⇤ Enc(m2)
in the case of ElGamal
·: multiplication ⇤ : modulo operation
plaintext  
space
ciphertext  
space
m1
m2
⇥
⇥
⇥
m2•m1
⇥
⇥
⇥
Enc(m1)
Enc(m2)
N N2
Enc
Enc
Enc
Controller Encryption 2/3
7
Idea for controller encryption
Divide the linear operation to apply the homomorphism.
f = f+
f⇥
f⇥
( , ⇠) =
⇥
1⇠1 2⇠2 · · · L⇠L
⇤
=:
←  executed  after  the  decryption
←  executed  in  the  controller  device
modification of the decryption process to update the decryption algorithm with “Dec+
”.
Dec+
Configuration using ElGamal encryption scheme
signals
(cipher)
feedback
(cipher)
Enc
Dec
plant
parameters
(cipher)
Enc( )
Enc( )
f+
f⇥
Enc(⇠)
x[k + 1]
u[k]
⇠
fE (Enc( ), Enc(⇠))
f+
( ) =
LX
l=1
l
with and sufficient large, rounding (quantization) error can be made small.a
encrypted
controller
u[k]
y[k]
Enc
Enc(KpM)
Enc(yM[k])
Enc(uM[k])
a 2
yM[k]
uM[k]
ba•e
plant
Dec+
n
Controller Encryption 3/3
8
a 2 N
b•e : round function
KpM = ba ⇥ Kpe
yM[k] = ba ⇥ y[k]e
uM[k] = KpMyM[k]
Kp
y[k]
u[k] = Kpy[k]
example: , then .Kp = 0.83, a = 1000 KpM = b1000 ⇥ 0.83e = 830
Remarks
Signals & parameters are real; Plaintext is integer.
need a map: multiplying by a natural number and rounding off to an integer, i.e.,
Simulation: Controller Encryption
9
(key length 25bit)
Things seen in controller
encrypted
controller
normal:
proposed:
u[k]
y[k]
controller
n = 67108913 g = 3
Enc( )
=
2
4
1 0.0063 0
0 0.3678 0.0063
10 99.90 3
3
5
=

Enc(x[k])
Enc(y[k])
Enc(⇠[k])
Enc( [k])
0 1 2 3 4 5
-3
-2
-1
0
1
0 1 2 3 4 5
-0.5
0
0.5
1
1.5
time [s] time [s]
control output
0 1 2 3 4 5
time [s]
0
1
2
3
4
× 107
0 1 2 3 4 5
time [s]
0
1
2
3
4
× 107
0 1 2 3 4 5
time [s]
0
1
2
3
4
× 107
0 1 2 3 4 5
time [s]
0
1
2
3
4
× 107
0 1 2 3 4 5
time [s]
0
1
2
3
4
× 107
0 1 2 3 4 5
time [s]
0
1
2
3
4
× 107
0 1 2 3 4 5
0
1
2
3
4
× 107
0 1 2 3 4 5
0
1
2
3
4
× 107
6 signals related to control
2 signals related to output
0 1 2 3 4 5
-0.5
0
0.5
1
1.5
0 1 2 3 4 5
-3
-2
-1
0
1
Enc( )2 =
2
4
14170023 24305287 4114472
24817983 26559389 33379406
29922594 31813162 24125985
3
5
Enc( )1 =
2
4
16354115 11333831 12428094
25939844 22437363 17650745
23018684 228286 8037052
3
5
Validation: Protection from Stealing
10
System identification (n4sid)
-150
-100
-50
0
50
10-2
100
102
-270
-225
-180
-135
-90
-45
0
frequency [rad/s]
gain[dB]phase[deg]
original closed loop system
without encryption
with encryption(RSA)
with encryption(ElGamal)
Conclusion
11
Introduction
Problem Statement
controller encryption problem
Encrypted Controller
homomorphism of specific encryption scheme
remarks in quantization error
Simulation & Validation
enable to conceal signals & parameters inside
the controller device in terms of cryptography.
enable to hide dynamics of the control system.
Future works
incorporate an attack detection method.
validate computation cost of encrypted controller.
-150
-100
-50
0
50
10-2
100
102
-270
-225
-180
-135
-90
-45
0
frequency [rad/s]
gain[dB]phase[deg]
original closed loop system
without encryption
with encryption(RSA)
with encryption(ElGamal)
0 1 2 3 4 5
time [s]
0
1
2
3
4
× 107
0 1 2 3 4 5
time [s]
0
1
2
3
4
× 107
0 1 2 3 4 5
time [s]
0
1
2
3
4
× 107
0 1 2 3 4 5
time [s]
0
1
2
3
4
× 107
0 1 2 3 4 5
time [s]
0
1
2
3
4
× 107
0 1 2 3 4 5
time [s]
0
1
2
3
4
× 107
0 1 2 3 4 5
0
1
2
3
4
× 107
0 1 2 3 4 5
0
1
2
3
4
× 107

More Related Content

PDF
Controller encryption using RSA public-key encryption scheme (Asian Control C...
PDF
A Methodology for Automatic GPU Kernel Optimization - NECSTTechTalk 4/06/2020
PDF
Be cps-18 cps13or23-module1
PPT
ppt on Time Domain and Frequency Domain Analysis
PDF
Crack Wep Wifi Under100seconds
PDF
Brace yourselves, leap second is coming
PPTX
Secured algorithm for gsm encryption & decryption
Controller encryption using RSA public-key encryption scheme (Asian Control C...
A Methodology for Automatic GPU Kernel Optimization - NECSTTechTalk 4/06/2020
Be cps-18 cps13or23-module1
ppt on Time Domain and Frequency Domain Analysis
Crack Wep Wifi Under100seconds
Brace yourselves, leap second is coming
Secured algorithm for gsm encryption & decryption

Viewers also liked (6)

PDF
Transition Models of Equilibrium Assessment in Bayesian Game
PPTX
Homomorphic Encryption
PDF
Homomorphic encryption in_cloud
PPTX
Homomorphic Encryption
PPTX
Partial Homomorphic Encryption
PPTX
Homomorphic encryption
Transition Models of Equilibrium Assessment in Bayesian Game
Homomorphic Encryption
Homomorphic encryption in_cloud
Homomorphic Encryption
Partial Homomorphic Encryption
Homomorphic encryption
Ad

Similar to Cyber-Security Enhancements of Networked Control Systems Using Homomorphic Encryption (20)

PDF
F010243136
PDF
Data Security Using Elliptic Curve Cryptography
PDF
Implementation of RSA Algorithm with Chinese Remainder Theorem for Modulus N ...
PDF
One to many (new scheme for symmetric cryptography)
PPTX
cryptography
PPTX
EEG, MEG and FieldTrip
PDF
D44091720
PDF
Cryptosystem An Implementation of RSA Using Verilog
PPTX
Lattice based Merkle for post-quantum epoch
PPT
CS8451 - Design and Analysis of Algorithms
PDF
New Technique Using Multiple Symmetric keys for Multilevel Encryption
PDF
Fast and Precise Symbolic Analysis of Concurrency Bugs in Device Drivers
PPT
DIT-Radix-2-FFT in SPED
PPT
ch09_rsa_nemo.ppt
PPT
Unit --3.ppt
PPT
Design and Analysis of Algorithm Fundamental
PDF
Presentation Slides - Genetic algorithm based key generation for fully homomo...
PPT
WiFi Security Explained
F010243136
Data Security Using Elliptic Curve Cryptography
Implementation of RSA Algorithm with Chinese Remainder Theorem for Modulus N ...
One to many (new scheme for symmetric cryptography)
cryptography
EEG, MEG and FieldTrip
D44091720
Cryptosystem An Implementation of RSA Using Verilog
Lattice based Merkle for post-quantum epoch
CS8451 - Design and Analysis of Algorithms
New Technique Using Multiple Symmetric keys for Multilevel Encryption
Fast and Precise Symbolic Analysis of Concurrency Bugs in Device Drivers
DIT-Radix-2-FFT in SPED
ch09_rsa_nemo.ppt
Unit --3.ppt
Design and Analysis of Algorithm Fundamental
Presentation Slides - Genetic algorithm based key generation for fully homomo...
WiFi Security Explained
Ad

More from Kiminao Kogiso (9)

PDF
Parameterization of Equilibrium Assessment in Bayesian Game with Its Applicat...
PDF
Player's Belief Estimation for Super Human Sports
PDF
Hybrid Nonlinear Model of McKibben Pneumatic Artificial Muscle Systems Incorp...
PDF
Application of ElGamal Encryption Scheme to Control System for Security Enhan...
PDF
Considerations on model predictive control of McKibben pneumatic artificial m...
PDF
Estimating Player's Belief in Bayesian Game by Feedback Control
PDF
Modeling of McKibben pneumatic artificial muscle system using pressure-depend...
PDF
Experimental Validation of McKibben Pneumatic Artificial Muscle Model
PDF
Identification Procedure for McKibben Pneumatic Artificial Muscle Systems
Parameterization of Equilibrium Assessment in Bayesian Game with Its Applicat...
Player's Belief Estimation for Super Human Sports
Hybrid Nonlinear Model of McKibben Pneumatic Artificial Muscle Systems Incorp...
Application of ElGamal Encryption Scheme to Control System for Security Enhan...
Considerations on model predictive control of McKibben pneumatic artificial m...
Estimating Player's Belief in Bayesian Game by Feedback Control
Modeling of McKibben pneumatic artificial muscle system using pressure-depend...
Experimental Validation of McKibben Pneumatic Artificial Muscle Model
Identification Procedure for McKibben Pneumatic Artificial Muscle Systems

Recently uploaded (20)

PPTX
Sustainable Sites - Green Building Construction
PPT
Project quality management in manufacturing
PDF
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
PPTX
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
PPTX
bas. eng. economics group 4 presentation 1.pptx
DOCX
573137875-Attendance-Management-System-original
PPTX
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
PPTX
Geodesy 1.pptx...............................................
PPTX
Construction Project Organization Group 2.pptx
PDF
Digital Logic Computer Design lecture notes
PDF
R24 SURVEYING LAB MANUAL for civil enggi
DOCX
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
PPTX
Current and future trends in Computer Vision.pptx
PDF
PPT on Performance Review to get promotions
PPTX
CH1 Production IntroductoryConcepts.pptx
PDF
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
PPTX
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
PPTX
Foundation to blockchain - A guide to Blockchain Tech
PPTX
Artificial Intelligence
Sustainable Sites - Green Building Construction
Project quality management in manufacturing
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
CYBER-CRIMES AND SECURITY A guide to understanding
bas. eng. economics group 4 presentation 1.pptx
573137875-Attendance-Management-System-original
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
Geodesy 1.pptx...............................................
Construction Project Organization Group 2.pptx
Digital Logic Computer Design lecture notes
R24 SURVEYING LAB MANUAL for civil enggi
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
Current and future trends in Computer Vision.pptx
PPT on Performance Review to get promotions
CH1 Production IntroductoryConcepts.pptx
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
Foundation to blockchain - A guide to Blockchain Tech
Artificial Intelligence

Cyber-Security Enhancements of Networked Control Systems Using Homomorphic Encryption

  • 1. December 18 Fri., 2015, 13:30-13:50, Regular Session: Networked Control Systems 2, Frb09.1 @ 1003 Cyber-‐‑‒Security  Enhancements  of   Networked  Control  Systems  Using   Homomorphic  Encryption Kiminao Kogiso University of Electro-Communications Tokyo, Japan Takahiro Fujita Yokogawa Denshikiki Co., Ltd. The 54 Conference on Decision and Control Osaka International Convention Center, Osaka, Japan December 15 to 18, 2015
  • 2. Outline 2 Introduction   Problem  Statement   Controller  Encryption   Simulation  &  Validation   Conclusion
  • 3. Introduction 3 Controller device is important, but exposed to threats of hacking and targeted attacks. signals: modeling, stealing recipe, management policy and know-how parameters: knowledges about system designs and operations Attacks on networked control system plantcontroller ref. (recipe) control signals feedback signals parameters [1] Sandberg et al., 2015. [2] Sato et al., 2015. [3] Pang et al., 2011 Related works aiming to conceal the signals control-theoretical approach: detection[1], positive use of noises[2] cryptography-based approach: encryption of communication links[3] no studies considering encryption of the controller or its inside… control (cipher) feedback (cipher) EncDec Enc Dec plantcontroller ref. ref. (cipher) Enc Dec
  • 4. Introduction 4 Objective of this work Realize a cryptography-based control law to conceal both the signals & parameters. control (cipher) feedback (cipher) EncDec Enc Dec plantcontroller ref. ref. (cipher) Enc Dec conventional: control (cipher) feedback (cipher) Enc Dec plantencrypted controller ref. ref. (cipher) Enc parameters (cipher) proposed: Concept of encrypted controller: calculates an encrypted control directly from an encrypted feedback signal & an encrypted reference using encrypted parameters, is achieved by incorporating homomorphic encryption scheme into the control law.
  • 5. Problem Statement 5 Encryption of linear controller Consider a linear controller: f Controller Encryption Problem: Given an encryption scheme , for a control law realize an encrypted law .fE fE Define an encrypted control law , given an encryption scheme , satisfyingfE E  x[k + 1] u[k] =  A B C D  x[k] y[k] := ⇠[k] := f( , ⇠[k]) : parameter matrix : plant output : control inputu y 5 control (cipher) feedback (cipher) Enc Dec plant parameters (cipher) Enc(y) Enc(u) u y Enc( ) fE (Enc( ), Enc(⇠)) fE (Enc( ), Enc(⇠)) = Enc(f( , ⇠))
  • 6. RSA encryption[4,5] (deterministic) & ElGamal encryption[6] (stochastic) ElGamal encryption scheme[4] key generation: public , and private (random) encryption: decryption: Controller Encryption 1/3 6[4] Rivest, “A Method for Obtaining Digital Signatures and Public-Key Cryptosystem”, 1978. [5] Rivest, “On Data Banks and Privacy Homomorphisms”, 1978. Homomorphic encryption schemes RSA: Rivest-Shamir-Adelman Dec(c1, c2) = c2 ⇥ c s 1 mod p g, p, s 2 N(g, p) s r 2 N:  randomEnc(m) = (gr mod p, m ⇥ gsr mod p) = c1 = c2 m: integer in plaintext space : integer in ciphertext spacec1, c2 Homomorphism definition Enc(m1 • m2) = Enc(m1) ⇤ Enc(m2) in the case of ElGamal ·: multiplication ⇤ : modulo operation plaintext   space ciphertext   space m1 m2 ⇥ ⇥ ⇥ m2•m1 ⇥ ⇥ ⇥ Enc(m1) Enc(m2) N N2 Enc Enc Enc
  • 7. Controller Encryption 2/3 7 Idea for controller encryption Divide the linear operation to apply the homomorphism. f = f+ f⇥ f⇥ ( , ⇠) = ⇥ 1⇠1 2⇠2 · · · L⇠L ⇤ =: ←  executed  after  the  decryption ←  executed  in  the  controller  device modification of the decryption process to update the decryption algorithm with “Dec+ ”. Dec+ Configuration using ElGamal encryption scheme signals (cipher) feedback (cipher) Enc Dec plant parameters (cipher) Enc( ) Enc( ) f+ f⇥ Enc(⇠) x[k + 1] u[k] ⇠ fE (Enc( ), Enc(⇠)) f+ ( ) = LX l=1 l
  • 8. with and sufficient large, rounding (quantization) error can be made small.a encrypted controller u[k] y[k] Enc Enc(KpM) Enc(yM[k]) Enc(uM[k]) a 2 yM[k] uM[k] ba•e plant Dec+ n Controller Encryption 3/3 8 a 2 N b•e : round function KpM = ba ⇥ Kpe yM[k] = ba ⇥ y[k]e uM[k] = KpMyM[k] Kp y[k] u[k] = Kpy[k] example: , then .Kp = 0.83, a = 1000 KpM = b1000 ⇥ 0.83e = 830 Remarks Signals & parameters are real; Plaintext is integer. need a map: multiplying by a natural number and rounding off to an integer, i.e.,
  • 9. Simulation: Controller Encryption 9 (key length 25bit) Things seen in controller encrypted controller normal: proposed: u[k] y[k] controller n = 67108913 g = 3 Enc( ) = 2 4 1 0.0063 0 0 0.3678 0.0063 10 99.90 3 3 5 =  Enc(x[k]) Enc(y[k]) Enc(⇠[k]) Enc( [k]) 0 1 2 3 4 5 -3 -2 -1 0 1 0 1 2 3 4 5 -0.5 0 0.5 1 1.5 time [s] time [s] control output 0 1 2 3 4 5 time [s] 0 1 2 3 4 × 107 0 1 2 3 4 5 time [s] 0 1 2 3 4 × 107 0 1 2 3 4 5 time [s] 0 1 2 3 4 × 107 0 1 2 3 4 5 time [s] 0 1 2 3 4 × 107 0 1 2 3 4 5 time [s] 0 1 2 3 4 × 107 0 1 2 3 4 5 time [s] 0 1 2 3 4 × 107 0 1 2 3 4 5 0 1 2 3 4 × 107 0 1 2 3 4 5 0 1 2 3 4 × 107 6 signals related to control 2 signals related to output 0 1 2 3 4 5 -0.5 0 0.5 1 1.5 0 1 2 3 4 5 -3 -2 -1 0 1 Enc( )2 = 2 4 14170023 24305287 4114472 24817983 26559389 33379406 29922594 31813162 24125985 3 5 Enc( )1 = 2 4 16354115 11333831 12428094 25939844 22437363 17650745 23018684 228286 8037052 3 5
  • 10. Validation: Protection from Stealing 10 System identification (n4sid) -150 -100 -50 0 50 10-2 100 102 -270 -225 -180 -135 -90 -45 0 frequency [rad/s] gain[dB]phase[deg] original closed loop system without encryption with encryption(RSA) with encryption(ElGamal)
  • 11. Conclusion 11 Introduction Problem Statement controller encryption problem Encrypted Controller homomorphism of specific encryption scheme remarks in quantization error Simulation & Validation enable to conceal signals & parameters inside the controller device in terms of cryptography. enable to hide dynamics of the control system. Future works incorporate an attack detection method. validate computation cost of encrypted controller. -150 -100 -50 0 50 10-2 100 102 -270 -225 -180 -135 -90 -45 0 frequency [rad/s] gain[dB]phase[deg] original closed loop system without encryption with encryption(RSA) with encryption(ElGamal) 0 1 2 3 4 5 time [s] 0 1 2 3 4 × 107 0 1 2 3 4 5 time [s] 0 1 2 3 4 × 107 0 1 2 3 4 5 time [s] 0 1 2 3 4 × 107 0 1 2 3 4 5 time [s] 0 1 2 3 4 × 107 0 1 2 3 4 5 time [s] 0 1 2 3 4 × 107 0 1 2 3 4 5 time [s] 0 1 2 3 4 × 107 0 1 2 3 4 5 0 1 2 3 4 × 107 0 1 2 3 4 5 0 1 2 3 4 × 107