Skip to main content

Showing 1–6 of 6 results for author: Koley, I

Searching in archive eess. Search in all archives.
.
  1. arXiv:2408.00341  [pdf, other

    eess.SY cs.CR cs.OS

    Enhancing Attack Resilience in Real-Time Systems through Variable Control Task Sampling Rates

    Authors: Arkaprava Sain, Sunandan Adhikary, Ipsita Koley, Soumyajit Dey

    Abstract: Cyber-physical systems (CPSs) in modern real-time applications integrate numerous control units linked through communication networks, each responsible for executing a mix of real-time safety-critical and non-critical tasks. To ensure predictable timing behaviour, most safety-critical tasks are scheduled with fixed sampling periods, which supports rigorous safety and performance analyses. However,… ▽ More

    Submitted 14 November, 2024; v1 submitted 1 August, 2024; originally announced August 2024.

    Comments: 12 pages including references, Total 10 figures (with 3 having subfigures)

  2. arXiv:2306.09206  [pdf, other

    cs.CR eess.SY

    Concealing CAN Message Sequences to Prevent Schedule-based Bus-off Attacks

    Authors: Sunandan Adhikary, Ipsita Koley, Arkaprava Sain, Soumyadeep das, Shuvam Saha, Soumyajit Dey

    Abstract: This work focuses on eliminating timing-side channels in real-time safety-critical cyber-physical network protocols like Controller Area Networks (CAN). Automotive Electronic Control Units (ECUs) implement predictable scheduling decisions based on task level response time estimation. Such levels of determinism exposes timing information about task executions and therefore corresponding message tra… ▽ More

    Submitted 15 June, 2023; originally announced June 2023.

  3. Exploring The Resilience of Control Execution Skips against False Data Injection Attacks

    Authors: Ipsita Koley, Sunandan Adhikary, Soumyajit Dey

    Abstract: Modern Cyber-Physical Systems (CPSs) are often designed as networked, software-based controller implementations which have been found to be vulnerable to network-level and physical level attacks. A number of research works have proposed CPS-specific attack detection schemes as well as techniques for attack resilient controller design. However, such schemes also incur platform-level overheads. In t… ▽ More

    Submitted 16 July, 2022; originally announced July 2022.

  4. A CAD Framework for Simulation of Network Level Attack on Platoons

    Authors: Ipsita Koley, Sunandan Adhikary, Rohit Rohit, Soumyajit Dey

    Abstract: Recent developments in the smart mobility domain have transformed automobiles into networked transportation agents helping realize new age, large-scale intelligent transportation systems (ITS). The motivation behind such networked transportation is to improve road safety as well as traffic efficiency. In this setup, vehicles can share information about their speed and/or acceleration values among… ▽ More

    Submitted 2 May, 2022; originally announced May 2022.

  5. Skip to Secure: Securing Cyber-physical Control Loops with Intentionally Skipped Executions

    Authors: Sunandan Adhikary, Ipsita Koley, Sumana Ghosh, Saurav Kumar Ghosh, Soumyajit Dey, Debdeep Mukhopadhyay

    Abstract: We consider the problem of provably securing a given control loop implementation in the presence of adversarial interventions on data exchange between plant and controller. Such interventions can be thwarted using continuously operating monitoring systems and also cryptographic techniques, both of which consume network and computational resources. We provide a principled approach for intentional s… ▽ More

    Submitted 16 July, 2020; originally announced July 2020.

    Comments: 9 pages

  6. arXiv:2002.12412  [pdf, ps, other

    cs.CR eess.SY

    Formal Synthesis of Monitoring and Detection Systems for Secure CPS Implementations

    Authors: Ipsita Koley, Saurav Kumar Ghosh, Soumyajit Dey, Debdeep Mukhopadhyay, Amogh Kashyap K N, Sachin Kumar Singh, Lavanya Lokesh, Jithin Nalu Purakkal, Nishant Sinha

    Abstract: We consider the problem of securing a given control loop implementation of a cyber-physical system (CPS) in the presence of Man-in-the-Middle attacks on data exchange between plant and controller over a compromised network. To this end, there exist various detection schemes that provide mathematical guarantees against such attacks for the theoretical control model. However, such guarantees may not… ▽ More

    Submitted 27 February, 2020; originally announced February 2020.

    Comments: 4 Pages, Date 2019 Poster Presentation