File Download

There are no files associated with this item.

  • Find it @ UNIST can give you direct access to the published full text of this article. (UNISTARs only)
Related Researcher

김미란

Kim, Miran
Applied Cryptography Lab.
Read More

Views & Downloads

Detailed Information

Cited time in webofscience Cited time in scopus
Metadata Downloads

Full metadata record

DC Field Value Language
dc.citation.conferencePlace JA -
dc.citation.title IFAC Workshop on Distributed Estimation and Control in Networked Systems -
dc.contributor.author Kim, Junsoo -
dc.contributor.author Lee, Chanhwa -
dc.contributor.author Shim, Hyungbo -
dc.contributor.author Cheon, Jung Hee -
dc.contributor.author Kim, Andrey -
dc.contributor.author Kim, Miran -
dc.contributor.author Song, Yongsoo -
dc.date.accessioned 2023-12-19T20:09:31Z -
dc.date.available 2023-12-19T20:09:31Z -
dc.date.created 2020-09-11 -
dc.date.issued 2016-09-08 -
dc.description.abstract In order to enhance security of cyber-physical systems, it is important to protect the signals from sensors to the controller, and from the controller to the actuator, because the attackers often steal and compromise those signals. One immediate solution could be encrypting the signals, but in order to perform computation in the controller, they should be decrypted before computation and encrypted again after computation. For this, the controller keeps the secret key, which in turn increases vulnerability from the attacker. In this paper, we introduce the fully homomorphic encryption (FHE), which is an advanced cryptography that has enabled arithmetic operations directly on the encrypted variables without decryption. However, this also introduces several new issues that have not been studied for conventional controllers. Most of all, an encrypted variable has a finite lifespan, which decreases as an arithmetic operation is performed on it. Our solution is to run multiple controllers, and orchestrate them systematically. Also, in order to slow down the decrease of the lifespan, a tree-based computation of sequential matrix multiplication is introduced. We finally demonstrate the effectiveness of the proposed algorithm with quadruple water tank example. -
dc.identifier.bibliographicCitation IFAC Workshop on Distributed Estimation and Control in Networked Systems -
dc.identifier.doi 10.1016/j.ifacol.2016.10.392 -
dc.identifier.uri https://scholarworks.unist.ac.kr/handle/201301/48454 -
dc.language 영어 -
dc.publisher IFAC -
dc.title Encrypting Controller using Fully Homomorphic Encryption for Security of Cyber-Physical Systems -
dc.type Conference Paper -
dc.date.conferenceDate 2020-09-08 -

qrcode

Items in Repository are protected by copyright, with all rights reserved, unless otherwise indicated.