Private matching and set intersection computation in multi-agent and industrial control systems

Amar Rasheed, A. Kenneth, Rabi Mahapatra, Deepak Puthal

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

3 Scopus citations

Abstract

Distributed autonomous systems that rely on dataset matching and set intersection computation for decision making capabilities are vulnerable to datasets poisoning attacks. Among these systems, Industrial Control Systems (ICS) operating on critical infrastructures. Attacker with a compromised Programmable Logic Controllers (PLCs) can take advantage of the PLC-to-PLC information sharing process to construct and inject anomalous data that target the result of dataset matching and set intersection computation and hence bring the process operations into unstable state. We introduce a protocol that utilizes secure hamming distance computation from oblivious transfer to compute a joint set between two system's agents that hold private input datasets of length n. The proposed protocol achieves full security in the semi-honest model.

Original languageBritish English
Title of host publicationProceedings of the 12th Annual Cyber and Information Security Research Conference, CISRC 2017
ISBN (Electronic)9781450348553
DOIs
StatePublished - 4 Apr 2017
Event12th Annual Cyber and Information Security Research Conference, CISRC 2017 - Oak Ridge, United States
Duration: 4 Apr 20176 Apr 2017

Publication series

NameACM International Conference Proceeding Series

Conference

Conference12th Annual Cyber and Information Security Research Conference, CISRC 2017
Country/TerritoryUnited States
CityOak Ridge
Period4/04/176/04/17

Keywords

  • Hamming distance
  • Oblivious transfer
  • Private matching
  • SCADA

Fingerprint

Dive into the research topics of 'Private matching and set intersection computation in multi-agent and industrial control systems'. Together they form a unique fingerprint.

Cite this