CFP last date
20 May 2024
Reseach Article

Securing Oil Tank Level Control System against Adversary Attacks using Fuzzy Logic Technique

by P. Enyindah, C. Onukwugha, E.N. Osegi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 184 - Number 6
Year of Publication: 2022
Authors: P. Enyindah, C. Onukwugha, E.N. Osegi
10.5120/ijca2022922017

P. Enyindah, C. Onukwugha, E.N. Osegi . Securing Oil Tank Level Control System against Adversary Attacks using Fuzzy Logic Technique. International Journal of Computer Applications. 184, 6 ( Apr 2022), 30-41. DOI=10.5120/ijca2022922017

@article{ 10.5120/ijca2022922017,
author = { P. Enyindah, C. Onukwugha, E.N. Osegi },
title = { Securing Oil Tank Level Control System against Adversary Attacks using Fuzzy Logic Technique },
journal = { International Journal of Computer Applications },
issue_date = { Apr 2022 },
volume = { 184 },
number = { 6 },
month = { Apr },
year = { 2022 },
issn = { 0975-8887 },
pages = { 30-41 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume184/number6/32335-2022922017/ },
doi = { 10.5120/ijca2022922017 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:20:47.482660+05:30
%A P. Enyindah
%A C. Onukwugha
%A E.N. Osegi
%T Securing Oil Tank Level Control System against Adversary Attacks using Fuzzy Logic Technique
%J International Journal of Computer Applications
%@ 0975-8887
%V 184
%N 6
%P 30-41
%D 2022
%I Foundation of Computer Science (FCS), NY, USA
Abstract

A framework is proposed for a secure industrial process control system for an oil tank using a fuzzified technique in Matlab-Simulink. Specified start messages were encrypted and decrypted using a generic equation in Matlab m-file. Industrial process is simulated using a fuzzy-logic inference system in a Simulink model. There are two inputs to the fuzzy controller: the rate of change of the oil level and the difference between the actual and the required oil levels. The controller uses these inputs to control the inflow rate. A Rule Viewer is used to show dynamically which rule the fuzzy controller is using to set the flow rate. The required oil level is also set dynamically at run-time once the correct decoder equation has been specified. The results of the simulation showed high degree of stability in process variables before and after simulations of adversary attacks on the system.

References
  1. R. L. Krutz, 2006. “Securing SCADA Systems,” Wiley Publishing Inc., Indianapolis.
  2. J. Pollet, 2002. “Developing a Solid SCADA Security Strategy,” Proceedings of the Second ISA/IEEE Sensors for Industry Conference, Houston, USA, pp. 148-156.
  3. J. Caswell, 2011. Survey of Industrial Control Systems Securiy, http://www.cse.wustl.edu/~jain/
  4. Alvaro A. Cárdenas, Saurabh Amin, Shankar Sastry. Secure Control: Towards Survivable Cyber-Physical Systems, the 28th International Conference on Distributed Computing Systems and Workshops University of California, Berkeley.
  5. Parfomak, John Moteff and Paul (2004). Critical Infrastructure and Key Assets: Definition and identification. CRS Report for Congress, USA, CRS-4.
  6. John Moteff, Claudia Copeland, and John Fischer (2003). Critical Infrastructures: What Makes an Infrastructure Critical? : CRS Report for Congress (EEUU), Resources, Science, and Industry Division.
  7. R.Dawson, 2008. Secure Communications for Critical Infrastructure Control Systems. Information Security Institute, Faculty of Information Technology, Queensland University of Technology, Brisbane, Australia.
  8. D.P. Huertas, 2011. Cyber-Security and Safety Analysis of Interconnected Water Tank Control Systems. KTH, School of Electrical Engineering (EES), Automatic Control Electrical Engineering, Stockholm, Sweden.
  9. Z. Zhi, H. Lisheng, (2011). "Performance assessment for the water level control system in steam generator of the nuclear power plant", “IEEE/CCC”. pp. 5842-5847.
  10. Matlab version R2007b, 2007. Mathworks Inc., USA, http://mathworks.com.
  11. M.Bishop (2004).Introduction to Computer Security: Addison Wesley Publishers.
Index Terms

Computer Science
Information Sciences

Keywords

Cyptographic model fuzzified encryption-decryption generic equation oil level adversary attacks