Press "Enter" to skip to content

ICCAS 2019 Special sessions on Secure control system and Encrypted control

At Oct. 16, during the ICCAS 2019 held in Jeju, Korea, special sessions on secure control system and encrypted control were organized (related link). As the same as the “ICCAS Focused,” which is going to be introduced at ICCAS 2020, it aimed for a kind of single track workshop in which the researchers having common interests get together and share their recent works.

At the first session on secure control system, Prof. Yongsoon Eun (DGIST, Korea) presented about robust and resilient state estimation as well as an overview for the security problems on control systems. Next, Prof. Hyungbo Shim (Seoul National University, Korea) attracted attentions of the audience, by introducing the threats of robust/sampling/enforced zero-dynamics attacks. And, for the last, Prof. Juhoon Back (Kwangwoon University, Korea) presented one of his recent result, with the defender’s perspective, on countermeasures against zero-dynamics attacks, in which generalized holders and samplers are considered so as to prevent the effect of stealthy attacks.

At the second session on encrypted control, Prof. Iman Shames (The University of Melbourne, Australia) introduced the concept and advantage of encrypted control, and then delivered a method for implementing encrypted systems based on the Paillier encryption scheme, which is known as one of the most typical example of partially homomorphic encryption. Next, Prof. Kiminao Kogiso (The University of Electro-Communications, Japan) gave a tutorial on encrypted control as well as experimental validation based on the ElGamal encryption, which is also a well known multiplicatively homomorhpic encryption. For the last, Junsoo Kim (Seoul National University, Korea) concludes the session, presenting a recent result that allows unlimited dynamic control over encrypted data.

The presentation materials are available at http://tinyurl.com/iccas2019secureworld.

One of the most impressive thing was that the focused sessions are followed by an in-depth discussion. For example, after the session on encrypted control, the researchers shared the common motivation and need for the research on homomorphic authentication, aiming for the defense against both the eavesdropping attack and the disruption attack. And, they shared their recent ideas, to improve their current results, by possible collaboration afterwards.

Comments are closed.