IT
Encrypted control technology
Overview
Organization Name
Kiminao KOGISO The University of Electro-Communications
Details
Key Point
- Homomorphic Encryption /Confidential Computation.
- Cyber Security Measures for Automatic Control Systems
- Cyberattack real-time detection
Benefit
Compared to conventional (unencrypted) control algorithms (technologies), the control system can be secure and robust against eavesdropping of communication information and unauthorized access to control devices.
Automatic detection of cyber-attacks such as injection of illegal signals, falsification of control parameters, and replay attacks can be easily performed in real time.
The communication part of the system is independent from communication protocols, which enables the use of secure communication protocols to build a more cybersecure system.
Market Application
- Automatic control systems (medical, robotics, UAV, pharmaceutical, etc)
- Industrial control system (infrastructures, manufacturing aerospace, medicine, etc)
- Outsourcing of control processing (CaaS: Control-as-a-Service)
Publications
- https://drive.google.com/open?id=1bvRR-TiKGXAgiLanXZ_hs-2Lly4fD2oo
- https://drive.google.com/open?id=1MtXQnrLD2qnM_ZlfEl5VXMe6J5kXOH8W
- https://drive.google.com/open?id=1R3QIxd89BngKMytXQKeDVTkt8mKhIvEN
- https://ieeexplore.ieee.org/document/7403296