Encryption for motion control systems is very limited

Cybersecurity of networked automation systems is an emerging field of research, with little study of protection for motion control systems. While encryption effectively secures data by encapsulating sensitive information at the communication level, when applied to motion control systems, the increasing multiplicative depth creates overflow (meaning the cipher text can no longer be decrypted back to plain text) and leads to loss of precision and loss of protection. 

Rewrite rules reduce the depth of encryption and improve numeric stability

Expression rewrite rules for encrypted dynamic control schemes reduce the multiplicative depth of somewhat homomorphic encryption and improve numerical stability, translating to increased cybersecurity. This new approach encrypts motion control algorithms, sensor signals, model parameters, feedback and feedforward gains, and performs necessary computation in the ciphertext space to generate motion commands to servo systems without creating a security hole. Information decryption and control signal calculation can be performed and executed inside the plant, but all sensitive system information outside of the plant is always encrypted. 

The topological sorting of algorithms based on associative rewrite rules effectively addresses potential overflow issues.

Solution Advantages
  • Enhanced security: Homomorphic encryption makes it possible to perform calculations on encrypted data, ensuring protection both inside and outside of the plant
  • Tested: The expression rewrite rules reduced the depth from 6 to 4 in the encryption of a computed torque control scheme (also, termed as feedback linearization) of a planar revolute-prismatic manipulator
  • Reduces computing time: Cuts depth of expression by one third, decreasing computing time 
  • Robust: Enables encryption for more complicated mechanical control systems
  • Increased Compatibility: Rewrites translate expressions to be more compatible with leveled homomorphic schemes such as (BFV, BGV, CKKS, etc.)
Potential Commercial Applications
  • Cybersecurity and protection for networked motion-control systems
  • Secure control of robotic systems
  • Privacy-preserved remote health monitoring and automated early diagnostic systems
  • Secure processing of sensitive information
  • Cyber physical systems
  • Networked manufacturing and assembly
  • Autonomous vehicles 
Conventional encrypted communication diagram. B: Encrypted communications control diagram

Security-enhanced networked control. A) Conventional encrypted communication (control scheme computation in plaintext), B) Encrypted control (control scheme computation in ciphertext)

Plaintext space “N” with m1 and m2 blue arrows showing encryption to ciphertext space “N2”.]

Somewhat Homomorphic encryption (SHE)

bottom

The left expression has a node of greater depth, “a,” deeper in the tree. By swapping with “a” shallower node, “c,” node “a” is lifted up, and the total depth is reduced by one.

Original expression showing a depth of five. The rewritten expression showing a depth of four

On the left is the original expression. On the right is the output of the associative rewrite. The circled regions have been swapped with each other in the rewritten circuit. The depth is reduced by one.

A: Dynamic system diagram, B: Control expression formulas, C: Non-optimal expression format with many variations in numbers of levels, D: Rewritten expressions format showing fewer and more evenly balanced levels.

By utilizing the proposed rewrites, control expressions (B) of a dynamic system (A) can be transformed from a non-optimal format (C) to a format more compatible with leveled homomorphic cyphers (D)