Cybersecurity of networked automation systems is an emerging field of research, with little study of protection for motion control systems. While encryption effectively secures data by encapsulating sensitive information at the communication level, when applied to motion control systems, the increasing multiplicative depth creates overflow (meaning the cipher text can no longer be decrypted back to plain text) and leads to loss of precision and loss of protection.
Rewrite rules reduce the depth of encryption and improve numeric stability
Expression rewrite rules for encrypted dynamic control schemes reduce the multiplicative depth of somewhat homomorphic encryption and improve numerical stability, translating to increased cybersecurity. This new approach encrypts motion control algorithms, sensor signals, model parameters, feedback and feedforward gains, and performs necessary computation in the ciphertext space to generate motion commands to servo systems without creating a security hole. Information decryption and control signal calculation can be performed and executed inside the plant, but all sensitive system information outside of the plant is always encrypted.
The topological sorting of algorithms based on associative rewrite rules effectively addresses potential overflow issues.
- Enhanced security: Homomorphic encryption makes it possible to perform calculations on encrypted data, ensuring protection both inside and outside of the plant
- Tested: The expression rewrite rules reduced the depth from 6 to 4 in the encryption of a computed torque control scheme (also, termed as feedback linearization) of a planar revolute-prismatic manipulator
- Reduces computing time: Cuts depth of expression by one third, decreasing computing time
- Robust: Enables encryption for more complicated mechanical control systems
- Increased Compatibility: Rewrites translate expressions to be more compatible with leveled homomorphic schemes such as (BFV, BGV, CKKS, etc.)
- Cybersecurity and protection for networked motion-control systems
- Secure control of robotic systems
- Privacy-preserved remote health monitoring and automated early diagnostic systems
- Secure processing of sensitive information
- Cyber physical systems
- Networked manufacturing and assembly
- Autonomous vehicles