control domains of a CPS. The testbed aims at de-
veloping a mechanism that continually and unpre-
dictably changes the parameters of the system. The
goal is to increase the cost of attacking the system,
as well as to limit the exposure of vulnerable com-
ponents and deceive the opponent, i.e., it changes the
attack surface to protect the system. The attack sur-
face of a system can be seen as the subset of resources
that an adversary can use to attack the system.
To be successful, in each reconfiguration period,
the adversary has to (1) build the network topology,
(2) collect network traffic and (3) use this data to learn
the model, for example, using machine learning. The
time required for (1) can be depreciated. However,
Tasks (2) and (3) involve tasks that require in the order
of several minutes to be performed. The time required
for a model switching can be in the order of the sec-
onds to leave enough time to converge the network de-
vices in charge of the packets forwarding. Hence, this
can make the task of the adversary hard to achieve.
5 CONCLUSION
CPS and programmable networks are two comple-
mentary paradigms that are often addressed sepa-
rately by control and computing-network communi-
ties. Both paradigms use similar elements to control
the system and execute corrective actions. In addition,
testbeds are essential to develop and experiment new
security approaches. These approaches help to en-
sure stability and correct the behavior of the system.
This is specially important when the system is un-
der an attack and the inputs are maliciously modified.
Addressing the security testing in CPS, this paper
provides a practical description of an ongoing plat-
form to test resilience approaches considering theo-
retical cyber-physical defense techniques. The archi-
tecture of the testbed is based on real-world compo-
nents to emulate CPS and integrates a programmable
network. One SCADA protocol implementation is in-
cluded within our platform. We used the quadruple-
water tank scenario as the physical process. Also,
we implemented a resilience approach to test the plat-
form. The next steps include a more thorough evalu-
ation of the system performance, the stability, and the
improvement of the resilience produced by the imple-
mented approach.
ACKNOWLEDGEMENTS
We acknowledge support from the Cyber CNI chair
of the Institut Mines-T
´
el
´
ecom and the European
Commission, under grant agreement 830892 (H2020
SPARTA project).
REFERENCES
Bakule, L. (2008). Decentralized control: An overview. An-
nual Reviews in Control, 32(1):87–98.
Barbeau, M., Cuppens, F., Cuppens-Boulahia, N., Dagnas,
R., and Garcia-Alfaro, J. (2021). Resilience estima-
tion of cyber-physical systems via quantitative met-
rics. IEEE Access, PP:1–1.
Campo, P. and Morari, M. (1994). Achievable closed-
loop properties of systems under decentralized con-
trol: conditions involving the steady-state gain. IEEE
Transactions on Automatic Control, 39(5):932–943.
Decarlo, R., Branicky, M., Pettersson, S., and Lennartson,
B. (2000). Perspectives and results on the stability
and stabilizability of hybrid systems. Proceedings of
the IEEE, 88(7):1069–1082.
Garrido, J., V
´
azquez, F., and Morilla, F. (2011). An ex-
tended approach of inverted decoupling. Journal of
Process Control, 21(1):55–68.
Johansson, K. H. (2000). The quadruple-tank process: a
multivariable laboratory process with an adjustable
zero. IEEE Trans. Contr. Sys. Techn., 8:456–465.
Koutsandria, G., Gentz, R., Jamei, M., Scaglione, A.,
Peisert, S., and McParland, C. (2015). A real-time
testbed environment for cyber-physical security on the
power grid. In 1st ACM Workshop on Cyber-Physical
Systems-Security and/or Privacy, pages 67–78. ACM.
Kumari, P. and Anjali, T. (2018). Symmetric-key gener-
ation protocol (sgenp) for body sensor network. In
2018 IEEE International Conference on Communica-
tions Workshops (ICC Workshops), pages 1–6.
Liu, L., Tian, S., Xue, D., Zhang, T., Chen, Y., and Zhang,
S. (2019). A Review of Industrial MIMO Decoupling
Control. International Journal of Control, Automation
and Systems, 17(5):1246–1254.
Rubio-Hernan, J., Rodolfo-Mejias, J., and Garcia-Alfaro, J.
(2016). Security of cyber-physical systems — from
theory to testbeds and validation. In Security of In-
dustrial Control Systems and Cyber-Physical Systems
(CyberICPS 2016), pages 3–18.
Sanders, W. H. (2012). TCIPG: Trustworthy cyber infras-
tructure for the power grid overview. In 2012 IEEE
PES Innovative Smart Grid Technologies (ISGT),
pages 1–2. IEEE.
Segovia-Ferreira, M., Rubio-Hernan, J., Cavalli, R., and
Garcia-Alfaro, J. (2020). Switched-based resilient
control of cyber-physical systems. IEEE Access,
8:212194–212208.
Sivrikaya, F. and Yener, B. (2004). Time synchronization in
sensor networks: a survey. IEEE Network, 18(4):45–
50.
Teixeira, A., Shames, I., Sandberg, H., and Johansson, K. H.
(2015). A secure control framework for resource-
limited adversaries. Automatica, 51:135–148.
SECRYPT 2022 - 19th International Conference on Security and Cryptography
686