BEGIN:VCALENDAR
VERSION:2.0
PRODID:IEEE vTools.Events//EN
CALSCALE:GREGORIAN
BEGIN:VTIMEZONE
TZID:Asia/Calcutta
BEGIN:STANDARD
DTSTART:19451014T230000
TZOFFSETFROM:+0630
TZOFFSETTO:+0530
TZNAME:IST
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTAMP:20171214T165839Z
UID:F4233D18-E5B6-11E7-833E-0050568D7F66
DTSTART;TZID=Asia/Calcutta:20171127T150000
DTEND;TZID=Asia/Calcutta:20171127T160000
DESCRIPTION:ABSTRACT: Cyber-Physical Systems (CPS) are engineered systems r
 esulting\nfrom a seamless integration between physical processes and cyber
 \ntechnologies such as communication networks and computational hardware.\
 nThis tight integration exposes the CPS to a variety of attacks\, both on\
 nthe physical and cyber components\, which can result in significant\nperf
 ormance degradation. Further\, CPS usually consists of multiple\nagents th
 at collaborate and share information with each other\, thus\nmaking them v
 ulnerable to privacy breach and leakage of confidential\ndata. This talk w
 ill focus on the need\, design and analysis of security\nand privacy mecha
 nisms in CPS.\n\nIn the first part of the talk\, we will present a securit
 y problem for\nreal-time resource-constrained autonomous systems (for exam
 ple\, a UAV)\,\nwhich can reserve only limited computational resources and
  time for\nsecurity and control purposes. In such scenarios\, the control 
 and\nsecurity tasks usually compete with each other for limited resources 
 and\nthere exists a trade-off between security and control performance. We
 \ncharacterise the optimal trade-off and identify attack regimes in which\
 nthe system should prefer control tasks over security tasks\, and vice\nve
 rsa.\n\nThe second part will focus on privacy in cooperative dynamical\nmu
 lti-agent CPS. We present a noise adding differentially private\nmechanism
  to preserve the privacy of agents&#39; state over time\, and\nanalyse the eff
 ect of the privacy mechanism on the system performance.\nNext\, we show th
 at a fundamental trade-off exists between privacy and\ncooperation level\,
  and it is beneficial for the agents to reduce\ncooperation if they want t
 o be more private.\n\nNew Delhi\, Delhi\, India
LOCATION:New Delhi\, Delhi\, India
ORGANIZER:shaunak.sen@ee.iitd.ac.in
SEQUENCE:0
SUMMARY:[Legacy Report] SECURITY AND PRIVACY IN CYBER-PHYSICAL SYSTEMS
URL;VALUE=URI:https://events.vtools.ieee.org/m/155206
X-ALT-DESC:Description: &lt;br /&gt;&lt;p&gt;ABSTRACT:&amp;nbsp\;Cyber-Physical&amp;nbsp\;Syste
 ms&amp;nbsp\;(CPS)&amp;nbsp\;are&amp;nbsp\;engineered&amp;nbsp\;systems&amp;nbsp\;resulting&lt;br
  /&gt;from&amp;nbsp\;a&amp;nbsp\;seamless&amp;nbsp\;integration&amp;nbsp\;between&amp;nbsp\;physi
 cal&amp;nbsp\;processes&amp;nbsp\;and&amp;nbsp\;cyber&lt;br /&gt;technologies&amp;nbsp\;such&amp;nbs
 p\;as&amp;nbsp\;communication&amp;nbsp\;networks&amp;nbsp\;and&amp;nbsp\;computational&amp;nbs
 p\;hardware.&lt;br /&gt;This&amp;nbsp\;tight&amp;nbsp\;integration&amp;nbsp\;exposes&amp;nbsp\;t
 he&amp;nbsp\;CPS&amp;nbsp\;to&amp;nbsp\;a&amp;nbsp\;variety&amp;nbsp\;of&amp;nbsp\;attacks\,&amp;nbsp\
 ;both&amp;nbsp\;on&lt;br /&gt;the&amp;nbsp\;physical&amp;nbsp\;and&amp;nbsp\;cyber&amp;nbsp\;compone
 nts\,&amp;nbsp\;which&amp;nbsp\;can&amp;nbsp\;result&amp;nbsp\;in&amp;nbsp\;significant&lt;br /&gt;p
 erformance&amp;nbsp\;degradation.&amp;nbsp\;Further\,&amp;nbsp\;CPS&amp;nbsp\;usually&amp;nbsp
 \;consists&amp;nbsp\;of&amp;nbsp\;multiple&lt;br /&gt;agents&amp;nbsp\;that&amp;nbsp\;collaborat
 e&amp;nbsp\;and&amp;nbsp\;share&amp;nbsp\;information&amp;nbsp\;with&amp;nbsp\;each&amp;nbsp\;othe
 r\,&amp;nbsp\;thus&lt;br /&gt;making&amp;nbsp\;them&amp;nbsp\;vulnerable&amp;nbsp\;to&amp;nbsp\;priv
 acy&amp;nbsp\;breach&amp;nbsp\;and&amp;nbsp\;leakage&amp;nbsp\;of&amp;nbsp\;confidential&lt;br /&gt;
 data.&amp;nbsp\;This&amp;nbsp\;talk&amp;nbsp\;will&amp;nbsp\;focus&amp;nbsp\;on&amp;nbsp\;the&amp;nbsp
 \;need\,&amp;nbsp\;design&amp;nbsp\;and&amp;nbsp\;analysis&amp;nbsp\;of&amp;nbsp\;security&lt;br 
 /&gt;and&amp;nbsp\;privacy&amp;nbsp\;mechanisms&amp;nbsp\;in&amp;nbsp\;CPS.&lt;/p&gt;\n&lt;p&gt;In&amp;nbsp\;
 the&amp;nbsp\;first&amp;nbsp\;part&amp;nbsp\;of&amp;nbsp\;the&amp;nbsp\;talk\,&amp;nbsp\;we&amp;nbsp\;
 will&amp;nbsp\;present&amp;nbsp\;a&amp;nbsp\;security&amp;nbsp\;problem&amp;nbsp\;for&lt;br /&gt;rea
 l-time&amp;nbsp\;resource-constrained&amp;nbsp\;autonomous&amp;nbsp\;systems&amp;nbsp\;(fo
 r&amp;nbsp\;example\,&amp;nbsp\;a&amp;nbsp\;UAV)\,&lt;br /&gt;which&amp;nbsp\;can&amp;nbsp\;reserve&amp;
 nbsp\;only&amp;nbsp\;limited&amp;nbsp\;computational&amp;nbsp\;resources&amp;nbsp\;and&amp;nbs
 p\;time&amp;nbsp\;for&lt;br /&gt;security&amp;nbsp\;and&amp;nbsp\;control&amp;nbsp\;purposes.&amp;nb
 sp\;In&amp;nbsp\;such&amp;nbsp\;scenarios\,&amp;nbsp\;the&amp;nbsp\;control&amp;nbsp\;and&lt;br /
 &gt;security&amp;nbsp\;tasks&amp;nbsp\;usually&amp;nbsp\;compete&amp;nbsp\;with&amp;nbsp\;each&amp;nb
 sp\;other&amp;nbsp\;for&amp;nbsp\;limited&amp;nbsp\;resources&amp;nbsp\;and&lt;br /&gt;there&amp;nbs
 p\;exists&amp;nbsp\;a&amp;nbsp\;trade-off&amp;nbsp\;between&amp;nbsp\;security&amp;nbsp\;and&amp;n
 bsp\;control&amp;nbsp\;performance.&amp;nbsp\;We&lt;br /&gt;characterise&amp;nbsp\;the&amp;nbsp\
 ;optimal&amp;nbsp\;trade-off&amp;nbsp\;and&amp;nbsp\;identify&amp;nbsp\;attack&amp;nbsp\;regim
 es&amp;nbsp\;in&amp;nbsp\;which&lt;br /&gt;the&amp;nbsp\;system&amp;nbsp\;should&amp;nbsp\;prefer&amp;nb
 sp\;control&amp;nbsp\;tasks&amp;nbsp\;over&amp;nbsp\;security&amp;nbsp\;tasks\,&amp;nbsp\;and&amp;
 nbsp\;vice&lt;br /&gt;versa.&lt;/p&gt;\n&lt;p&gt;The&amp;nbsp\;second&amp;nbsp\;part&amp;nbsp\;will&amp;nbsp
 \;focus&amp;nbsp\;on&amp;nbsp\;privacy&amp;nbsp\;in&amp;nbsp\;cooperative&amp;nbsp\;dynamical&lt;
 br /&gt;multi-agent&amp;nbsp\;CPS.&amp;nbsp\;We&amp;nbsp\;present&amp;nbsp\;a&amp;nbsp\;noise&amp;nbs
 p\;adding&amp;nbsp\;differentially&amp;nbsp\;private&lt;br /&gt;mechanism&amp;nbsp\;to&amp;nbsp\
 ;preserve&amp;nbsp\;the&amp;nbsp\;privacy&amp;nbsp\;of&amp;nbsp\;agents&#39;&amp;nbsp\;state&amp;nbsp\
 ;over&amp;nbsp\;time\,&amp;nbsp\;and&lt;br /&gt;analyse&amp;nbsp\;the&amp;nbsp\;effect&amp;nbsp\;of&amp;
 nbsp\;the&amp;nbsp\;privacy&amp;nbsp\;mechanism&amp;nbsp\;on&amp;nbsp\;the&amp;nbsp\;system&amp;nb
 sp\;performance.&lt;br /&gt;Next\,&amp;nbsp\;we&amp;nbsp\;show&amp;nbsp\;that&amp;nbsp\;a&amp;nbsp\;
 fundamental&amp;nbsp\;trade-off&amp;nbsp\;exists&amp;nbsp\;between&amp;nbsp\;privacy&amp;nbsp\
 ;and&lt;br /&gt;cooperation&amp;nbsp\;level\,&amp;nbsp\;and&amp;nbsp\;it&amp;nbsp\;is&amp;nbsp\;bene
 ficial&amp;nbsp\;for&amp;nbsp\;the&amp;nbsp\;agents&amp;nbsp\;to&amp;nbsp\;reduce&lt;br /&gt;coopera
 tion&amp;nbsp\;if&amp;nbsp\;they&amp;nbsp\;want&amp;nbsp\;to&amp;nbsp\;be&amp;nbsp\;more&amp;nbsp\;pri
 vate.&lt;/p&gt;
END:VEVENT
END:VCALENDAR

