ABSTRACT
In this paper we consider the integrity attack on Cyber-Physical System(CPS), which is modeled as a discrete linear time-invariant system equipped with a Kalman filter, LQG controller and Χ2 failure detector. An attacker wishes to disturb the system by injecting external control inputs and fake sensor measurements. In order to perform the attack without being detected, the adversary will need to carefully design its actions to fool the failure detector as abnormal sensor measurements will result in an alarm. The adversary's strategy is formulated as a constrained control problem. In this paper, we characterize the reachable set of the system state and estimation error under the attack, which provides a quantitative measure of the resilience of the system. To this end, we will provide an ellipsoidal algorithm to compute the outer approximation of the reachable set. We also prove a necessary condition under which the reachable set is unbounded, indicating that the attacker can successfully destabilize the system.
- S. Amin, A. Cardenas, and S. S. Sastry. Safe and secure networked control systems under denial-of-service attacks. In Hybrid Systems: Computation and Control, pages 31--45. Lecture Notes in Computer Science. Springer Berlin / Heidelberg, April 2009. Google ScholarDigital Library
- A. A. Cárdenas, S. Amin, and S. Sastry. Secure control: Towards survivable cyber-physical systems. In Distributed Computing Systems Workshops, 2008. ICDCS '08. 28th International Conference on, pages 495--500, June 2008. Google ScholarDigital Library
- Y. Liu, M. Reiter, and P. Ning. False data injection attacks against state estimation in electric power grids. In Proceedings of the 16th ACM conference on Computer and communications security, 2009. Google ScholarDigital Library
- Y. Mo, E. Garone, A. Casavola, and B. Sinopoli. False data injection attacks against state estimation in wireless sensor networks. In Proc. 49th IEEE Conf. Decision and Control (CDC), pages 5967--5972, 2010.Google ScholarCross Ref
- Y. Mo and B. Sinopoli. Secure control against replay attacks. In Proc. 47th Annual Allerton Conf. Communication, Control, and Computing Allerton 2009, pages 911--918, 2009. Google ScholarDigital Library
- F. Pasqualetti, A. Bicchi, and F. Bullo. Consensus computation in unreliable networks: A system theoretic approach. IEEE Transactions on Automatic Control, Feb. 2010. To appear.Google Scholar
- H. Sandberg, A. Teixeira, and K. H. Johansson. On security indices for state estimators in power networks. In First Workshop on Secure Control Systems, 2010.Google Scholar
- S. Sundaram, M. Pajic, C. Hadjicostis, R. Mangharam and G. J. Pappas. The wireless control network: monitoring for malicious behavior. In IEEE Conference on Decision and Control, Atlanta, GA, Dec 2010.Google ScholarCross Ref
- L. Xie, Y. Mo, and B. Sinopoli. False data injection attacks in electricity markets. In IEEE Int'l Conf. on Smart Grid Communications (SmartGridComm), pages 226--231, Oct. 2010.Google Scholar
Index Terms
- Integrity attacks on cyber-physical systems
Recommendations
Modeling and control of Cyber-Physical Systems subject to cyber attacks: A survey of recent advances and challenges
Highlights- In general, the cyber-attacks in the literature can be classified into three main types: denial of service (DoS) attacks, deception attacks, and replay ...
AbstractCyber Physical Systems (CPS) are almost everywhere; they can be accessed and controlled remotely. These features make them more vulnerable to cyber attacks. Since these systems provide critical services, having them under attack would ...
Security analysis for cyber-physical systems against stealthy cyber attacks
CERIAS '13: Proceedings of the 14th Annual Information Security SymposiumSecurity of Cyber-Physical Systems (CPS) against cyber attacks is an important yet challenging problem. Since most cyber attacks happen in erratic ways, it is difficult to describe them systematically. In this paper, instead of identifying a specific ...
Developing Models for Physical Attacks in Cyber-Physical Systems
CPS '17: Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and PrivaCyIn this paper, we analyze the security of cyber-physical systems using the ADversary VIew Security Evaluation (ADVISE) meta modeling approach, taking into consideration the effects of physical attacks. To build our model of the system, we construct an ...
Comments