Risk-Based Security Measure Allocation Against Actuator Attacks

被引:1
作者
Anand, Sribalaji C. [1 ]
Teixeira, Andre M. H. [2 ]
机构
[1] Uppsala Univ, Dept Elect Engn, SE-75103 Uppsala, Sweden
[2] Uppsala Univ, Dept Informat Technol, Uppsala, Sweden
来源
IEEE OPEN JOURNAL OF CONTROL SYSTEMS | 2023年 / 2卷
基金
瑞典研究理事会;
关键词
Resource management; Security; Actuators; Uncertainty; Uncertain systems; Process control; Detectors; LMIs; networked control systems; optimization; resilient control systems; FRAMEWORK; SYSTEMS;
D O I
10.1109/OJCSYS.2023.3305831
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This article considers the problem of risk-optimal allocation of security measures when the actuators of an uncertain control system are under attack. We consider an adversary injecting false data into the actuator channels. The attack impact is characterized by the maximum performance loss caused by a stealthy adversary with bounded energy. Since the impact is a random variable, due to system uncertainty, we use Conditional Value-at-Risk (CVaR) to characterize the risk associated with the attack. We then consider the problem of allocating security measures to the set of actuators to minimize the risk. We assume that there are only a limited number of security measures available. Under this constraint, we observe that the allocation problem is a mixed-integer optimization problem. Thus we use relaxation techniques to approximate the security allocation problem into a Semi-Definite Program (SDP). We also compare our allocation method $(i)$ across different risk measures: the worst-case measure, the average (nominal) measure, and $(ii)$ across different search algorithms: the exhaustive and the greedy search algorithms. We depict the efficacy of our approach through numerical examples.
引用
收藏
页码:297 / 309
页数:13
相关论文
共 47 条
[1]  
Anand SC, 2022, Arxiv, DOI arXiv:2106.07071
[2]  
Anand SC, 2023, Arxiv, DOI arXiv:2304.02055
[3]   Risk assessment and optimal allocation of security measures under stealthy false data injection attacks [J].
Anand, Sribalaji C. ;
Teixeira, Andre M. H. ;
Ahlen, Anders .
2022 IEEE CONFERENCE ON CONTROL TECHNOLOGY AND APPLICATIONS, CCTA, 2022, :1347-1353
[4]  
Anand SC, 2022, P AMER CONTR CONF, P5037, DOI 10.23919/ACC53348.2022.9867257
[5]   Joint controller and detector design against data injection attacks on actuators [J].
Anand, Sribalaji C. ;
Teixeira, Andre M. H. .
IFAC PAPERSONLINE, 2020, 53 (02) :7439-7445
[6]   A Zero-Sum Game Framework for Optimal Sensor Placement in Uncertain Networked Control Systems under Cyber-Attacks [J].
Anh Tung Nguyen ;
Anand, Sribalaji C. ;
Teixeira, Andre M. H. .
2022 IEEE 61ST CONFERENCE ON DECISION AND CONTROL (CDC), 2022, :6126-6133
[7]  
Beattie S, 2002, USENIX ASSOCIATION PROCEEDINGS OF THE SIXTEENTH SYSTEMS ADMINISTRATION CONFERENCE (LISA XVI), P233
[8]  
Bopardikar SD, 2016, 2016 RESILIENCE WEEK (RWS), P56, DOI 10.1109/RWEEK.2016.7573307
[9]  
Caverly RJ, 2024, Arxiv, DOI arXiv:1903.08599
[10]  
Chong MS, 2019, 2019 18TH EUROPEAN CONTROL CONFERENCE (ECC), P968, DOI [10.23919/ECC.2019.8795652, 10.23919/ecc.2019.8795652]