Almost sure detection of the presence of malicious components in cyber-physical systems

被引:1
作者
Das, Souvik [1 ]
Dey, Priyanka [2 ]
Chatterjee, Debasish [1 ]
机构
[1] Indian Inst Technol, Syst & Control Engn, Mumbai 400076, India
[2] Tokyo Inst Technol, Dept Syst & Control Engn, Tokyo 1528550, Japan
关键词
Cyber-physical system; Dynamic watermark; Cyber security; Randomized policy;
D O I
10.1016/j.automatica.2024.111789
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This article studies a fundamental problem of security of cyber-physical systems (CPSs): that of detecting, almost surely, the presence of malicious components in the CPS. We assume that some of the actuators may be malicious while all sensors are honest . We introduce a novel idea of separability of state trajectories generated by CPSs in two situations: those under the nominal no -attack situation and those under the influence of an attacker. We establish its connection to the security of CPSs, particularly in detecting the presence of malicious actuators (if any) in them. As primary contributions, we establish necessary and sufficient conditions for the aforementioned detection in CPSs modeled as Markov decision processes (MDPs). Moreover, we focus on the mechanism of perturbing the pre-determined control policies of the honest agents in CPSs modeled as stochastic linear systems, by injecting a certain class of random process called private excitation ; sufficient conditions for detectability and non-detectability of the presence of malicious actuators, assuming that the policies are randomized history-dependent and randomized Markovian, are established. Several technical aspects of our results are discussed extensively . (c) 2024 Elsevier Ltd. All rights are reserved, including those for text and data mining, AI training, and similar technologies.
引用
收藏
页数:11
相关论文
共 32 条
[1]   DISCRETE-TIME CONTROLLED MARKOV-PROCESSES WITH AVERAGE COST CRITERION - A SURVEY [J].
ARAPOSTATHIS, A ;
BORKAR, VS ;
FERNANDEZGAUCHERAND, E ;
GHOSH, MK ;
MARCUS, SI .
SIAM JOURNAL ON CONTROL AND OPTIMIZATION, 1993, 31 (02) :282-344
[2]  
Das S, 2023, Arxiv, DOI [arXiv:2306.12516, 10.1016/j.automatica.2024.111789, DOI 10.1016/J.AUTOMATICA.2024.111789]
[3]  
Furstenberg, 1967, Math. Systems Theory, V1, P1, DOI DOI 10.1007/BF01692494
[4]   A Survey of Physics-Based Attack Detection in Cyber-Physical Systems [J].
Giraldo, Jairo ;
Urbina, David ;
Cardenas, Alvaro ;
Valente, Junia ;
Faisal, Mustafa ;
Ruths, Justin ;
Tippenhauer, Nils Ole ;
Sandberg, Henrik ;
Candell, Richard .
ACM COMPUTING SURVEYS, 2018, 51 (04)
[5]  
Goyal R, 2022, Arxiv, DOI arXiv:2209.06267
[6]  
Hernandez-Lerma O., 2012, Discrete-Time Markov Control Processes: Basic Optimality Criteria, V30, pxi
[7]  
Hespanhol P, 2018, P AMER CONTR CONF, P5467, DOI 10.23919/ACC.2018.8431569
[8]  
Hespanhol P, 2017, IEEE DECIS CONTR P, DOI 10.1109/CDC.2017.8263914
[9]  
Horn R.A., 2012, Matrix Analysis
[10]  
Hosseini M, 2016, 2016 EUROPEAN CONTROL CONFERENCE (ECC), P2258, DOI 10.1109/ECC.2016.7810627