Risk Assessment of Stealthy Attacks on Uncertain Control Systems

被引:0
作者
Anand, Sribalaji C. [1 ]
Teixeira, Andre M. H. [1 ,2 ]
Ahlen, Anders
机构
[1] Uppsala Univ, Dept Elect Engn, S-75103 Uppsala, Sweden
[2] Uppsala Univ, Dept Informat Technol, S-75105 Uppsala, Sweden
关键词
Optimization; risk analysis; security; uncertainty; OPTIMIZATION; DESIGN;
D O I
10.1109/TAC.2023.3318194
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this article, we address the problem of risk assessment of stealthy attacks on uncertain control systems. Considering the data injection attacks that aim at maximizing the impact while remaining undetected, we use the recently proposed output-to-output gain to characterize the risk associated with the impact of attacks under a limited system knowledge attacker. The risk is formulated using a well-established risk metric, namely the maximum expected loss. Under this setup, the risk assessment problem corresponds to an untractable infinite nonconvex optimization problem. To address this limitation, we adopt the framework of scenario-based optimization to approximate the infinite nonconvex optimization problem by a sampled nonconvex optimization problem. Then, based on the framework of dissipative system theory and S-procedure, the sampled nonconvex risk assessment problem is formulated as an equivalent convex semidefinite program. Additionally, we derive the necessary and sufficient conditions for the risk to be bounded. Finally, we illustrate the results through numerical simulation of a hydro-turbine power system.
引用
收藏
页码:3214 / 3221
页数:8
相关论文
共 27 条
[1]   Risk-Averse Control via CVaR Barrier Functions: Application to Bipedal Robot Locomotion [J].
Ahmadi, Mohamadreza ;
Xiong, Xiaobin ;
Ames, Aaron D. .
IEEE CONTROL SYSTEMS LETTERS, 2022, 6 :878-883
[2]  
Anand SC, 2022, Arxiv, DOI arXiv:2106.07071
[3]   Joint controller and detector design against data injection attacks on actuators [J].
Anand, Sribalaji C. ;
Teixeira, Andre M. H. .
IFAC PAPERSONLINE, 2020, 53 (02) :7439-7445
[4]   Robust convex optimization [J].
Ben-Tal, A ;
Nemirovski, A .
MATHEMATICS OF OPERATIONS RESEARCH, 1998, 23 (04) :769-805
[5]  
Bopardikar SD, 2016, 2016 RESILIENCE WEEK (RWS), P56, DOI 10.1109/RWEEK.2016.7573307
[6]   A General Scenario Theory for Nonconvex Optimization and Decision Making [J].
Campi, Marco Claudio ;
Garatti, Simone ;
Ramponi, Federico Alessandro .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2018, 63 (12) :4067-4078
[7]  
Cardenas A. A., 2011, P 6 ACM S INF COMP C, P355, DOI DOI 10.1145/1966913.1966959
[8]  
Case D.U., 2016, Electricity Information Sharing and Analysis Center (E-ISAC), V388, P1
[9]   A systems and control perspective of CPS security [J].
Dibaji, Seyed Mehran ;
Pirani, Mohammad ;
Flamholz, David Bezalel ;
Annaswamy, Anuradha M. ;
Johansson, Karl Henrik ;
Chakrabortty, Aranya .
ANNUAL REVIEWS IN CONTROL, 2019, 47 :394-411
[10]  
Ding SX, 2013, ADV IND CONTROL, P3, DOI 10.1007/978-1-4471-4799-2_1