Real-Time Data-Predictive Attack-Recovery for Complex Cyber-Physical Systems

被引:14
作者
Zhang, Lin [1 ]
Sridhar, Kaustubh [2 ]
Liu, Mengyu [1 ]
Lu, Pengyuan [2 ]
Chen, Xin [3 ]
Kong, Fanxin [1 ]
Sokolsky, Oleg [2 ]
Lee, Insup [2 ]
机构
[1] Syracuse Univ, Dept Elect Engn & Comp Sci, Syracuse, NY 13244 USA
[2] Univ Penn, Dept Comp & Informat Sci, Philadelphia, PA USA
[3] Univ Dayton, Dept Comp Sci, Dayton, OH USA
来源
2023 IEEE 29TH REAL-TIME AND EMBEDDED TECHNOLOGY AND APPLICATIONS SYMPOSIUM, RTAS | 2023年
关键词
cyber-physical systems; security; real-time recovery; nonlinear systems; SECURITY;
D O I
10.1109/RTAS58335.2023.00024
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Cyber-physical systems (CPSs) leverage computations to operate physical objects in real-world environments, and increasingly more CPS-based applications have been designed for life-critical applications. Therefore, any vulnerability in such a system can lead to severe consequences if exploited by adversaries. In this paper, we present a data predictive recovery system to safeguard the CPS from sensor attacks, assuming that we can identify compromised sensors from data. Our recovery system guarantees that the CPS will never encounter unsafe states and will smoothly recover to a target set within a conservative deadline. It also guarantees that the CPS will remain within the target set for a specified period. Major highlights of our paper include (i) the recovery procedure works on nonlinear systems, (ii) the method leverages uncorrupted sensors to relieve uncertainty accumulation, and (iii) an extensive set of experiments on various nonlinear benchmarks that demonstrate our framework's performance and efficiency.
引用
收藏
页码:209 / 222
页数:14
相关论文
共 62 条
[1]  
Abad FAT, 2016, IEEE INT C EMERG
[2]   Guaranteed Physical Security with Restart-Based Design for Cyber-Physical Systems [J].
Abdi, Fardin ;
Chen, Chien-Ying ;
Hasan, Monowar ;
Liu, Songran ;
Mohan, Sibin ;
Caccamo, Marco .
2018 9TH ACM/IEEE INTERNATIONAL CONFERENCE ON CYBER-PHYSICAL SYSTEMS (ICCPS 2018), 2018, :10-21
[3]   Real-Time Adaptive Sensor Attack Detection in Autonomous Cyber-Physical Systems [J].
Akowuah, Francis ;
Kong, Fanxin .
2021 IEEE 27TH REAL-TIME AND EMBEDDED TECHNOLOGY AND APPLICATIONS SYMPOSIUM (RTAS 2021), 2021, :237-250
[4]   Security Vulnerabilities of Connected Vehicle Streams and Their Impact on Cooperative Driving [J].
Amoozadeh, Mani ;
Raghuramu, Arun ;
Chuah, Chen-Nee ;
Ghosal, Dipak ;
Zhang, H. Michael ;
Rowe, Jeff ;
Levitt, Karl .
IEEE COMMUNICATIONS MAGAZINE, 2015, 53 (06) :126-132
[5]  
[Anonymous], 2013, SPOOFERS USE FAKE GP
[6]  
[Anonymous], 2010, WORKSH ORG DEP HOM S
[7]  
Berz M., 1999, ADV IMAG ELECT PHYS, V108, DOI 10.1016/S1076-5670(08)70231-3
[8]   DISTRIBUTED SNAPSHOTS - DETERMINING GLOBAL STATES OF DISTRIBUTED SYSTEMS [J].
CHANDY, KM ;
LAMPORT, L .
ACM TRANSACTIONS ON COMPUTER SYSTEMS, 1985, 3 (01) :63-75
[9]  
Chaterji S., 2019, PREPRINT, DOI DOI 10.48550/ARXIV.2001.00090
[10]  
Chen X., 2015, Ph.D. thesis