Security analysis for cyber-physical systems under undetectable attacks: A geometric approach

被引:22
|
作者
Zhao, Zhengen [1 ]
Yang, Ying [1 ]
Li, Yuzhe [2 ]
Liu, Ruijie [1 ]
机构
[1] Peking Univ, Dept Mech & Engn Sci, State Key Lab Turbulence & Complex Syst, Beijing 100871, Peoples R China
[2] Univ Alberta, Dept Elect & Comp Engn, Edmonton, AB, Canada
基金
中国国家自然科学基金;
关键词
attack design; cyber-physical systems; geometric approach; security analysis; undetectable attacks; FRAMEWORK;
D O I
10.1002/rnc.4419
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, the security issues of cyber-physical systems under undetectable attacks are studied. The geometric control theory is used to investigate the design, implementation, and impact evaluation of undetectable attacks. First, a feedforward-feedback structure for undetectable attacks is proposed, which provides a designable form for an attack to be undetectable. The corresponding attack strategy is designed via pole placement in the weakly unobservable subspace of the attacked system. Then, the security analysis of several common undetectable attacks injected from actuators, sensors, and the coordinated of the two is discussed. Finally, the simulations on the quadruple-tank process demonstrate the effectiveness of the proposed methods.
引用
收藏
页码:4359 / 4370
页数:12
相关论文
共 50 条
  • [21] An Assessment of Security Analysis Tools for Cyber-Physical Systems
    Lemaire, Laurens
    Vossaert, Jan
    De Decker, Bart
    Naessens, Vincent
    RISK ASSESSMENT AND RISK-DRIVEN QUALITY ASSURANCE, RISK 2016, 2017, 10224 : 66 - 81
  • [22] Identification and analysis of stochastic deception attacks on cyber-physical systems
    Barchinezhad, Soheila
    Haghighi, Mohammad Sayad
    Puig, Vicenc
    JOURNAL OF THE FRANKLIN INSTITUTE-ENGINEERING AND APPLIED MATHEMATICS, 2024, 361 (08):
  • [23] Modeling security in cyber-physical systems
    Burmester, Mike
    Magkos, Ernmanouil
    Chrissikopoulos, Vassilis
    INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2012, 5 (3-4) : 118 - 126
  • [24] Security Games for Cyber-Physical Systems
    Vigo, Roberto
    Bruni, Alessandro
    Yuksel, Ender
    SECURE IT SYSTEMS, NORDSEC 2013, 2013, 8208 : 17 - 32
  • [25] Reinforcement Learning Solution for Cyber-Physical Systems Security Against Replay Attacks
    Yu, Yan
    Yang, Wen
    Ding, Wenjie
    Zhou, Jiayu
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 2583 - 2595
  • [26] A survey on the security of cyber-physical systems
    Wu G.
    Sun J.
    Chen J.
    Control Theory and Technology, 2016, 14 (1) : 2 - 10
  • [27] Reference tracking control for cyber-physical systems under DoS attacks
    Oliveira, Pedro M.
    Pessim, Paulo S. P.
    Palma, Jonathan M.
    Lacerda, Marcio J.
    2021 IEEE CHILEAN CONFERENCE ON ELECTRICAL, ELECTRONICS ENGINEERING, INFORMATION AND COMMUNICATION TECHNOLOGIES (IEEE CHILECON 2021), 2021, : 107 - 112
  • [28] Research on secure control and communication for cyber-physical systems under cyber-attacks
    Li, Wei
    Shi, Yahong
    Li, Yajie
    TRANSACTIONS OF THE INSTITUTE OF MEASUREMENT AND CONTROL, 2019, 41 (12) : 3421 - 3437
  • [29] Security Control for Cyber-Physical Systems With Optimal Dynamic Stealthy Actuator Attacks
    Sun, Kangkang
    Zhang, Xiaochun
    IEEE TRANSACTIONS ON AUTOMATION SCIENCE AND ENGINEERING, 2024,
  • [30] Secure State Estimation of Cyber-Physical Systems Under Switching Attacks
    Forti, N.
    Battistelli, G.
    Chisci, L.
    Sinopoli, B.
    IFAC PAPERSONLINE, 2017, 50 (01): : 4979 - 4986