Design and Implementation of Attack-Resilient Cyberphysical Systems WITH A FOCUS ON ATTACk-RESILIENT STATE ESTIMATORS

被引:98
作者
Pajic, Miroslav [1 ]
Weimer, James [2 ,3 ]
Bezzo, Nicola [4 ,5 ]
Sokolsky, Oleg [6 ]
Pappas, George J. [7 ,8 ,9 ,10 ]
Lee, Insup [5 ,6 ]
机构
[1] Duke Univ, Dept Elect & Comp Engn, Durham, NC 27706 USA
[2] Univ Penn, Dept Comp & Informat Sci, Philadelphia, PA 19104 USA
[3] Royal Inst Technol KTH, Dept Automat Control, Stockholm, Sweden
[4] Univ Virginia, Syst & Informat Engn, Charlottesville, VA 22903 USA
[5] Univ Penn, PRECISE Ctr, Philadelphia, PA 19104 USA
[6] Univ Penn, Comp & Informat Sci, Philadelphia, PA 19104 USA
[7] Univ Penn, Elect & Syst Engn, Philadelphia, PA 19104 USA
[8] Grasp Lab, Philadelphia, PA USA
[9] PRECISE Ctr, Philadelphia, PA USA
[10] Sch Engn & Appl Sci, Res, Ahmadabad, Gujarat, India
来源
IEEE CONTROL SYSTEMS MAGAZINE | 2017年 / 37卷 / 02期
基金
美国国家科学基金会;
关键词
CYBER-PHYSICAL SYSTEMS; SECURITY;
D O I
10.1109/MCS.2016.2643239
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recent years have witnessed a significant increase in the number of securityrelated incidents in control systems. These include high-profile attacks in a wide range of application domains, from attacks on critical infrastructure, as in the case of the Maroochy Water breach [1], and industrial systems (such as the StuxNet virus attack on an industrial supervisory control and data acquisition system [2], [3] and the German Steel Mill cyberattack [4], [5]), to attacks on modern vehicles [6]-[8]. Even high-Assurance military systems were shown to be vulnerable to attacks, as illustrated in the highly publicized downing of the RQ-170 Sentinel U.S. drone [9]-[11]. These incidents have greatly raised awareness of the need for security in cyberphysical systems (CPSs), which feature tight coupling of computation and communication substrates with sensing and actuation components. However, the complexity and heterogeneity of this next generation of safety-critical, networked, and embedded control systems have challenged the existing design methods in which security is usually consider as an afterthought. © 1991-2012 IEEE.
引用
收藏
页码:66 / 81
页数:16
相关论文
共 42 条
[1]  
Adelard, 1998, ASCAD ADELARD SAFETY
[2]  
[Anonymous], 2014, ACM IEEE ICCPS
[3]  
[Anonymous], 2011, WASHINGTON POST
[4]  
[Anonymous], 2011, CHRISTIAN SCI MONITO
[5]  
[Anonymous], 2011, IFAC P
[6]  
[Anonymous], 1999, The Coq Proof Assistant
[7]  
Antsaklis PJ, 1997, Linear Systems
[8]  
Bertsimas D., 1997, INTRO LINEAR OPTIMIZ, V6
[9]  
Boyd S, 2004, CONVEX OPTIMIZATION
[10]  
Checkoway S., 2011, P USENIX SEC S