Design and Implementation of Attack-Resilient Cyberphysical Systems WITH A FOCUS ON ATTACk-RESILIENT STATE ESTIMATORS

被引:99
作者
Pajic, Miroslav [1 ]
Weimer, James [2 ,3 ]
Bezzo, Nicola [4 ,5 ]
Sokolsky, Oleg [6 ]
Pappas, George J. [7 ,8 ,9 ,10 ]
Lee, Insup [5 ,6 ]
机构
[1] Duke Univ, Dept Elect & Comp Engn, Durham, NC 27706 USA
[2] Univ Penn, Dept Comp & Informat Sci, Philadelphia, PA 19104 USA
[3] Royal Inst Technol KTH, Dept Automat Control, Stockholm, Sweden
[4] Univ Virginia, Syst & Informat Engn, Charlottesville, VA 22903 USA
[5] Univ Penn, PRECISE Ctr, Philadelphia, PA 19104 USA
[6] Univ Penn, Comp & Informat Sci, Philadelphia, PA 19104 USA
[7] Univ Penn, Elect & Syst Engn, Philadelphia, PA 19104 USA
[8] Grasp Lab, Philadelphia, PA USA
[9] PRECISE Ctr, Philadelphia, PA USA
[10] Sch Engn & Appl Sci, Res, Ahmadabad, Gujarat, India
来源
IEEE CONTROL SYSTEMS MAGAZINE | 2017年 / 37卷 / 02期
基金
美国国家科学基金会;
关键词
CYBER-PHYSICAL SYSTEMS; SECURITY;
D O I
10.1109/MCS.2016.2643239
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recent years have witnessed a significant increase in the number of securityrelated incidents in control systems. These include high-profile attacks in a wide range of application domains, from attacks on critical infrastructure, as in the case of the Maroochy Water breach [1], and industrial systems (such as the StuxNet virus attack on an industrial supervisory control and data acquisition system [2], [3] and the German Steel Mill cyberattack [4], [5]), to attacks on modern vehicles [6]-[8]. Even high-Assurance military systems were shown to be vulnerable to attacks, as illustrated in the highly publicized downing of the RQ-170 Sentinel U.S. drone [9]-[11]. These incidents have greatly raised awareness of the need for security in cyberphysical systems (CPSs), which feature tight coupling of computation and communication substrates with sensing and actuation components. However, the complexity and heterogeneity of this next generation of safety-critical, networked, and embedded control systems have challenged the existing design methods in which security is usually consider as an afterthought. © 1991-2012 IEEE.
引用
收藏
页码:66 / 81
页数:16
相关论文
共 50 条
[21]   A Machine Learning Attack-Resilient Strong PUF Leveraging the Process Variation of MRAM [J].
Ali, Rashid ;
Zhang, Deming ;
Cai, Hao ;
Zhao, Weisheng ;
Wang, You .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-EXPRESS BRIEFS, 2022, 69 (06) :2712-2716
[22]   A Container-based DoS Attack-Resilient Control Framework for Real-Time UAV Systems [J].
Chen, Jiyang ;
Feng, Zhiwei ;
Wen, Jen-Yang ;
Liu, Bo ;
Sha, Lui .
2019 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION (DATE), 2019, :1222-1227
[23]   Multi-Agent Based Attack-Resilient System Integrity Protection for Smart Grid [J].
Wang, Pengyuan ;
Govindarasu, Manimaran .
IEEE TRANSACTIONS ON SMART GRID, 2020, 11 (04) :3447-3456
[24]   Hybrid Fault-Tolerant and Attack-Resilient Cooperative Control in an Offshore Wind Farm [J].
Jadidi, Saeedreza ;
Badihi, Hamed ;
Zhang, Youmin .
IEEE TRANSACTIONS ON SUSTAINABLE ENERGY, 2024, 15 (02) :1365-1379
[25]   Attack-resilient pitch angle control for variable-speed wind turbine systems under cyber threats [J].
Mazare, Mahmood ;
Taghizadeh, Mostafa ;
Asharioun, Hadi .
INTERNATIONAL JOURNAL OF ADAPTIVE CONTROL AND SIGNAL PROCESSING, 2023, 37 (06) :1423-1439
[26]   BAN-Trust: An Attack-Resilient Malicious Node Detection Scheme for Body Area Networks [J].
Li, Wenjia ;
Zhu, Xianshu .
2016 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS (ICNC), 2016,
[27]   Observer-based attack-resilient control for linear systems against FDI attacks on communication links from controller to actuators [J].
Xie, Chun-Hua ;
Yang, Guang-Hong .
INTERNATIONAL JOURNAL OF ROBUST AND NONLINEAR CONTROL, 2018, 28 (15) :4382-4403
[28]   Fully distributed attack-resilient Nash equilibrium seeking for networked games subject to DoS attacks [J].
Qian, Cheng ;
Ding, Lei .
INFORMATION SCIENCES, 2023, 641
[29]   Privacy-enhanced, attack-resilient access control in pervasive computing environments with optional context authentication capability [J].
Ren, Kui ;
Lou, Wenjing .
MOBILE NETWORKS & APPLICATIONS, 2007, 12 (01) :79-92
[30]   Privacy-enhanced, Attack-resilient Access Control in Pervasive Computing Environments with Optional Context Authentication Capability [J].
Kui Ren ;
Wenjing Lou .
Mobile Networks and Applications, 2007, 12 :79-92