Application of the unified control and detection framework to detecting stealthy integrity cyber-attacks on feedback control systems

被引:31
作者
Ding, Steven X. [1 ]
Li, Linlin [2 ,3 ]
Zhao, Dong [4 ]
Louen, Chris [1 ]
Liu, Tianyu [1 ]
机构
[1] Univ Duisburg Essen, Inst Automat Control & Complex Syst, D-47057 Duisburg, Germany
[2] Univ Sci & Technol Beijing, Shunde Grad Sch, Foshan 528399, Peoples R China
[3] Univ Sci & Technol Beijing, Sch Automat & Elect Engn, Beijing 100083, Peoples R China
[4] Beihang Univ, Sch Cyber Sci & Technol, Beijing 100191, Peoples R China
基金
北京市自然科学基金; 中国国家自然科学基金;
关键词
Cyber-security of control systems; Observer-based detection of integrity cyber-attacks; Unified framework of control and detection; Kernel attacks; Residual generation; Observer-based detectors;
D O I
10.1016/j.automatica.2022.110352
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper addresses issues of detecting stealthy integrity cyber-attacks on automatic control systems. A general form of integrity cyber-attacks that cannot be detected using the established observer-based technique is first introduced as kernel attacks. The well-known replay, zero dynamics and covert attacks are special forms of the kernel attacks. Existence conditions for the kernel attacks are presented. It is demonstrated, in the unified framework of control and detection, that all kernel attacks can be structurally detected when not only the observer-based residual, but also the control signal based residual signals are used for the detection purpose. Two schemes for detecting kernel attacks are then proposed, which allow reliable attack detection without loss of control performance. While the first scheme is similar to the well-established moving target method and auxiliary system aided detection scheme, the second one is realised with encrypted transmissions of control and monitoring signals in the feedback control system, which prevents adversary to gain system knowledge by means of eavesdropping attacks. Both schemes are illustrated by an experimental study on a three-tank control system. (C) 2022 Elsevier Ltd. All rights reserved.
引用
收藏
页数:14
相关论文
共 27 条
[1]   Encrypted Control for Networked Systems AN ILLUSTRATIVE INTRODUCTION AND CURRENT CHALLENGES [J].
Darup, Moritz Schulze ;
Alexandru, Andreea B. ;
Quevedo, Daniel E. ;
Pappas, George J. .
IEEE CONTROL SYSTEMS MAGAZINE, 2021, 41 (03) :58-78
[2]   A systems and control perspective of CPS security [J].
Dibaji, Seyed Mehran ;
Pirani, Mohammad ;
Flamholz, David Bezalel ;
Annaswamy, Anuradha M. ;
Johansson, Karl Henrik ;
Chakrabortty, Aranya .
ANNUAL REVIEWS IN CONTROL, 2019, 47 :394-411
[3]   A survey on security control and attack detection for industrial cyber-physical systems [J].
Ding, Derui ;
Han, Qing-Long ;
Xiang, Yang ;
Ge, Xiaohua ;
Zhang, Xian-Ming .
NEUROCOMPUTING, 2018, 275 :1674-1683
[4]  
Ding S. X., 2020, Advanced Methods for Fault Diagnosis and Fault-Tolerant Control
[5]  
Ding SX, 2013, ADV IND CONTROL, P3, DOI 10.1007/978-1-4471-4799-2_1
[6]   A Survey of Physics-Based Attack Detection in Cyber-Physical Systems [J].
Giraldo, Jairo ;
Urbina, David ;
Cardenas, Alvaro ;
Valente, Junia ;
Faisal, Mustafa ;
Ruths, Justin ;
Tippenhauer, Nils Ole ;
Sandberg, Henrik ;
Candell, Richard .
ACM COMPUTING SURVEYS, 2018, 51 (04)
[7]   A Moving Target Defense for Securing Cyber-Physical Systems [J].
Griffioen, Paul ;
Weerakkody, Sean ;
Sinopoli, Bruno .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2021, 66 (05) :2016-2031
[8]  
Griffioen P, 2019, 2019 18TH EUROPEAN CONTROL CONFERENCE (ECC), P979, DOI [10.23919/ecc.2019.8796117, 10.23919/ECC.2019.8796117]
[9]   Design and analysis of robust residual generators for systems under feedback control [J].
Henry, D ;
Zolghadri, A .
AUTOMATICA, 2005, 41 (02) :251-264
[10]   Gap metric techniques and their application to fault detection performance analysis and fault isolation schemes [J].
Li, Linlin ;
Ding, Steven X. .
AUTOMATICA, 2020, 118