A secure control framework for resource-limited adversaries

被引:830
作者
Teixeira, Andre [1 ]
Shames, Iman [2 ]
Sandberg, Henrik [1 ]
Johansson, Karl Henrik [1 ]
机构
[1] KTH Royal Inst Technol, Sch Elect Engn, ACCESS Linnaeus Ctr, Stockholm, Sweden
[2] Univ Melbourne, Dept Elect & Elect Engn, Melbourne, Vic 3010, Australia
基金
瑞典研究理事会;
关键词
Cyber-physical systems; System security; Attack space; Secure control systems; CONTROL-SYSTEMS;
D O I
10.1016/j.automatica.2014.10.067
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cyber-secure networked control is modeled, analyzed, and experimentally illustrated in this paper. An attack space defined by the adversary's model knowledge, disclosure, and disruption resources is introduced. Adversaries constrained by these resources are modeled for a networked control system architecture. It is shown that attack scenarios corresponding to denial-of-service, replay, zero-dynamics, and bias injection attacks on linear time-invariant systems can be analyzed using this framework. Furthermore, the attack policy for each scenario is described and the attack's impact is characterized using the concept of safe sets. An experimental setup based on a quadruple-tank process controlled over a wireless network is used to illustrate the attack scenarios, their consequences, and potential countermeasures. (C) 2014 Elsevier Ltd. All rights reserved.
引用
收藏
页码:135 / 148
页数:14
相关论文
共 41 条
  • [1] Amin S, 2009, LECT NOTES COMPUT SC, V5469, P31, DOI 10.1007/978-3-642-00602-9_3
  • [2] [Anonymous], 2011, W32.Stuxnet Dossier
  • [3] [Anonymous], 2008, HOTSEC
  • [4] [Anonymous], P 47 ANN ALL C COMM
  • [5] [Anonymous], P 13 ACM INT C HYBR
  • [6] [Anonymous], 2011, P 6 ACM S INF COMP C, DOI DOI 10.1145/1966913.1966959
  • [7] [Anonymous], P 16 ACM C COMP COMM
  • [8] Bishop M., 2002, Computer Security: Art and Science
  • [9] Boyd S., 1994, STUDIES APPL MATH, V15
  • [10] Chen J, 2012, ROBUST MODEL BASED F