Real-Time Attack-Recovery for Cyber-Physical Systems Using Linear Approximations

被引:22
|
作者
Zhang, Lin [1 ]
Chen, Xin [2 ]
Kong, Fanxin [1 ]
Cardenas, Alvaro A. [3 ]
机构
[1] Syracuse Univ, Dept Elect Engn & Comp Sci, Syracuse, NY 13244 USA
[2] Univ Dayton, Dept Comp Sci, Dayton, OH 45469 USA
[3] Univ Calif Santa Cruz, Dept Comp Sci & Engn, Santa Cruz, CA 95064 USA
来源
2020 IEEE 41ST REAL-TIME SYSTEMS SYMPOSIUM (RTSS) | 2020年
关键词
cyber-physical systems; security; sensor attacks; recovery; real-time; SECURITY; DESIGN;
D O I
10.1109/RTSS49844.2020.00028
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Attack detection and recovery are fundamental elements for the operation of safe and resilient cyber-physical systems. Most of the literature focuses on attack-detection, while leaving attack-recovery as an open problem. In this paper, we propose novel attack-recovery control for securing cyber-physical systems. Our recovery control consists of new concepts required for a safe response to attacks, which includes the removal of poisoned data, the estimation of the current state, a prediction of the reachable states, and the online design of a new controller to recover the system. The synthesis of such recovery controllers for cyber-physical systems has barely investigated so far. To fill this void, we present a formal method-based approach to online compute a recovery control sequence that steers a system under an ongoing sensor attack from the current state to a target state such that no unsafe state is reachable on the way. The method solves a reach-avoid problem on a Linear Time-Invariant (LTI) model with the consideration of an error bound E > 0. The obtained recovery control is guaranteed to work on the original system if the behavioral difference between the LTI model and the system's plant dynamics is not larger than E. Since a recovery control should be obtained and applied at the runtime of the system, in order to keep its computational time cost as low as possible, our approach firstly builds a linear programming restriction with the accordingly constrained safety and target specifications for the given reach-avoid problem, and then uses a linear programming solver to find a solution. To demonstrate the effectiveness of our method, we provide (a) the comparison to the previous work over 5 system models under 3 sensor attack scenarios: modification, delay, and reply; (b) a scalabfiity analysis based on a scalable model to evaluate the performance of our method on large-scale systems.
引用
收藏
页码:205 / 217
页数:13
相关论文
共 50 条
  • [1] Real-time Attack-recovery for Cyber-physical Systems Using Linear-quadratic Regulator
    Zhang, Lin
    Lu, Pengyuan
    Kong, Fanxin
    Chen, Xin
    Sokolsky, Oleg
    Lee, Insup
    ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 2021, 20 (05)
  • [2] Real-Time Data-Predictive Attack-Recovery for Complex Cyber-Physical Systems
    Zhang, Lin
    Sridhar, Kaustubh
    Liu, Mengyu
    Lu, Pengyuan
    Chen, Xin
    Kong, Fanxin
    Sokolsky, Oleg
    Lee, Insup
    2023 IEEE 29TH REAL-TIME AND EMBEDDED TECHNOLOGY AND APPLICATIONS SYMPOSIUM, RTAS, 2023, : 209 - 222
  • [3] Fast Attack Recovery for Stochastic Cyber-Physical Systems
    Zhang, Lin
    Burbano, Luis
    Chen, Xin
    Cardenas, Alvaro A.
    Drager, Steven
    Anderson, Matthew
    Kong, Fanxin
    2024 IEEE 30TH REAL-TIME AND EMBEDDED TECHNOLOGY AND APPLICATIONS SYMPOSIUM, RTAS 2024, 2023, : 280 - 293
  • [4] Real-Time Adaptive Sensor Attack Detection in Autonomous Cyber-Physical Systems
    Akowuah, Francis
    Kong, Fanxin
    2021 IEEE 27TH REAL-TIME AND EMBEDDED TECHNOLOGY AND APPLICATIONS SYMPOSIUM (RTAS 2021), 2021, : 237 - 250
  • [5] Distributed Real-Time Software for Cyber-Physical Systems
    Eidson, John C.
    Lee, Edward A.
    Matic, Slobodan
    Seshia, Sanjit A.
    Zou, Jia
    PROCEEDINGS OF THE IEEE, 2012, 100 (01) : 45 - 59
  • [6] Design Procedure for Real-Time Cyber-Physical Systems Tolerant to Cyberattacks
    Paredes, Carlos M.
    Castro, Diego Martinez
    Potes, Apolinar Gonzalez
    Piedrahita, Andres Rey
    Junquera, Vrani Ibarra
    SYMMETRY-BASEL, 2024, 16 (06):
  • [7] Cyber-physical attack graphs (CPAGs): Composable and scalable attack graphs for cyber-physical systems
    Barrere, Martin
    Hankin, Chris
    O'Reilly, Dean
    COMPUTERS & SECURITY, 2023, 132
  • [8] Secure Reboots for Real-Time Cyber-Physical Systems
    Banerjee, Vijay
    Hounsinou, Sena
    Olufowobi, Habeeb
    Hasan, Monowar
    Bloom, Gedare
    PROCEEDINGS OF THE 4TH WORKSHOP ON CPS & IOT SECURITY AND PRIVACY, CPSIOTSEC 2022, 2022, : 27 - 33
  • [9] On the Performance Analysis of Reset Attack in Cyber-Physical Systems
    Ni, Yuqing
    Guo, Ziyang
    Mo, Yilin
    Shi, Ling
    IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2020, 65 (01) : 419 - 425
  • [10] Optimal Stealth Attack Strategy Design for Linear Cyber-Physical Systems
    Wang, Xiao-Lei
    Yang, Guang-Hong
    Zhang, Dianhua
    IEEE TRANSACTIONS ON CYBERNETICS, 2022, 52 (01) : 472 - 480