Real-Time Attack-Recovery for Cyber-Physical Systems Using Linear Approximations

被引:22
|
作者
Zhang, Lin [1 ]
Chen, Xin [2 ]
Kong, Fanxin [1 ]
Cardenas, Alvaro A. [3 ]
机构
[1] Syracuse Univ, Dept Elect Engn & Comp Sci, Syracuse, NY 13244 USA
[2] Univ Dayton, Dept Comp Sci, Dayton, OH 45469 USA
[3] Univ Calif Santa Cruz, Dept Comp Sci & Engn, Santa Cruz, CA 95064 USA
来源
2020 IEEE 41ST REAL-TIME SYSTEMS SYMPOSIUM (RTSS) | 2020年
关键词
cyber-physical systems; security; sensor attacks; recovery; real-time; SECURITY; DESIGN;
D O I
10.1109/RTSS49844.2020.00028
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Attack detection and recovery are fundamental elements for the operation of safe and resilient cyber-physical systems. Most of the literature focuses on attack-detection, while leaving attack-recovery as an open problem. In this paper, we propose novel attack-recovery control for securing cyber-physical systems. Our recovery control consists of new concepts required for a safe response to attacks, which includes the removal of poisoned data, the estimation of the current state, a prediction of the reachable states, and the online design of a new controller to recover the system. The synthesis of such recovery controllers for cyber-physical systems has barely investigated so far. To fill this void, we present a formal method-based approach to online compute a recovery control sequence that steers a system under an ongoing sensor attack from the current state to a target state such that no unsafe state is reachable on the way. The method solves a reach-avoid problem on a Linear Time-Invariant (LTI) model with the consideration of an error bound E > 0. The obtained recovery control is guaranteed to work on the original system if the behavioral difference between the LTI model and the system's plant dynamics is not larger than E. Since a recovery control should be obtained and applied at the runtime of the system, in order to keep its computational time cost as low as possible, our approach firstly builds a linear programming restriction with the accordingly constrained safety and target specifications for the given reach-avoid problem, and then uses a linear programming solver to find a solution. To demonstrate the effectiveness of our method, we provide (a) the comparison to the previous work over 5 system models under 3 sensor attack scenarios: modification, delay, and reply; (b) a scalabfiity analysis based on a scalable model to evaluate the performance of our method on large-scale systems.
引用
收藏
页码:205 / 217
页数:13
相关论文
共 50 条
  • [31] Cyber-Attack Detection for Automotive Cyber-Physical Systems
    Lee, Suyun
    Jung, Sunjae
    Baek, Youngmi
    BUILDSYS'21: PROCEEDINGS OF THE 2021 ACM INTERNATIONAL CONFERENCE ON SYSTEMS FOR ENERGY-EFFICIENT BUILT ENVIRONMENTS, 2021, : 214 - 215
  • [32] Detectable and Undetectable Network Attack Security of Cyber-physical Systems
    Lima, Public M.
    Carvalho, Lilian K.
    Moreira, Marcos V.
    IFAC PAPERSONLINE, 2018, 51 (07): : 179 - 185
  • [33] Digital Twin-Based Cyber-Attack Detection Framework for Cyber-Physical Manufacturing Systems
    Balta, Efe C.
    Pease, Michael
    Moyne, James
    Barton, Kira
    Tilbury, Dawn M.
    IEEE TRANSACTIONS ON AUTOMATION SCIENCE AND ENGINEERING, 2024, 21 (02) : 1695 - 1712
  • [34] Using Soft Real-Time Simulation in a Hybrid Environment for Cyber-Physical Security Experiments
    Genge, Bela
    Siaterlis, Christos
    2011 20TH IEEE INTERNATIONAL WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES (WETICE), 2011, : 285 - 290
  • [35] Decentralized Safe Control for Distributed Cyber-Physical Systems Using Real-Time Reachability Analysis
    Nguyen, Luan Viet
    Tran, Hoang-Dung
    Johnson, Taylor
    Gupta, Vijay
    IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, 2023, 10 (03): : 1234 - 1244
  • [36] A Stream Learning Approach for Real-Time Identification of False Data Injection Attacks in Cyber-Physical Power Systems
    Hallaji, Ehsan
    Razavi-Far, Roozbeh
    Wang, Meng
    Saif, Mehrdad
    Fardanesh, Bruce
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 17 : 3934 - 3945
  • [37] Cyber-physical structural optimization using real-time hybrid simulation
    Zhang, Ruiyang
    Phillips, Brian M.
    Fernandez-Caban, Pedro L.
    Masters, Forrest J.
    ENGINEERING STRUCTURES, 2019, 195 : 113 - 124
  • [38] On attack detection and identification for the cyber-physical system using lifted system model
    Sun, Dawei
    Cho, Minhyun
    Hwang, Inseok
    AUTOMATICA, 2025, 176
  • [39] Real-Time Task Scheduling for Machine Perception in Intelligent Cyber-Physical Systems
    Liu, Shengzhong
    Yao, Shuochao
    Fu, Xinzhe
    Shao, Huajie
    Tabish, Rohan
    Yu, Simon
    Bansal, Ayoosh
    Yun, Heechul
    Sha, Lui
    Abdelzaher, Tarek
    IEEE TRANSACTIONS ON COMPUTERS, 2021, 71 (08) : 1770 - 1783
  • [40] Real-Time Data Aggregation for Contention-Based Sensor Networks in Cyber-Physical Systems
    Liu, Qin
    Chang, Yanan
    Jia, Xiaohua
    WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, WASA 2012, 2012, 7405 : 520 - 531