Real-Time Attack-Recovery for Cyber-Physical Systems Using Linear Approximations

被引:22
|
作者
Zhang, Lin [1 ]
Chen, Xin [2 ]
Kong, Fanxin [1 ]
Cardenas, Alvaro A. [3 ]
机构
[1] Syracuse Univ, Dept Elect Engn & Comp Sci, Syracuse, NY 13244 USA
[2] Univ Dayton, Dept Comp Sci, Dayton, OH 45469 USA
[3] Univ Calif Santa Cruz, Dept Comp Sci & Engn, Santa Cruz, CA 95064 USA
来源
2020 IEEE 41ST REAL-TIME SYSTEMS SYMPOSIUM (RTSS) | 2020年
关键词
cyber-physical systems; security; sensor attacks; recovery; real-time; SECURITY; DESIGN;
D O I
10.1109/RTSS49844.2020.00028
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Attack detection and recovery are fundamental elements for the operation of safe and resilient cyber-physical systems. Most of the literature focuses on attack-detection, while leaving attack-recovery as an open problem. In this paper, we propose novel attack-recovery control for securing cyber-physical systems. Our recovery control consists of new concepts required for a safe response to attacks, which includes the removal of poisoned data, the estimation of the current state, a prediction of the reachable states, and the online design of a new controller to recover the system. The synthesis of such recovery controllers for cyber-physical systems has barely investigated so far. To fill this void, we present a formal method-based approach to online compute a recovery control sequence that steers a system under an ongoing sensor attack from the current state to a target state such that no unsafe state is reachable on the way. The method solves a reach-avoid problem on a Linear Time-Invariant (LTI) model with the consideration of an error bound E > 0. The obtained recovery control is guaranteed to work on the original system if the behavioral difference between the LTI model and the system's plant dynamics is not larger than E. Since a recovery control should be obtained and applied at the runtime of the system, in order to keep its computational time cost as low as possible, our approach firstly builds a linear programming restriction with the accordingly constrained safety and target specifications for the given reach-avoid problem, and then uses a linear programming solver to find a solution. To demonstrate the effectiveness of our method, we provide (a) the comparison to the previous work over 5 system models under 3 sensor attack scenarios: modification, delay, and reply; (b) a scalabfiity analysis based on a scalable model to evaluate the performance of our method on large-scale systems.
引用
收藏
页码:205 / 217
页数:13
相关论文
共 50 条
  • [41] Energy management for multiple real-time workflows on cyber-physical cloud systems
    Xie, Guoqi
    Zeng, Gang
    Jiang, Junqiang
    Fan, Chunnian
    Li, Renfa
    Li, Keqin
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 105 : 916 - 931
  • [42] Learning-Based Simultaneous Detection and Characterization of Time Delay Attack in Cyber-Physical Systems
    Ganesh, Prakhar
    Lou, Xin
    Chen, Yao
    Tan, Rui
    Yau, David K. Y.
    Chen, Deming
    Winslett, Marianne
    IEEE TRANSACTIONS ON SMART GRID, 2021, 12 (04) : 3581 - 3593
  • [43] A survey on attack detection, estimation and control of industrial cyber-physical systems
    Zhang, Dan
    Wang, Qing-Guo
    Feng, Gang
    Shi, Yang
    Vasilakos, Athanasios V.
    ISA TRANSACTIONS, 2021, 116 : 1 - 16
  • [44] A Survey of Physics-Based Attack Detection in Cyber-Physical Systems
    Giraldo, Jairo
    Urbina, David
    Cardenas, Alvaro
    Valente, Junia
    Faisal, Mustafa
    Ruths, Justin
    Tippenhauer, Nils Ole
    Sandberg, Henrik
    Candell, Richard
    ACM COMPUTING SURVEYS, 2018, 51 (04)
  • [45] Jamming Attack on Cyber-Physical Systems: A Game-theoretic Approach
    Li, Yuzhe
    Shi, Ling
    Cheng, Peng
    Chen, Jiming
    Quevedo, Daniel E.
    2013 IEEE 3RD ANNUAL INTERNATIONAL CONFERENCE ON CYBER TECHNOLOGY IN AUTOMATION, CONTROL AND INTELLIGENT SYSTEMS (CYBER), 2013, : 252 - +
  • [46] Robustness of Cyber-Physical Systems against Simultaneous, Sequential and Composite Attack
    Cui, Pengshuai
    Zhu, Peidong
    Xun, Peng
    Shao, Chengcheng
    ELECTRONICS, 2018, 7 (09):
  • [47] Inferring adversarial behaviour in cyber-physical power systems using a Bayesian attack graph approach
    Sahu, Abhijeet
    Davis, Katherine
    IET CYBER-PHYSICAL SYSTEMS: THEORY & APPLICATIONS, 2023, 8 (02) : 91 - 108
  • [48] Optimal Linear Attack on Cyber Physical Systems With Multiplicative Noise
    Li, Fangfei
    Yang, Chao
    Tang, Yang
    IEEE ACCESS, 2018, 6 : 33318 - 33328
  • [49] Towards a real-time IoT: Approaches for incoming packet processing in cyber-physical systems
    Behnke, Ilja
    Blumschein, Christoph
    Danicki, Robert
    Wiesner, Philipp
    Thamsen, Lauritz
    Kao, Odej
    JOURNAL OF SYSTEMS ARCHITECTURE, 2023, 140
  • [50] Cyber-Physical Attack Detection and Recovery Based on RNN in Automotive Brake Systems
    Shin, Jongho
    Baek, Youngmi
    Lee, Jaeseong
    Lee, Seonghun
    APPLIED SCIENCES-BASEL, 2019, 9 (01):