Setpoint Attack Detection in Cyber-Physical Systems

被引:26
作者
Lucia, Walter [1 ]
Gheitasi, Kian [1 ]
Ghaderi, Mohsen [2 ]
机构
[1] Concordia Univ, Concordia Inst Informat Syst Engn, Montreal, PQ H3G 1M8, Canada
[2] Concordia Univ, Dept Elect & Comp Engn, Montreal, PQ H3G 1M8, Canada
基金
加拿大自然科学与工程研究理事会;
关键词
Computer architecture; Communication channels; Closed loop systems; Detectors; Networked control systems; Linear systems; Command governor; constrained control; cyber-physical systems; setpoint attack detection; supervisory control; GRIDS; STATE;
D O I
10.1109/TAC.2020.3004326
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this article, we face the problem of detecting setpoint attacks in networked control systems. We consider a setup where the reference signal (also known as setpoint) is generated by a control center remotely located with respect to a standard feedback controller. In this scenario, an attacker with sufficient resources can exploit the communication channel to alter the setpoint signal and ultimately affect the tracking performance of the control system. With respect to this problem, we propose a novel distributed control architecture that, taking advantage of peculiar capabilities of the command governor control paradigm, enables the detection of reference attacks. We formally prove that for constrained linear systems such detector exists. Moreover, by limiting the attacker's disclosure resources with superimposed cryptographically secure pseudorandom signals, we show that the absence of advanced stealthy attacks is also ensured. Finally, a solid numerical simulation investigating setpoint attacks on the flight control system of a single-engine fighter is presented to provide tangible evidence of the features of the presented methodology.
引用
收藏
页码:2332 / 2338
页数:7
相关论文
共 26 条
[1]  
[Anonymous], IEEE CONTROL SYST SO
[2]   Reference governor for constrained nonlinear systems [J].
Bemporad, A .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 1998, 43 (03) :415-419
[3]   Nonlinear control of constrained linear systems via predictive reference management [J].
Bemporad, A ;
Casavola, A ;
Mosca, E .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 1997, 42 (03) :340-349
[4]   FTC approach with actuator saturation avoidance based on reference management [J].
Boussaid, Boumedyen ;
Aubrun, Christophe ;
Jiang, Jin ;
Abdelkrim, Mohamed Naceur .
INTERNATIONAL JOURNAL OF ROBUST AND NONLINEAR CONTROL, 2014, 24 (17) :2724-2740
[5]  
Cardenas Alvaro A., 2008, 2008 28th International Conference on Distributed Computing Systems Workshops (ICDCS Workshops), P495, DOI 10.1109/ICDCS.Workshops.2008.40
[6]   Detection and mitigation of classes of attacks in supervisory control systems [J].
Carvalho, Lilian Kawakami ;
Wu, Yi-Chin ;
Kwong, Raymond ;
Lafortune, Stephane .
AUTOMATICA, 2018, 97 :121-133
[7]   Dynamic Attack Detection in Cyber-Physical Systems With Side Initial State Information [J].
Chen, Yuan ;
Kar, Soummya ;
Moura, Jose M. F. .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2017, 62 (09) :4618-4624
[8]   Detecting Attacks Against Robotic Vehicles: A Control Invariant Approach [J].
Choi, Hongjun ;
Lee, Wen-Chuan ;
Aafer, Yousra ;
Fei, Fan ;
Tu, Zhan ;
Zhang, Xiangyu ;
Xu, Dongyan ;
Deng, Xinyan .
PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, :801-816
[9]  
Dán G, 2010, INT CONF SMART GRID, P214, DOI 10.1109/SMARTGRID.2010.5622046
[10]   A systems and control perspective of CPS security [J].
Dibaji, Seyed Mehran ;
Pirani, Mohammad ;
Flamholz, David Bezalel ;
Annaswamy, Anuradha M. ;
Johansson, Karl Henrik ;
Chakrabortty, Aranya .
ANNUAL REVIEWS IN CONTROL, 2019, 47 :394-411