The Vulnerability of Cyber-Physical System Under Stealthy Attacks

被引:98
作者
Sui, Tianju [1 ,2 ]
Mo, Yilin [3 ,4 ]
Marelli, Damian [5 ,6 ]
Sun, Ximing [1 ,2 ]
Fu, Minyue [5 ,7 ]
机构
[1] Dalian Univ Technol, Key Lab Intelligent Control & Optimizat Ind Equip, Minist Educ, Dalian 116024, Peoples R China
[2] Dalian Univ Technol, Sch Control Sci & Engn, Dalian 116024, Peoples R China
[3] Tsinghua Univ, Dept Automat, Beijing 100084, Peoples R China
[4] Tsinghua Univ, BNRist, Beijing 100084, Peoples R China
[5] Guangdong Univ Technol, Sch Automat, Guangzhou 510006, Peoples R China
[6] Natl Sci & Tech Res Council, French Argentine Int Ctr Informat & Syst Sci, C1033AAJ, Buenos Aires, DF, Argentina
[7] Univ Newcastle, Sch Elect Engn & Comp Sci, Callaghan, NSW 2308, Australia
基金
中国国家自然科学基金;
关键词
Control system analysis; cyber-physical systems; stochastic systems; security;
D O I
10.1109/TAC.2020.2987307
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this article, we study the impact of stealthy attacks on the cyber-physical system (CPS) modeled as a stochastic linear system. An attack is characterised by a malicious injection into the system through input, output or both, and it is called stealthy (resp. strictly stealthy) if it produces bounded changes (resp. no changes) in the detection residue. Correspondingly, a CPS is called vulnerable (resp. strictly vulnerable) if it can be destabilized by a stealthy attack (resp. strictly stealthy attack). We provide necessary and sufficient conditions for the vulnerability and strictly vulnerability. For the invulnerable case, we also provide a performance bound for the difference between healthy and attacked system. Numerical examples are provided to illustrate the theoretical results.
引用
收藏
页码:637 / 650
页数:14
相关论文
共 37 条
[1]  
Anderson B. D. O., 1975, IFAC Proc., V8, P337
[2]  
[Anonymous], 1998, LINEAR SYSTEM THEORY
[3]  
Ardenas A., 2008, Proceedings of the 3rd conference on Hot topics in security, San Jose, CA, P1
[4]  
Bai CZ, 2015, P AMER CONTR CONF, P195, DOI 10.1109/ACC.2015.7170734
[5]  
Bartle R.G., 2000, Introduction to real analysis, V2
[6]  
Conti Juan Pablo, 2010, Engineering & Technology, V5, P46, DOI 10.1049/et.2010.0410
[7]   A multi-channel transmission schedule for remote state estimation under DoS attacks [J].
Ding, Kemi ;
Li, Yuzhe ;
Quevedo, Daniel E. ;
Dey, Subhrakanti ;
Shi, Ling .
AUTOMATICA, 2017, 78 :194-201
[8]   Generic properties and control of linear structured systems: a survey [J].
Dion, JM ;
Commault, C ;
van der Woude, J .
AUTOMATICA, 2003, 39 (07) :1125-1144
[9]   A PLANT-WIDE INDUSTRIAL-PROCESS CONTROL PROBLEM [J].
DOWNS, JJ ;
VOGEL, EF .
COMPUTERS & CHEMICAL ENGINEERING, 1993, 17 (03) :245-255
[10]   Stuxnet and the Future of Cyber War [J].
Farwell, James P. ;
Rohozinski, Rafal .
SURVIVAL, 2011, 53 (01) :23-40