The Vulnerability of Cyber-Physical System Under Stealthy Attacks

被引:98
作者
Sui, Tianju [1 ,2 ]
Mo, Yilin [3 ,4 ]
Marelli, Damian [5 ,6 ]
Sun, Ximing [1 ,2 ]
Fu, Minyue [5 ,7 ]
机构
[1] Dalian Univ Technol, Key Lab Intelligent Control & Optimizat Ind Equip, Minist Educ, Dalian 116024, Peoples R China
[2] Dalian Univ Technol, Sch Control Sci & Engn, Dalian 116024, Peoples R China
[3] Tsinghua Univ, Dept Automat, Beijing 100084, Peoples R China
[4] Tsinghua Univ, BNRist, Beijing 100084, Peoples R China
[5] Guangdong Univ Technol, Sch Automat, Guangzhou 510006, Peoples R China
[6] Natl Sci & Tech Res Council, French Argentine Int Ctr Informat & Syst Sci, C1033AAJ, Buenos Aires, DF, Argentina
[7] Univ Newcastle, Sch Elect Engn & Comp Sci, Callaghan, NSW 2308, Australia
基金
中国国家自然科学基金;
关键词
Control system analysis; cyber-physical systems; stochastic systems; security;
D O I
10.1109/TAC.2020.2987307
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this article, we study the impact of stealthy attacks on the cyber-physical system (CPS) modeled as a stochastic linear system. An attack is characterised by a malicious injection into the system through input, output or both, and it is called stealthy (resp. strictly stealthy) if it produces bounded changes (resp. no changes) in the detection residue. Correspondingly, a CPS is called vulnerable (resp. strictly vulnerable) if it can be destabilized by a stealthy attack (resp. strictly stealthy attack). We provide necessary and sufficient conditions for the vulnerability and strictly vulnerability. For the invulnerable case, we also provide a performance bound for the difference between healthy and attacked system. Numerical examples are provided to illustrate the theoretical results.
引用
收藏
页码:637 / 650
页数:14
相关论文
共 37 条
[21]   FAILURE-DETECTION AND IDENTIFICATION [J].
MASSOUMNIA, MA ;
VERGHESE, GC ;
WILLSKY, AS .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 1989, 34 (03) :316-321
[22]   On the Performance Degradation of Cyber-Physical Systems Under Stealthy Integrity Attacks [J].
Mo, Yilin ;
Sinopoli, Bruno .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2016, 61 (09) :2618-2624
[23]   Secure Estimation in the Presence of Integrity Attacks [J].
Mo, Yilin ;
Sinopoli, Bruno .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2015, 60 (04) :1145-1151
[24]   False Data Injection Attacks against State Estimation in Wireless Sensor Networks [J].
Mo, Yilin ;
Garone, Emanuele ;
Casavola, Alessandro ;
Sinopoli, Bruno .
49TH IEEE CONFERENCE ON DECISION AND CONTROL (CDC), 2010, :5967-5972
[25]   Attack Detection and Identification in Cyber-Physical Systems [J].
Pasqualetti, Fabio ;
Doerfler, Florian ;
Bullo, Francesco .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2013, 58 (11) :2715-2729
[26]   Consensus Computation in Unreliable Networks: A System Theoretic Approach [J].
Pasqualetti, Fabio ;
Bicchi, Antonio ;
Bullo, Francesco .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2012, 57 (01) :90-104
[27]   Image is everything [Filmless digital imaging systems] [J].
Richards, Guy .
Engineering and Technology, 2008, 3 (06) :40-43
[28]  
Ricker N. L., 1993, Journal of Process Control, V3, P109, DOI 10.1016/0959-1524(93)80006-W
[29]   INVERTIBILITY OF LINEAR TIME-INVARIANT DYNAMICAL SYSTEMS [J].
SAIN, MK ;
MASSEY, JL .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 1969, AC14 (02) :141-+
[30]   Lessons learned from the Maroochy Water breach [J].
Slay, Jill ;
Miller, Michael .
CRITICAL INFRASTRUCTURE PROTE CTION, 2008, 253 :73-+