Stealthy Actuator Signal Attacks in Stochastic Control Systems: Performance and Limitations

被引:48
作者
Fang, Chongrong [1 ]
Qi, Yifei [1 ]
Chen, Jiming [1 ]
Tan, Rui [2 ]
Zheng, Wei Xing [3 ]
机构
[1] Zhejiang Univ, State Key Lab Ind Control Technol, Hangzhou 310027, Peoples R China
[2] Nanyang Technol Univ, Sch Comp Sci & Engn, Singapore 639798, Singapore
[3] Western Sydney Univ, Sch Comp Engn & Math, Sydney, NSW 2751, Australia
基金
中国国家自然科学基金;
关键词
Detectors; Actuators; Convergence; Kalman filters; Degradation; Technological innovation; Cyber-physical system (CPS); Kalman filter; security;
D O I
10.1109/TAC.2019.2950072
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this technical note, the tradeoff between the attack detectability and the performance degradation in stochastic cyber-physical systems is investigated. We consider a linear time-invariant system in which the attack detector performs a hypothesis test on the innovation of the Kalman filter to detect malicious tampering with the actuator signals. We adopt a notion of attack stealthiness to quantify the degree of stealth by limiting the maximum achievable exponents of both false alarm probability and detection probability below certain thresholds. And the conditions for any actuator attack to have a specific level of stealthiness are derived. Additionally, we characterize the upper bound of the performance degradation induced by attacks with a given extent of stealthiness that produces independent and identically distributed Gaussian innovations, and design the attack, which achieves the stated upper bound for right-invertible systems. Finally, our results are illustrated via numerical examples.
引用
收藏
页码:3927 / 3934
页数:8
相关论文
共 24 条
[1]  
Anderson Brian D. O., 2012, OPTIMAL FILTERING SE
[2]  
[Anonymous], 2013, An Introduction to Signal Detection and Estimation
[3]  
[Anonymous], 2016, CCS 16
[4]   On Kalman Filtering with Compromised Sensors: Attack Stealthiness and Performance Bounds [J].
Bai, Cheng-Zong ;
Gupta, Vijay ;
Pasqualetti, Fabio .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2017, 62 (12) :6641-6648
[5]   Data-injection attacks in stochastic control systems: Detectability and performance tradeoffs [J].
Bai, Cheng-Zong ;
Pasqualetti, Fabio ;
Gupta, Vijay .
AUTOMATICA, 2017, 82 :251-260
[6]  
Bai CZ, 2015, P AMER CONTR CONF, P195, DOI 10.1109/ACC.2015.7170734
[7]   Cyber-Physical Attacks With Control Objectives [J].
Chen, Yuan ;
Kar, Soummya ;
Moura, Jose M. F. .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2018, 63 (05) :1418-1425
[8]   Optimal Attack Strategies Subject to Detection Constraints Against Cyber-Physical Systems [J].
Chen, Yuan ;
Kar, Soummya ;
Moura, Jose M. F. .
IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, 2018, 5 (03) :1157-1168
[9]   Hey, My Malware Knows Physics! Attacking PLCs with Physical Model Aware Rootkit [J].
Garcia, Luis A. ;
Brasser, Ferdinand ;
Cintuglu, Mehmet H. ;
Sadeghi, Ahmad-Reza ;
Mohammed, Osama ;
Zonouz, Saman A. .
24TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2017), 2017,
[10]   Worst-case stealthy innovation-based linear attack on remote state estimation [J].
Guo, Ziyang ;
Shi, Dawei ;
Johansson, Karl Henrik ;
Shi, Ling .
AUTOMATICA, 2018, 89 :117-124