Analysis of Cyber Physical Systems Security Via Networked Attacks

被引:0
作者
Ge, Hui [1 ,2 ]
Yue, Dong [1 ,2 ]
Xie, Xiang-peng [2 ]
Deng, Song [2 ]
Zhang, Yan [3 ]
机构
[1] Nanjing Univ Posts & Telecommun, Sch Automat Engn, Nanjing 210023, Jiangsu, Peoples R China
[2] Nanjing Univ Posts & Telecommun, Inst Adv Technol, Nanjing 210023, Jiangsu, Peoples R China
[3] Nanjing Univ Posts & Telecommun, Sch Elect Sci & Engn, Nanjing 210023, Jiangsu, Peoples R China
来源
PROCEEDINGS OF THE 36TH CHINESE CONTROL CONFERENCE (CCC 2017) | 2017年
关键词
Cyber Physical Systems; Networked Control System; Security Control; Denial-of-service; Stealth Attack;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, cyber physical system is analyzed from security perspective. A double closed-loop security control structure and algorithm with defense functions is proposed. From this structure, the features of several cyber attacks are considered respectively. By this structure, the models of information disclosure, denial-of-service (DoS) and Man-in-the-Middle Attack (MITM) are proposed. According to each kind attack, different models are obtained and analyzed, then reduce to the unified models. Based on this, system security conditions are obtained, and a defense scenario with detail algorithm is design to illustrate the implementation of this program.
引用
收藏
页码:4266 / 4272
页数:7
相关论文
共 26 条
[11]  
Neuman C., 2009, DHS WORKSHOP FUTURE, P22
[12]   Attack Detection and Identification in Cyber-Physical Systems [J].
Pasqualetti, Fabio ;
Doerfler, Florian ;
Bullo, Francesco .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2013, 58 (11) :2715-2729
[13]   CYBERPHYSICAL SECURITY IN NETWORKED CONTROL SYSTEMS AN INTRODUCTION TO THE ISSUE [J].
Sandberg, Henrik ;
Amin, Saurabh ;
Johansson, Karl Henrik .
IEEE CONTROL SYSTEMS MAGAZINE, 2015, 35 (01) :20-23
[14]  
Sastry, 2006, 1 WORKSH CYB PHYS SY, P363
[15]  
Simani S., 2003, ADV IND CON, P19, DOI [10.1007/978-1-59259-405-4, 10.1007/978-1-4471-3829-72]
[16]   COVERT MISAPPROPRIATION OF NETWORKED CONTROL SYSTEMS PRESENTING A FEEDBACK STRUCTURE [J].
Smith, Roy S. .
IEEE CONTROL SYSTEMS MAGAZINE, 2015, 35 (01) :82-92
[17]   A secure control framework for resource-limited adversaries [J].
Teixeira, Andre ;
Shames, Iman ;
Sandberg, Henrik ;
Johansson, Karl Henrik .
AUTOMATICA, 2015, 51 :135-148
[18]   Detection in Adversarial Environments [J].
Vamvoudakis, Kyriakos G. ;
Hespanha, Joao P. ;
Sinopoli, Bruno ;
Mo, Yilin .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2014, 59 (12) :3209-3223
[19]  
Weaver, 2001, CERT COORDINATION CT, V33, P99
[20]   Design of networked control systems with packet dropouts [J].
Wu, Jing ;
Chen, Tongwen .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2007, 52 (07) :1314-1319