Stealthy output injection attacks on control systems with bounded variables

被引:8
作者
Dutta, Abhishek [1 ]
Langbort, Cedric [1 ]
机构
[1] Univ Illinois, Coordinated Sci Lab, Dept Aerosp Engn, Urbana, IL 61801 USA
基金
美国国家科学基金会;
关键词
Control systems security; predictive control; constrained optimisation; MODEL-PREDICTIVE CONTROL; THEORETIC METHODS; STATE ESTIMATION; SECURITY;
D O I
10.1080/00207179.2016.1207099
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As more and more critical infrastructures such as transportation, power systems and water are being embedded with sensing and control and linked to the Internet, the resulting security vulnerability can be exploited to inflict systematic damage to the connected physical systems. The class of false-data injection attacks is of particular interest as it only requires the ability to compromise the measurements. We construct such attacks, that are stealthy to set-membership-based anomaly detectors over widely used constrained control systems with bounded disturbances. The design of robust controllers and detectors based on the ability to withstand disturbance lets the attacker masquerade itself as disturbance and necessitates the development of a disturbance set-estimator as a soft-constrained optimisation problem. We then formulate another constrained optimisation problem that maximises the state estimation error by manipulating measurements and results in a computable performance loss and derive its explicit solution as the attack vector. These methods are used to demonstrate the vulnerability of a test system, with attacker having limited knowledge of the control system.
引用
收藏
页码:1389 / 1402
页数:14
相关论文
共 32 条
  • [1] Abur A., 2004, POWER SYSTEM STATE E
  • [2] Guaranteed state estimation by zonotopes
    Alamo, T
    Bravo, JM
    Camacho, EF
    [J]. AUTOMATICA, 2005, 41 (06) : 1035 - 1043
  • [3] Cyber Security of Water SCADA Systems-Part I: Analysis and Experimentation of Stealthy Deception Attacks
    Amin, Saurabh
    Litrico, Xavier
    Sastry, Shankar
    Bayen, Alexandre M.
    [J]. IEEE TRANSACTIONS ON CONTROL SYSTEMS TECHNOLOGY, 2013, 21 (05) : 1963 - 1970
  • [4] [Anonymous], 2013, DECISION GAME THEORY
  • [5] [Anonymous], 2002, Predictive Control: With Constraints
  • [6] [Anonymous], 2010, P 1 WORKSH SEC CONTR
  • [7] Calafiore G., 2002, P 15 IFAC WORLD C BA
  • [8] Interval predictor models: Identification and reliability
    Campi, M. C.
    Calafiore, G.
    Garatti, S.
    [J]. AUTOMATICA, 2009, 45 (02) : 382 - 392
  • [9] Chong MS, 2015, P AMER CONTR CONF, P2439, DOI 10.1109/ACC.2015.7171098
  • [10] Dutta A., 2014, THESIS