Undetectable Finite-Time Covert Attack on Constrained Cyber-Physical Systems

被引:19
作者
Gheitasi, Kian [1 ]
Lucia, Walter [1 ]
机构
[1] Concordia Univ, Concordia Inst Informat Syst Engn CIISE, Montreal, PQ H3G 1M8, Canada
来源
IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS | 2022年 / 9卷 / 02期
基金
加拿大自然科学与工程研究理事会;
关键词
Cyber-physical systems (CPSs); constrained control; networked control systems; undetectable cyber-attacks; SCHEME;
D O I
10.1109/TCNS.2022.3140692
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the last few decades, several cyber-threats against cyber-physical systems (CPSs) have been reported. Of particular interest are the classes of network attacks capable of affecting the control systems' performance while remaining undetectable. In this article, under some conditions, we show the existence of a novel class of finite-time undetectable attacks against constrained CPSs. The proposed finite-time attack has the peculiar capability of not producing anomalies after its termination. This is particularly dangerous because it enables a malicious entity to repeatedly or intermittently affect the CPS without raising alarms. Such an attack is here designed by resorting to a set-theoretic approach that leverages robust reachability arguments. Moreover, given the desired attack duration, the set of initial states from which the attack is feasible is characterized. A numerical simulation example involving an industrial continuous-stirred tank reactor system is presented to support the theoretical results.
引用
收藏
页码:1040 / 1048
页数:9
相关论文
共 34 条
[1]   Cyber Security of Water SCADA Systems-Part I: Analysis and Experimentation of Stealthy Deception Attacks [J].
Amin, Saurabh ;
Litrico, Xavier ;
Sastry, Shankar ;
Bayen, Alexandre M. .
IEEE TRANSACTIONS ON CONTROL SYSTEMS TECHNOLOGY, 2013, 21 (05) :1963-1970
[2]   An ellipsoidal off-line MPC scheme for uncertain polytopic discrete-time systems [J].
Angeli, David ;
Casavola, Alessandro ;
Franze, Giuseppe ;
Mosca, Edoardo .
AUTOMATICA, 2008, 44 (12) :3113-3119
[3]  
[Anonymous], 2001, P 40 IEEE C DECISION
[4]   Detection of Covert Cyber-Attacks in Interconnected Systems: A Distributed Model-Based Approach [J].
Barboni, Angelo ;
Rezaee, Hamed ;
Boem, Francesca ;
Parisini, Thomas .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2020, 65 (09) :3728-3741
[5]  
Blanchini F, 2008, SYST CONTROL-FOUND A, P1
[6]   Dynamic Attack Detection in Cyber-Physical Systems With Side Initial State Information [J].
Chen, Yuan ;
Kar, Soummya ;
Moura, Jose M. F. .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2017, 62 (09) :4618-4624
[7]   A survey on security control and attack detection for industrial cyber-physical systems [J].
Ding, Derui ;
Han, Qing-Long ;
Xiang, Yang ;
Ge, Xiaohua ;
Zhang, Xian-Ming .
NEUROCOMPUTING, 2018, 275 :1674-1683
[8]   Event-Triggered Control Systems Under Denial-of-Service Attacks [J].
Dolk, V. S. ;
Tesi, P. ;
De Persis, C. ;
Heemels, W. P. M. H. .
IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, 2017, 4 (01) :93-105
[9]   Resilient Model Predictive Control for Constrained Cyber-Physical Systems Subject to Severe Attacks on the Communication Channels [J].
Franze, Giuseppe ;
Lucia, Walter ;
Tedesco, Francesco .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2022, 67 (04) :1822-1836
[10]   Robust fault detection with missing measurements [J].
Gao, H. ;
Chen, T. ;
Wang, L. .
INTERNATIONAL JOURNAL OF CONTROL, 2008, 81 (05) :804-819