Cyber Security of Water SCADA Systems—Part I: Analysis and Experimentation of Stealthy Deception Attacks

This brief aims to perform security threat assessment of networked control systems with regulatory and supervisory control layers. We analyze the performance of a proportional-integral controller (regulatory layer) and a model-based diagnostic scheme (supervisory layer) under a class of deception attacks. We adopt a conservative approach by assuming that the attacker has knowledge of: 1) the system dynamics; 2) the parameters of the diagnostic scheme; and 3) the sensor-control signals. The deception attack presented here can enable remote water pilfering from automated canal systems. We also report a field-operational test attack on the Gignac canal system located in Southern France.

[1]  M. Darouach,et al.  Full-order observers for linear systems with unknown inputs , 1994, IEEE Trans. Autom. Control..

[2]  D. Koenig,et al.  Unknown Input Observers Design for Time-Delay Systems Application to An Open-Channel , 2005, Proceedings of the 44th IEEE Conference on Decision and Control.

[3]  Tong Heng Lee,et al.  A less conservative robust stability test for linear uncertain time-delay systems , 2006, IEEE Trans. Autom. Control..

[4]  A. Perdon,et al.  Unknown Input Observers and Residual Generators for Linear Time Delay Systems , 2006 .

[5]  Iven M. Y. Mareels,et al.  Control of Large-Scale Irrigation Networks , 2007, Proceedings of the IEEE.

[6]  Xavier Litrico,et al.  Automatic Tuning of PI Controllers for an Irrigation Canal Pool , 2007 .

[7]  Jill Slay,et al.  Lessons Learned from the Maroochy Water Breach , 2007, Critical Infrastructure Protection.

[8]  S. Shankar Sastry,et al.  Research Challenges for the Security of Control Systems , 2008, HotSec.

[9]  Xavier Litrico,et al.  Modeling and Control of Hydrosystems , 2009 .

[10]  Peng Ning,et al.  False data injection attacks against state estimation in electric power grids , 2009, CCS.

[11]  Alvaro A. Cárdenas,et al.  Attacks against process control systems: risk assessment, detection, and response , 2011, ASIACCS '11.

[12]  Erik Weyer,et al.  Algorithms for leak detection, estimation, isolation and localization in open water channels☆ , 2011 .

[13]  Xavier Litrico,et al.  Cyber Security of Water SCADA Systems—Part II: Attack Detection Using Enhanced Hydrodynamic Models , 2013, IEEE Transactions on Control Systems Technology.