Cyber physical attacks constrained by control objectives

This paper studies attackers with specific objectives against a cyber physical system. The attacker performs an integrity attack in order to move the system to a target state while evading detection over a finite time window. We formulate and solve an optimal control problem that captures the attacker's objective - the solution gives the optimal sequence of attacks. We provide a sufficient condition for the existence of an optimal attack sequence. Finally, we demonstrate our proposed attack strategy in a numerical example.

[1]  Soummya Kar,et al.  Cyber-physical systems: Dynamic sensor attacks and strong observability , 2015, 2015 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[2]  Bruno Sinopoli,et al.  Secure control against replay attacks , 2009, 2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[3]  Paulo Tabuada,et al.  Secure Estimation and Control for Cyber-Physical Systems Under Adversarial Attacks , 2012, IEEE Transactions on Automatic Control.

[4]  Florian Dörfler,et al.  Attack Detection and Identification in Cyber-Physical Systems -- Part II: Centralized and Distributed Monitor Design , 2012, ArXiv.

[5]  Alvaro A. Cárdenas,et al.  Attacks against process control systems: risk assessment, detection, and response , 2011, ASIACCS '11.

[6]  Peng Ning,et al.  False data injection attacks against state estimation in electric power grids , 2011, TSEC.

[7]  Alan S. Willsky,et al.  A survey of design methods for failure detection in dynamic systems , 1976, Autom..

[8]  Stephen P. Boyd,et al.  Convex Optimization , 2004, Algorithms and Theory of Computation Handbook.

[9]  K. J. Burnham,et al.  4-dimensional control of a remotely piloted vehicle , 1996 .

[10]  Soummya Kar,et al.  Dynamic Attack Detection in Cyber-Physical Systems With Side Initial State Information , 2015, IEEE Transactions on Automatic Control.

[11]  Jason L. Speyer,et al.  Stochastic Processes, Estimation, and Control , 2008, Advances in design and control.

[12]  S. Shankar Sastry,et al.  Research Challenges for the Security of Control Systems , 2008, HotSec.

[13]  Bruno Sinopoli,et al.  Detecting Integrity Attacks on SCADA Systems , 2011 .

[14]  Bruno Sinopoli,et al.  Integrity attacks on cyber-physical systems , 2012, HiCoNS '12.

[15]  Bruno Sinopoli,et al.  Detecting integrity attacks on control systems using robust physical watermarking , 2014, 53rd IEEE Conference on Decision and Control.

[16]  Matti Valovirta,et al.  Experimental Security Analysis of a Modern Automobile , 2011 .

[17]  Karl Henrik Johansson,et al.  Attack models and scenarios for networked control systems , 2012, HiCoNS '12.