Cyber physical attacks with control objectives and detection constraints

This paper studies attackers with control objectives and explicit detection constraints against cyber-physical systems. The cyber-physical system is equipped with a Kalman filter and an attack detector that uses the innovations process of the Kalman filter. The attacker performs an integrity attack on the actuators and sensors of the system with the aim of moving the system to a target state under the constraint that the probability of him or her being detected is equal to the false alarm probability of the attack detector. We formulate and solve a constrained optimization problem that gives the optimal sequence of attacks and demonstrate our attack strategy in a numerical example.

[1]  Bruno Sinopoli,et al.  Integrity attacks on cyber-physical systems , 2012, HiCoNS '12.

[2]  Paulo Tabuada,et al.  Secure Estimation and Control for Cyber-Physical Systems Under Adversarial Attacks , 2012, IEEE Transactions on Automatic Control.

[3]  Florian Dörfler,et al.  Attack Detection and Identification in Cyber-Physical Systems -- Part II: Centralized and Distributed Monitor Design , 2012, ArXiv.

[4]  Soummya Kar,et al.  Dynamic Attack Detection in Cyber-Physical Systems With Side Initial State Information , 2015, IEEE Transactions on Automatic Control.

[5]  Soummya Kar,et al.  Cyber-physical systems: Dynamic sensor attacks and strong observability , 2015, 2015 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[6]  Bruno Sinopoli,et al.  Secure control against replay attacks , 2009, 2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[7]  Peng Ning,et al.  False data injection attacks against state estimation in electric power grids , 2011, TSEC.

[8]  Bruno Sinopoli,et al.  Detecting Integrity Attacks on SCADA Systems , 2011 .

[9]  K. J. Burnham,et al.  4-dimensional control of a remotely piloted vehicle , 1996 .

[10]  S. Shankar Sastry,et al.  Research Challenges for the Security of Control Systems , 2008, HotSec.

[11]  B. Molinari A strong controllability and observability in linear multivariable control , 1976 .

[12]  Matti Valovirta,et al.  Experimental Security Analysis of a Modern Automobile , 2011 .

[13]  L. Silverman,et al.  Structure and stability of discrete-time optimal systems , 1971 .

[14]  Alvaro A. Cárdenas,et al.  Attacks against process control systems: risk assessment, detection, and response , 2011, ASIACCS '11.

[15]  Alan S. Willsky,et al.  A survey of design methods for failure detection in dynamic systems , 1976, Autom..

[16]  Soummya Kar,et al.  Cyber-Physical Attacks With Control Objectives , 2016, IEEE Transactions on Automatic Control.

[17]  Jason L. Speyer,et al.  Stochastic Processes, Estimation, and Control , 2008, Advances in design and control.

[18]  Soummya Kar,et al.  Cyber physical attacks constrained by control objectives , 2016, 2016 American Control Conference (ACC).

[19]  Karl Henrik Johansson,et al.  Attack models and scenarios for networked control systems , 2012, HiCoNS '12.