Covert attacks against output tracking control of cyber-physical systems

This paper is concerned with the problem of designing successful covert attacks against output tracking control of cyber-physical systems from the covert agent's angle. Based on the perfect model knowledge and no model knowledge, the covert agent designs two kinds of covert attacks which can compromise the output tracking control system without being detected. Two sufficient conditions under which the covert agent can successfully compromise the output tracking control system are proposed. The designed covert attacks are illustrated through two numerical examples.

[1]  Bruno Sinopoli,et al.  Detecting integrity attacks on control systems using robust physical watermarking , 2014, 53rd IEEE Conference on Decision and Control.

[2]  Panganamala Ramana Kumar,et al.  Cyber–Physical Systems: A Perspective at the Centennial , 2012, Proceedings of the IEEE.

[3]  Lihua Xie,et al.  Resilience and Performance Analysis for State Estimation against Integrity Attacks , 2016 .

[4]  T. M. Chen,et al.  Stuxnet, the real start of cyber warfare? [Editor's Note] , 2010, IEEE Netw..

[5]  Yilin Mo,et al.  Security in cyber-physical systems: Controller design against Known-Plaintext Attack , 2015, 2015 54th IEEE Conference on Decision and Control (CDC).

[6]  Ling Shi,et al.  Optimal Linear Cyber-Attack on Remote State Estimation , 2017, IEEE Transactions on Control of Network Systems.

[7]  Jill Slay,et al.  Lessons Learned from the Maroochy Water Breach , 2007, Critical Infrastructure Protection.

[8]  Soummya Kar,et al.  Cyber physical attacks constrained by control objectives , 2016, 2016 American Control Conference (ACC).

[9]  Vijay Gupta,et al.  Data-injection attacks in stochastic control systems: Detectability and performance tradeoffs , 2017, Autom..

[10]  Bruno Sinopoli,et al.  Detecting Integrity Attacks on SCADA Systems , 2011 .

[11]  Sonia Martínez,et al.  On the Performance Analysis of Resilient Networked Control Systems Under Replay Attacks , 2013, IEEE Transactions on Automatic Control.

[12]  Hyungbo Shim,et al.  When adversary encounters uncertain cyber-physical systems: Robust zero-dynamics attack with disclosure resources , 2016, 2016 IEEE 55th Conference on Decision and Control (CDC).

[13]  Bruno Sinopoli,et al.  On the Performance Degradation of Cyber-Physical Systems Under Stealthy Integrity Attacks , 2016, IEEE Transactions on Automatic Control.

[14]  Bruno Sinopoli,et al.  Secure Estimation in the Presence of Integrity Attacks , 2013, IEEE Transactions on Automatic Control.

[15]  Karl Henrik Johansson,et al.  A Cyber Security Study of a SCADA Energy Management System: Stealthy Deception Attacks on the State Estimator , 2010, ArXiv.

[16]  Ling Shi,et al.  The Performance and Limitations of $\epsilon$- Stealthy Attacks on Higher Order Systems , 2017, IEEE Transactions on Automatic Control.

[17]  Ruochi Zhang,et al.  Stealthy control signal attacks in vector LQG systems , 2016, 2016 American Control Conference (ACC).

[18]  Lei Guo,et al.  Resilient Control of Networked Control System Under DoS Attacks: A Unified Game Approach , 2016, IEEE Transactions on Industrial Informatics.

[19]  Ling Shi,et al.  Optimal DoS Attack Scheduling in Wireless Networked Control System , 2016, IEEE Transactions on Control Systems Technology.

[20]  Ruixin Niu,et al.  System state estimation in the presence of false information injection , 2012, 2012 IEEE Statistical Signal Processing Workshop (SSP).

[21]  Yilin Mo,et al.  False Data Injection Attacks in Control Systems , 2010 .

[22]  Ling Shi,et al.  A multi-channel transmission schedule for remote state estimation under DoS attacks , 2017, Autom..

[23]  Ali Tajer,et al.  Robust false data injection attacks in electricity markets by limited adversaries , 2016, 2016 50th Asilomar Conference on Signals, Systems and Computers.

[24]  Donghua Zhou,et al.  Two-Channel False Data Injection Attacks Against Output Tracking Control of Networked Systems , 2016, IEEE Transactions on Industrial Electronics.

[25]  Guo-Ping Liu,et al.  Design and Implementation of Secure Networked Predictive Control Systems Under Deception Attacks , 2012, IEEE Transactions on Control Systems Technology.

[26]  Tongwen Chen,et al.  Stochastic Detector against linear deception attacks on remote state estimation , 2016, 2016 IEEE 55th Conference on Decision and Control (CDC).

[27]  Ling Shi,et al.  Guest Editorial Special Issue on Secure Control of Cyber-Physical Systems , 2017, IEEE Trans. Control. Netw. Syst..

[28]  Donghua Zhou,et al.  Output Tracking Control for Networked Systems: A Model-Based Prediction Approach , 2014, IEEE Transactions on Industrial Electronics.

[29]  Sun Dehui,et al.  False data injection attacks for output tracking control systems , 2015, 2015 34th Chinese Control Conference (CCC).

[30]  Ling Shi,et al.  Detection Against Linear Deception Attacks on Multi-Sensor Remote State Estimation , 2018, IEEE Transactions on Control of Network Systems.

[31]  Karl Henrik Johansson,et al.  A secure control framework for resource-limited adversaries , 2012, Autom..

[32]  Paulo Tabuada,et al.  Secure Estimation and Control for Cyber-Physical Systems Under Adversarial Attacks , 2012, IEEE Transactions on Automatic Control.

[33]  Florian Dörfler,et al.  Attack Detection and Identification in Cyber-Physical Systems -- Part II: Centralized and Distributed Monitor Design , 2012, ArXiv.

[34]  Weiyi Liu,et al.  Security analysis for Cyber-Physical Systems against stealthy deception attacks , 2013, 2013 American Control Conference.

[35]  T. Lu,et al.  Inverses of 2 × 2 block matrices , 2002 .