Security analysis of cyber-physical systems using H 2 norm

In this study, the effect of attacks on networked systems is studied and a new security index to analyse the impact of such attacks using H 2 norms of attacks to target and monitoring outputs is proposed. In addition, optimisation problems for selecting inputs or outputs that point to attacks with maximum impact and least detectability are posed, and subsequently solved. To demonstrate the applicability of the analysis methods proposed in this study, the IEEE 9-bus and 50-generator 145-bus systems are considered as test cases.

[1]  R. Nikoukhah,et al.  A mixed I approach to simultaneous fault detection and control , 2004, Autom..

[2]  Yun Zhang,et al.  On finding bicliques in bipartite graphs: a novel algorithm and its application to the integration of diverse biological data types , 2013, BMC Bioinformatics.

[3]  Milind Dawande,et al.  On Bipartite and Multipartite Clique Problems , 2001, J. Algorithms.

[4]  Karl Henrik Johansson,et al.  On Security Indices for State Estimators in Power Networks , 2010 .

[5]  Juan Pablo Vielma,et al.  An integer linear programming approach for bilinear integer programming , 2012, Oper. Res. Lett..

[6]  Florian Dörfler,et al.  Attack Detection and Identification in Cyber-Physical Systems -- Part II: Centralized and Distributed Monitor Design , 2012, ArXiv.

[7]  Karl Henrik Johansson,et al.  Quantifying Cyber-Security for Networked Control Systems , 2013, CPSW@CISS.

[8]  Sai Pushpak,et al.  Vulnerability analysis of large-scale dynamical networks to coordinated attacks , 2014, 2014 4th Australian Control Conference (AUCC).

[9]  René Peeters,et al.  The maximum edge biclique problem is NP-complete , 2003, Discret. Appl. Math..

[10]  Karl Henrik Johansson,et al.  Cyber security analysis of state estimators in electric power systems , 2010, 49th IEEE Conference on Decision and Control (CDC).

[11]  Karl Henrik Johansson,et al.  Efficient Computations of a Security Index for False Data Attacks in Power Networks , 2012, IEEE Transactions on Automatic Control.

[12]  Babu Narayanan,et al.  POWER SYSTEM STABILITY AND CONTROL , 2015 .

[13]  T. Summers,et al.  Security Analysis of Networked Systems in the Presence of Impulsive Attacks , 2014 .

[14]  Florian Dörfler,et al.  Kron Reduction of Graphs With Applications to Electrical Networks , 2011, IEEE Transactions on Circuits and Systems I: Regular Papers.

[15]  Manfred W. Padberg,et al.  The boolean quadric polytope: Some characteristics, facets and relatives , 1989, Math. Program..

[16]  Andras Varga Integrated algorithm for solving H2-optimal fault detection and isolation problems , 2010, 2010 Conference on Control and Fault-Tolerant Systems (SysTol).

[17]  Siddharth Sridhar,et al.  Cyber–Physical System Security for the Electric Power Grid , 2012, Proceedings of the IEEE.

[18]  Toshimde Ibaraki Integer programming formulation of combinatorial optimization problems , 1976, Discret. Math..