Covert Misappropriation of Networked Control Systems: Presenting a Feedback Structure

The increasing availability of Internet connectivity and networked actuation and sensing components has supported the growth in control systems operated over public networks. Controllers and plants no longer need to be physically colocated as measurements and actuation signals can be sent digitally. Supervisory systems can monitor and control geographically widespread components. However, such systems are now exposed to the risk of remote interference. A feedback structure that allows an attacker to take over control of the plant while remaining hidden from the control and supervisory system(s) is presented. The objective is not to facilitate such attacks but rather to make clear the degree to which the takeover of plant control can be hidden when a sophisticated attacker has some plant knowledge and signal intervention capabilities.

[1]  Roy S. Smith,et al.  A Decoupled Feedback Structure for Covertly Appropriating Networked Control Systems , 2011 .

[2]  Vicenç Puig,et al.  MIMO Smith predictor: Global and structured robust performance analysis , 2009 .

[3]  Jianguo Zhou,et al.  Global speed control of separately excited DC motor , 2001, 2001 IEEE Power Engineering Society Winter Meeting. Conference Proceedings (Cat. No.01CH37194).

[4]  Xavier Litrico,et al.  Cyber Security of Water SCADA Systems—Part I: Analysis and Experimentation of Stealthy Deception Attacks , 2013, IEEE Transactions on Control Systems Technology.

[5]  Karl Henrik Johansson,et al.  Cyber security analysis of state estimators in electric power systems , 2010, 49th IEEE Conference on Decision and Control (CDC).

[6]  Karl Henrik Johansson,et al.  On Security Indices for State Estimators in Power Networks , 2010 .

[7]  Bruno Sinopoli,et al.  Detecting Integrity Attacks on SCADA Systems , 2011 .

[8]  Karl Henrik Johansson,et al.  Data Attack Isolation in Power Networks Using Secure Voltage Magnitude Measurements , 2014, IEEE Transactions on Smart Grid.

[9]  Florian Dörfler,et al.  Attack Detection and Identification in Cyber-Physical Systems -- Part II: Centralized and Distributed Monitor Design , 2012, ArXiv.

[10]  Vinay M. Igure,et al.  Security issues in SCADA networks , 2006, Comput. Secur..

[11]  Karl Henrik Johansson,et al.  A secure control framework for resource-limited adversaries , 2012, Autom..

[12]  S. Bolognani,et al.  Design of a flux weakening control scheme for DC motor drives featuring full voltage operation , 2008, 2008 43rd International Universities Power Engineering Conference.

[13]  Xavier Litrico,et al.  Cyber Security of Water SCADA Systems—Part II: Attack Detection Using Enhanced Hydrodynamic Models , 2013, IEEE Transactions on Control Systems Technology.