Cyber-physical systems: Dynamic sensor attacks and strong observability

We study cyber-physical systems subject to dynamic sensor attacks, relating them to the system's strong observability. First, we find necessary and sufficient conditions for an attacker to create a dynamically undetectable sensor attack and relate these conditions to properties of the system dynamics eigenvectors. Next, we provide an index that gives the minimum number of sensors that must be attacked in order for an attack to be undetectable. Finally, we illustrate our results with a numerical example on the Quadruple Tank Process.

[1]  Paulo Tabuada,et al.  Event-Triggered State Observers for Sparse Sensor Noise/Attacks , 2013, IEEE Transactions on Automatic Control.

[2]  Yilin Mo,et al.  False Data Injection Attacks in Control Systems , 2010 .

[3]  S. Shankar Sastry,et al.  Research Challenges for the Security of Control Systems , 2008, HotSec.

[4]  Karl Henrik Johansson,et al.  The quadruple-tank process: a multivariable laboratory process with an adjustable zero , 2000, IEEE Trans. Control. Syst. Technol..

[5]  B. Molinari A strong controllability and observability in linear multivariable control , 1976 .

[6]  Peng Ning,et al.  False data injection attacks against state estimation in electric power grids , 2009, CCS.

[7]  B. Molinari,et al.  Extended controllability and observability for linear systems , 1976 .

[8]  Karl Henrik Johansson,et al.  Revealing stealthy attacks in control systems , 2012, 2012 50th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[9]  Chi-Tsong Chen,et al.  Linear System Theory and Design , 1995 .

[10]  Alvaro A. Cárdenas,et al.  Attacks against process control systems: risk assessment, detection, and response , 2011, ASIACCS '11.

[11]  Harry L. Trentelman,et al.  Control theory for linear systems , 2002 .

[12]  Hovav Shacham,et al.  Comprehensive Experimental Analyses of Automotive Attack Surfaces , 2011, USENIX Security Symposium.

[13]  Peng Ning,et al.  False data injection attacks against state estimation in electric power grids , 2011, TSEC.

[14]  Paulo Tabuada,et al.  Secure Estimation and Control for Cyber-Physical Systems Under Adversarial Attacks , 2012, IEEE Transactions on Automatic Control.

[15]  Florian Dörfler,et al.  Attack Detection and Identification in Cyber-Physical Systems -- Part II: Centralized and Distributed Monitor Design , 2012, ArXiv.