On the Performance Analysis of Reset Attack in Cyber-Physical Systems

We investigate the impact of reset attacks in cyber-physical systems. Two types of attack models, basic and advanced reset attacks, are considered in this paper. For the basic attack, which only injects a constant to the state estimate without knowing the system parameters, we provide a sufficient and necessary condition under which the adversary cannot destabilize the systems. On the other hand, advanced reset attacks, which can inject a predesigned sequence with full knowledge of system parameters, can be more devastating to cyber-physical systems. Depending on the goals of the adversary, we further categorize advanced reset attacks into Type-I advanced reset attack, where the adversary aims to drive the system estimation error to infinity, and Type-II advanced reset attack, where the goal of the adversary is to drive the system state to some other target states. A sufficient and necessary condition is presented for the existence of Type-I advanced reset attack. A closed-form optimal Type-II advanced reset attack is obtained by dynamic programing. Simulation results are provided to illustrate the effectiveness of both advanced reset attacks.

[1]  Jared R. Leadbetter,et al.  Control in an Information Rich World Report of the Panel on Future Directions in Control , Dynamics , and Systems , 2002 .

[2]  Bharat Bhushan,et al.  Security vulnerabilities, attacks and countermeasures in wireless sensor networks at various layers of OSI reference model: A survey , 2017, 2017 International Conference on Signal Processing and Communication (ICSPC).

[3]  Peter Szor,et al.  The Art of Computer Virus Research and Defense , 2005 .

[4]  Syed Hassan Ahmed,et al.  Cyber Physical System: Architecture, applications and research challenges , 2013, 2013 IFIP Wireless Days (WD).

[5]  Ling Shi,et al.  Jamming Attacks on Remote State Estimation in Cyber-Physical Systems: A Game-Theoretic Approach , 2015, IEEE Transactions on Automatic Control.

[6]  Aaas News,et al.  Book Reviews , 1893, Buffalo Medical and Surgical Journal.

[7]  Subhrakanti Dey,et al.  Estimation in Wireless Sensor Networks With Security Constraints , 2017, IEEE Transactions on Aerospace and Electronic Systems.

[8]  Soummya Kar,et al.  Cyber-Physical Attacks With Control Objectives , 2016, IEEE Transactions on Automatic Control.

[9]  João Pedro Hespanha,et al.  Linear Systems Theory , 2009 .

[10]  Panganamala Ramana Kumar,et al.  Cyber–Physical Systems: A Perspective at the Centennial , 2012, Proceedings of the IEEE.

[11]  J. Efrim Boritz,et al.  IS practitioners' views on core concepts of information integrity , 2005, Int. J. Account. Inf. Syst..

[12]  Dimitri P. Bertsekas,et al.  Dynamic Programming and Optimal Control, Two Volume Set , 1995 .

[13]  Bernhard Kauer OSLO: Improving the Security of Trusted Computing , 2007, USENIX Security Symposium.

[14]  Alan S. Willsky,et al.  A survey of design methods for failure detection in dynamic systems , 1976, Autom..

[15]  Daniel E. Quevedo,et al.  State estimation over Markovian packet dropping links in the presence of an eavesdropper , 2017, 2017 IEEE 56th Annual Conference on Decision and Control (CDC).

[16]  Petros G. Voulgaris,et al.  On optimal ℓ∞ to ℓ∞ filtering , 1995, Autom..

[17]  Qing-Long Han,et al.  State estimation under false data injection attacks: Security analysis and system protection , 2018, Autom..

[18]  Akash Mittal,et al.  A Review of DDOS Attack and its Countermeasures in TCP Based Networks , 2011 .

[19]  Yusnani Mohd Yussoff,et al.  A Review of Physical Attacks and Trusted Platforms in Wireless Sensor Networks , 2012 .

[20]  João M. F. Xavier,et al.  Filter Design With Secrecy Constraints: The MIMO Gaussian Wiretap Channel , 2013, IEEE Transactions on Signal Processing.

[21]  Richard M. Murray,et al.  Panel on Future Directions in Control, Dynamics, and Systems , 2000 .

[22]  Bruno Sinopoli,et al.  Detecting integrity attacks on control systems using robust physical watermarking , 2014, 53rd IEEE Conference on Decision and Control.

[23]  R. K. Mehra,et al.  Correspondence item: An innovations approach to fault detection and diagnosis in dynamic systems , 1971 .

[24]  Bruno Sinopoli,et al.  On the Performance Degradation of Cyber-Physical Systems Under Stealthy Integrity Attacks , 2016, IEEE Transactions on Automatic Control.

[25]  Ling Shi,et al.  Optimal Linear Cyber-Attack on Remote State Estimation , 2017, IEEE Transactions on Control of Network Systems.

[26]  Lang Tong,et al.  Subspace Methods for Data Attack on State Estimation: A Data Driven Approach , 2014, IEEE Transactions on Signal Processing.

[27]  Ling Shi,et al.  Optimal denial-of-service attack on feedback channel against acknowledgment-based sensor power schedule for remote estimation , 2017, 2017 IEEE 56th Annual Conference on Decision and Control (CDC).

[28]  S. Shankar Sastry,et al.  Attacks And Defenses Of Ubiquitous Sensor Networks , 2009 .

[29]  Fatos Xhafa,et al.  Special issue on cyber physical systems , 2013, Computing.

[30]  Farooq Anjum,et al.  Security for Wireless Ad Hoc Networks , 2007 .

[31]  Yuval Ishai,et al.  Private Circuits II: Keeping Secrets in Tamperable Circuits , 2006, EUROCRYPT.