Covert attack on a discrete-time system with limited use of the available disruption resources

This paper addresses the design of a covert attack on a linear multivariable dynamical system with input hard constraints. The system evolves in the discrete-time domain and is subject to performance and alarm state constraints, both represented by convex and compact polyhedral sets. A contractive control law guarantees positive invariance of the performance set, while ensuring asymptotic stability of the origin with maximum convergence rate. An attacker succeeds in gaining control of the system and sends false control commands, when it is necessary, eventually driving the state vector outside the performance set without violating any alarm constraints. Simulation studies highlight the results of this adversary control scheme.

[1]  Karl Henrik Johansson,et al.  Attack models and scenarios for networked control systems , 2012, HiCoNS '12.

[2]  J. Hennet,et al.  Feedback control of linear discrete-time systems under state and control constraints , 1988 .

[3]  Florian Dörfler,et al.  Cyber-physical attacks in power networks: Models, fundamental limitations and monitor design , 2011, IEEE Conference on Decision and Control and European Control Conference.

[4]  Anthony Tzes,et al.  Adversary control strategies for discrete-time systems , 2014, 2014 European Control Conference (ECC).

[5]  Sorin Olaru,et al.  Further results on the linear constrained regulation problem , 2013, 21st Mediterranean Conference on Control and Automation.

[6]  Elena De Santis,et al.  A polytopic game , 2000, Autom..

[7]  Franco Blanchini,et al.  Set-theoretic methods in control , 2007 .

[8]  Daniel Liberzon,et al.  Switching in Systems and Control , 2003, Systems & Control: Foundations & Applications.

[9]  Franco Blanchini,et al.  Set invariance in control , 1999, Autom..

[10]  G. Bitsoris On the positive invariance of polyhedral sets for discrete-time systems , 1988 .

[11]  G. Bitsoris Positively invariant polyhedral sets of discrete-time linear systems , 1988 .

[12]  Florian Dörfler,et al.  Attack Detection and Identification in Cyber-Physical Systems -- Part II: Centralized and Distributed Monitor Design , 2012, ArXiv.

[13]  Stefan Węgrzyn Introduction à l'étude de la stabilité dans les espaces métriques , 1971 .

[14]  John Lygeros,et al.  A robust policy for Automatic Generation Control cyber attack in two area power network , 2010, 49th IEEE Conference on Decision and Control (CDC).

[15]  John Lygeros,et al.  Cyber attack in a two-area power system: Impact identification using reachability , 2010, Proceedings of the 2010 American Control Conference.

[16]  André Teixeira,et al.  Networked control systems under cyber attacks with applications to power networks , 2010, Proceedings of the 2010 American Control Conference.