The Vulnerability of Cyber-Physical System Under Stealthy Attacks

In this paper, we study the impact of stealthy attacks on the Cyber-Physical System (CPS) modeled as a stochastic linear system. An attack is characterised by a malicious injection into the system through input, output or both, and it is called stealthy (resp.~strictly stealthy) if it produces bounded changes (resp.~no changes) in the detection residue. Correspondingly, a CPS is called vulnerable (resp.~strictly vulnerable) if it can be destabilized by a stealthy attack (resp.~strictly stealthy attack). We provide necessary and sufficient conditions for the vulnerability and strictly vulnerability. For the invulnerable case, we also provide a performance bound for the difference between healthy and attacked system. Numerical examples are provided to illustrate the theoretical results.

[1]  B. Ripley,et al.  Robust Statistics , 2018, Encyclopedia of Mathematical Geosciences.

[2]  Juan Pablo Conti,et al.  The day the samba stopped , 2010 .

[3]  Ling Shi,et al.  The Performance and Limitations of $\epsilon$- Stealthy Attacks on Higher Order Systems , 2017, IEEE Transactions on Automatic Control.

[4]  Christian Commault,et al.  Generic properties and control of linear structured systems: a survey , 2003, Autom..

[5]  Antonio Bicchi,et al.  Consensus Computation in Unreliable Networks: A System Theoretic Approach , 2010, IEEE Transactions on Automatic Control.

[6]  J. Massey,et al.  Invertibility of linear time-invariant dynamical systems , 1969 .

[7]  Paulo Tabuada,et al.  Security for control systems under sensor and actuator attacks , 2012, 2012 IEEE 51st IEEE Conference on Decision and Control (CDC).

[8]  Tansel Yucelen,et al.  An Adaptive Control Architecture for Mitigating Sensor and Actuator Attacks in Cyber-Physical Systems , 2017, IEEE Transactions on Automatic Control.

[9]  Chi-Tsong Chen,et al.  Linear System Theory and Design , 1995 .

[10]  Bruno Sinopoli,et al.  On the Performance Degradation of Cyber-Physical Systems Under Stealthy Integrity Attacks , 2016, IEEE Transactions on Automatic Control.

[11]  Inseok Hwang,et al.  A Survey of Fault Detection, Isolation, and Reconfiguration Methods , 2010, IEEE Transactions on Control Systems Technology.

[12]  S. Shankar Sastry,et al.  Research Challenges for the Security of Control Systems , 2008, HotSec.

[13]  E. F. Vogel,et al.  A plant-wide industrial process control problem , 1993 .

[14]  Emanuele Garone,et al.  False data injection attacks against state estimation in wireless sensor networks , 2010, 49th IEEE Conference on Decision and Control (CDC).

[15]  Brian D. O. Anderson,et al.  Output-Nulling Invariant and Controllability Subspaces , 1975 .

[16]  Xu Jin,et al.  An adaptive control architecture for leader–follower multiagent systems with stochastic disturbances and sensor and actuator attacks , 2019, Int. J. Control.

[17]  Mi-Ching Tsai,et al.  Robust and Optimal Control , 2014 .

[18]  Bevan K. Youse,et al.  Introduction to real analysis , 1972 .

[19]  Jill Slay,et al.  Lessons Learned from the Maroochy Water Breach , 2007, Critical Infrastructure Protection.

[20]  N. Lawrence Ricker,et al.  Model predictive control of a continuous, nonlinear, two-phase reactor , 1993 .

[21]  Vijay Gupta,et al.  Security in stochastic control systems: Fundamental limitations and performance bounds , 2015, 2015 American Control Conference (ACC).

[22]  Wassim M. Haddad,et al.  An adaptive control architecture for cyber-physical system security in the face of sensor and actuator attacks and exogenous stochastic disturbances , 2017, 2017 IEEE 56th Annual Conference on Decision and Control (CDC).

[23]  Florian Dörfler,et al.  Attack Detection and Identification in Cyber-Physical Systems -- Part II: Centralized and Distributed Monitor Design , 2012, ArXiv.

[24]  Jiming Chen,et al.  Analysis of Consensus-Based Distributed Economic Dispatch Under Stealthy Attacks , 2017, IEEE Transactions on Industrial Electronics.

[25]  A. Willsky,et al.  Failure detection and identification , 1989 .

[26]  G. G. Stokes "J." , 1890, The New Yale Book of Quotations.

[27]  David A. Wagner,et al.  Resilient aggregation in sensor networks , 2004, SASN '04.

[28]  Rafal Rohozinski,et al.  Stuxnet and the Future of Cyber War , 2011 .

[29]  Ling Shi,et al.  A multi-channel transmission schedule for remote state estimation under DoS attacks , 2017, Autom..

[30]  Bruno Sinopoli,et al.  Secure Estimation in the Presence of Integrity Attacks , 2013, IEEE Transactions on Automatic Control.

[31]  Shreyas Sundaram,et al.  The wireless control network: Monitoring for malicious behavior , 2010, 49th IEEE Conference on Decision and Control (CDC).

[32]  Domenico Prattichizzo,et al.  Geometric Control Theory for Linear Systems: a Tutorial , 2010 .

[33]  Wassim M. Haddad,et al.  An Adaptive Control Architecture for Leader-Follower Multiagent Systems with Stochastic Disturbances and Sensor and Actuator Attacks , 2018, 2018 Annual American Control Conference (ACC).

[34]  Peng Ning,et al.  False data injection attacks against state estimation in electric power grids , 2009, CCS.

[35]  Alan S. Willsky,et al.  A survey of design methods for failure detection in dynamic systems , 1976, Autom..

[36]  J. Pearson Linear multivariable control, a geometric approach , 1977 .