Optimal switching integrity attacks in cyber-physical systems

In this paper, an optimal switching data integrity attack schedule method is presented. It is assumed that an attacker is able to inject false data to partial actuators of a healthy system at each instant. Optimal switching attack represents a growing class of cyber-physical attacks that aim to damage a target system via a controlled switching of attacked units. A feedback attack law is proposed to maximize a weighted quadratic performance. Two switching conditions are designed to obtain the optimal sequence of the attacked actuators via the Maximum Principle. Finally, numerical results are provided to illustrate the effectiveness of the proposed method.

[1]  George J. Pappas,et al.  Stochastic game approach for replay attack detection , 2013, 52nd IEEE Conference on Decision and Control.

[2]  Ali Heydari,et al.  Optimal Switching and Control of Nonlinear Switching Systems Using Approximate Dynamic Programming , 2014, IEEE Transactions on Neural Networks and Learning Systems.

[3]  Wenjie Lu,et al.  A Hybrid-Adaptive Dynamic Programming Approach for the Model-Free Control of Nonlinear Switched Systems , 2016, IEEE Transactions on Automatic Control.

[4]  Karl Henrik Johansson,et al.  Cyber security analysis of state estimators in electric power systems , 2010, 49th IEEE Conference on Decision and Control (CDC).

[5]  Andrey V. Savkin,et al.  Set-Valued State Estimation and Attack Detection for Uncertain Descriptor Systems , 2013, IEEE Signal Processing Letters.

[6]  Minghui Zhu,et al.  Stackelberg-game analysis of correlated attacks in cyber-physical systems , 2011, Proceedings of the 2011 American Control Conference.

[7]  Emanuele Garone,et al.  False data injection attacks against state estimation in wireless sensor networks , 2010, 49th IEEE Conference on Decision and Control (CDC).

[8]  Panos J. Antsaklis,et al.  Optimal control of switched systems based on parameterization of the switching instants , 2004, IEEE Transactions on Automatic Control.

[9]  S. Shankar Sastry,et al.  Safe and Secure Networked Control Systems under Denial-of-Service Attacks , 2009, HSCC.

[10]  Xuping Xu,et al.  Optimal control of switched systems: new results and open problems , 2000, Proceedings of the 2000 American Control Conference. ACC (IEEE Cat. No.00CH36334).

[11]  Raymond A. DeCarlo,et al.  Optimal control of switching systems , 2005, Autom..

[12]  Ling Shi,et al.  Optimal DoS attack policy against remote state estimation , 2013, 52nd IEEE Conference on Decision and Control.

[13]  Paulo Tabuada,et al.  Security for control systems under sensor and actuator attacks , 2012, 2012 IEEE 51st IEEE Conference on Decision and Control (CDC).

[14]  Tamer Basar,et al.  Optimal control in the presence of an intelligent jammer with limited actions , 2010, 49th IEEE Conference on Decision and Control (CDC).

[15]  Lang Tong,et al.  Malicious Data Attacks on the Smart Grid , 2011, IEEE Transactions on Smart Grid.

[16]  Bruno Sinopoli,et al.  False Data Injection Attacks in Electricity Markets , 2010, 2010 First IEEE International Conference on Smart Grid Communications.