Undetectable sensor and actuator attacks for observer based controlled Cyber-Physical Systems

Cyber-Physical Systems (CPSs) have vital importance because of their applications in many different areas. Attacks on these CPSs can cause considerable impact on public safety in addition to economic losses. Although studies on increasing the protection and reliability of CPSs against random malfunction are available, protection of CPSs against malignant attacks is needed. In particular, wireless sensor and actuator networks increase the attack risk. Even when a CPS functions properly, there can be undetectable attacks increasing costs or waiting for the right time to attack and destroy the CPS. In this paper, undetectable sensor and actuator attacks on observer-based controlled systems are theoretically analyzed. Explicit equations of both undetectable sensor and actuator signal attacks are derived. In addition, it is proved that the actuator signal attack is optimal in the sense of minimal energy attack signal. Numerical experiments are provided to validate the theoretical analyses and illustrate the effect of the undetectable attack signals.

[1]  Steve Goddard,et al.  Cyber-physical systems in industrial process control , 2008, SIGBED.

[2]  Jason A. Laska,et al.  A mathematical framework for the analysis of cyber-resilient control systems , 2013, 2013 6th International Symposium on Resilient Control Systems (ISRCS).

[3]  Siddhartha Kumar Khaitan,et al.  Design Techniques and Applications of Cyberphysical Systems: A Survey , 2015, IEEE Systems Journal.

[4]  Insup Lee,et al.  Medical Cyber Physical Systems , 2010, Design Automation Conference.

[5]  Chen-Khong Tham,et al.  Participatory Cyber Physical System in Public Transport Application , 2011, 2011 Fourth IEEE International Conference on Utility and Cloud Computing.

[6]  Quanyan Zhu,et al.  Robust and resilient control design for cyber-physical systems with an application to power systems , 2011, IEEE Conference on Decision and Control and European Control Conference.

[7]  Juan Pablo Conti,et al.  The day the samba stopped , 2010 .

[8]  Jill Slay,et al.  Lessons Learned from the Maroochy Water Breach , 2007, Critical Infrastructure Protection.

[9]  J. Doyle,et al.  Robust and optimal control , 1995, Proceedings of 35th IEEE Conference on Decision and Control.

[10]  F. Bullo Ucsb,et al.  Attack Detection and Identification in Cyber-Physical Systems , 2012 .

[11]  Peng Ning,et al.  False data injection attacks against state estimation in electric power grids , 2011, TSEC.

[12]  Jan Kleissl,et al.  Cyber-physical energy systems: Focus on smart buildings , 2010, Design Automation Conference.

[13]  Jin Dong,et al.  Finite energy and bounded actuator attacks on cyber-physical systems , 2015, 2015 European Control Conference (ECC).

[14]  S. Shankar Sastry,et al.  Research Challenges for the Security of Control Systems , 2008, HotSec.

[15]  Florian Dörfler,et al.  Attack Detection and Identification in Cyber-Physical Systems -- Part II: Centralized and Distributed Monitor Design , 2012, ArXiv.

[16]  S. Shankar Sastry,et al.  Safe and Secure Networked Control Systems under Denial-of-Service Attacks , 2009, HSCC.

[17]  Bruno Sinopoli,et al.  Challenges for Securing Cyber Physical Systems , 2009 .

[18]  Jin Dong,et al.  Finite energy and bounded attacks on control system sensor signals , 2014, 2014 American Control Conference.

[19]  Uwe Baumgarten,et al.  A Model for Sequence Based Power Management in Cyber Physical Systems , 2011, ICT-GLOW.

[20]  Guoliang Xing,et al.  Fidelity-Aware Utilization Control for Cyber-Physical Surveillance Systems , 2012, IEEE Transactions on Parallel and Distributed Systems.

[21]  Wenjun Xu,et al.  A Cyber-Physical System for Public Environment Perception and Emergency Handling , 2011, 2011 IEEE International Conference on High Performance Computing and Communications.

[22]  S. Shankar Sastry,et al.  Secure Control: Towards Survivable Cyber-Physical Systems , 2008, 2008 The 28th International Conference on Distributed Computing Systems Workshops.