Optimal data integrity attack on actuators in Cyber-Physical Systems

The security issues are of prime importance for Cyber-Physical Systems (CPSs). Most existing works mainly investigate the secure control schemes against malicious attackers. This article analyzes how to design an data integrity attack scheme from the viewpoint of an attacker. The formulation of our approach is basically similar to the one of conventional optimal control method, with different prerequisites and solutions. An output feedback control system under data integrity attacks on actuators is considered in this article. Our work is aimed at constructing an optimal feedback attack law to maximize the error between the attacked system's output and the healthy system's output. Numerical examples are presented to demonstrate the effectiveness of the proposed method.

[1]  Sonia Martínez,et al.  On the Performance Analysis of Resilient Networked Control Systems Under Replay Attacks , 2013, IEEE Transactions on Automatic Control.

[2]  Emanuele Garone,et al.  False data injection attacks against state estimation in wireless sensor networks , 2010, 49th IEEE Conference on Decision and Control (CDC).

[3]  Bruno Sinopoli,et al.  Robust detection in the presence of integrity attacks , 2012, 2012 American Control Conference (ACC).

[4]  Sonia Martínez,et al.  On event-triggered control of linear systems under periodic denial-of-service jamming attacks , 2012, 2012 IEEE 51st IEEE Conference on Decision and Control (CDC).

[5]  Bruno Sinopoli,et al.  Detecting Integrity Attacks on SCADA Systems , 2011 .

[6]  Ling Shi,et al.  Optimal Denial-of-Service attack scheduling against linear quadratic Gaussian control , 2014, 2014 American Control Conference.

[7]  Zhu Han,et al.  Detecting False Data Injection Attacks on Power Grid by Sparse Optimization , 2014, IEEE Transactions on Smart Grid.

[8]  古賀 さゆり Necessary condition for optimal control problems , 2000 .

[9]  R. Sivan,et al.  Optimal control of linear systems with quadratic costs which are not necessarily positive definite , 1969 .

[10]  André Teixeira,et al.  Networked control systems under cyber attacks with applications to power networks , 2010, Proceedings of the 2010 American Control Conference.

[11]  Ling Shi,et al.  Optimal DoS attack policy against remote state estimation , 2013, 52nd IEEE Conference on Decision and Control.

[12]  Paulo Tabuada,et al.  Secure Estimation and Control for Cyber-Physical Systems Under Adversarial Attacks , 2012, IEEE Transactions on Automatic Control.

[13]  Florian Dörfler,et al.  Attack Detection and Identification in Cyber-Physical Systems -- Part II: Centralized and Distributed Monitor Design , 2012, ArXiv.

[14]  Weiyi Liu,et al.  Security analysis for Cyber-Physical Systems against stealthy deception attacks , 2013, 2013 American Control Conference.

[15]  Lang Tong,et al.  Data framing attack on state estimation with unknown network parameters , 2013, 2013 Asilomar Conference on Signals, Systems and Computers.

[16]  Cheolhyeon Kwon,et al.  Hybrid robust controller design: Cyber attack attenuation for Cyber-Physical Systems , 2013, 52nd IEEE Conference on Decision and Control.

[17]  J. V. Breakwell,et al.  On the conjugate point condition for the control problem , 1965 .

[18]  Lang Tong,et al.  Subspace Methods for Data Attack on State Estimation: A Data Driven Approach , 2014, IEEE Transactions on Signal Processing.

[19]  Bruno Sinopoli,et al.  Robust estimation in the presence of integrity attacks , 2013, 52nd IEEE Conference on Decision and Control.