Robust Covert Attack Strategies and Their Detection for Switched Cyber-Physical Systems

被引:1
|
作者
Kazemi, MohamadGhasem [1 ]
Khorasani, Khashayar [1 ]
机构
[1] Concordia Univ, Dept Elect & Comp Engn, Montreal, PQ, Canada
关键词
EVENT-TRIGGERED CONTROL;
D O I
10.1109/MED59994.2023.10185827
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, first, a robust covert attack is designed for switched cyber-physical systems with synchronous switching from the attacker-viewpoint in which the attacker makes the system follow their specified reference signal while it remains stealthy in the monitoring system. This attack is defined in the form of H-infinity control problem such that the objectives of the attacker will be achieved. Next, as a defender, a novel detection method will be presented that can detect covert attacks in the switched system. In the proposed method, we do not need any secure channel and even in the case that the attacker can find the model of the auxiliary system and injects another signal on the corresponding communicated information, the cyber-attack can be detected. The only protected information in the proposed method is the considered delay in the mode information of the auxiliary system that needs to be exactly estimated by the attacker to have a completely stealthy attack. Simulation results demonstrate and illustrate the significant performance and capabilities of the proposed method.
引用
收藏
页码:389 / 394
页数:6
相关论文
共 50 条
  • [1] A Robust Covert Attack Strategy for a Class of Uncertain Cyber-Physical Systems
    Li, Xuerong
    Zhang, Ping
    Dong, Hongli
    [J]. IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2024, 69 (03) : 1983 - 1990
  • [2] Covert attack detection for constrained cyber-physical systems regulated by robust model predictive controllers
    Franze, Giuseppe
    Lucia, Walter
    Tedesco, Francesco
    [J]. 2021 AMERICAN CONTROL CONFERENCE (ACC), 2021, : 3267 - 3272
  • [3] Covert Attack Detection Based on Hi/H∞ Optimization for Cyber-Physical Systems
    Qin, Jiao
    Zhong, Maiying
    Liu, Yang
    Wang, Xianghua
    Zhou, Donghua
    [J]. IFAC PAPERSONLINE, 2020, 53 (02): : 4487 - 4492
  • [4] Robust Stealthy Covert Attacks on Cyber-Physical Systems
    Li, Xuerong
    Zhang, Ping
    Dong, Hongli
    [J]. IFAC PAPERSONLINE, 2022, 55 (06): : 520 - 525
  • [5] Data-Driven Covert-Attack Strategies and Countermeasures for Cyber-Physical Systems
    Taheri, Mahdi
    Khorasani, Khashayar
    Shames, Iman
    Meskin, Nader
    [J]. 2021 60TH IEEE CONFERENCE ON DECISION AND CONTROL (CDC), 2021, : 4170 - 4175
  • [6] Robust performance based multiplicative attack detection for cyber-physical systems
    Zhao, Zhen-Gen
    Li, Yu-Zhe
    [J]. Kongzhi Lilun Yu Yingyong/Control Theory and Applications, 2022, 39 (10): : 1952 - 1960
  • [7] Adaptive robust FDI attack detection for cyber-physical systems with disturbance
    Li, Lu
    Chen, Yong
    Li, Meng
    Liu, Yuezhi
    [J]. ICT EXPRESS, 2023, 9 (04): : 656 - 663
  • [8] Setpoint Attack Detection in Cyber-Physical Systems
    Lucia, Walter
    Gheitasi, Kian
    Ghaderi, Mohsen
    [J]. IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2021, 66 (05) : 2332 - 2338
  • [9] Attack Detection and Identification in Cyber-Physical Systems
    Pasqualetti, Fabio
    Doerfler, Florian
    Bullo, Francesco
    [J]. IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2013, 58 (11) : 2715 - 2729
  • [10] Cyber attack estimation and detection for cyber-physical power systems
    Li, Lei
    Wang, Wenting
    Ma, Qiang
    Pan, Kunpeng
    Liu, Xin
    Lin, Lin
    Li, Jian
    [J]. APPLIED MATHEMATICS AND COMPUTATION, 2021, 400