Novel Stealthy Attack and Defense Strategies for Networked Control Systems

被引:31
|
作者
Mao, Yanbing [1 ]
Jafarnejadsani, Hamidreza [2 ]
Zhao, Pan [1 ]
Akyol, Emrah [3 ]
Hovakimyan, Naira [1 ]
机构
[1] Univ Illinois, Dept Mech Sci & Engn, Urbana, IL 61801 USA
[2] Stevens Inst Technol, Dept Mech Engn, Hoboken, NJ 07310 USA
[3] Binghamton Univ SUNY, Dept Elect & Comp Engn, Binghamton, NY 13902 USA
基金
美国国家科学基金会;
关键词
Topology; Network topology; Monitoring; Switches; Privacy; System dynamics; Attack detection; multiagent systems; privacy; security; topology attack; zero-dynamics attack (ZDA); SYNCHRONIZATION; FLOCKING;
D O I
10.1109/TAC.2020.2997363
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This article studies novel attack and defense strategies, based on a class of stealthy attacks, namely the zero-dynamics attack (ZDA), for multiagent control systems. ZDA poses a formidable security challenge since its attack signal is hidden in the null space of the state-space representation of the control system and hence it can evade conventional detection methods. An intuitive defense strategy builds on changing the aforementioned representation via switching through a set of carefully crafted topologies. In this article, we propose realistic ZDA variations where the attacker is aware of this topology-switching strategy, and hence employs the following policies to avoid detection: first, pause, update, and resume ZDA according to the knowledge of switching topologies; and second, cooperate with a concurrent stealthy topology attack that alters network topology at switching times, such that the original ZDA is feasible under the corrupted topology. We first systematically study the proposed ZDA variations, and then develop defense strategies against them under the realistic assumption that the defender has no knowledge of attack starting, pausing, and resuming times and the number of misbehaving agents. Particularly, we characterize conditions for detectability of the proposed ZDA variations, in terms of the network topologies to be maintained, the set of agents to be monitored, and the measurements of the monitored agents that should be extracted, while simultaneously preserving the privacy of the states of the nonmonitored agents. We then propose an attack detection algorithm based on the Luenberger observer, using the characterized detectability conditions. We provide numerical simulation results to demonstrate our theoretical findings.
引用
收藏
页码:3847 / 3862
页数:16
相关论文
共 50 条
  • [21] H∞ Control for Networked Control Systems with Packet Loss and Deception attack
    Shi, Huiru
    Zhang, Yijun
    39TH YOUTH ACADEMIC ANNUAL CONFERENCE OF CHINESE ASSOCIATION OF AUTOMATION, YAC 2024, 2024, : 555 - 560
  • [22] A novel secure observer-based controller and attack detection scheme for Networked Control Systems
    Sadeghikhorami, Ladan
    Varadharajan, Vijay
    Safavi, Ali Akbar
    INFORMATION SCIENCES, 2021, 575 : 185 - 205
  • [23] Joint interval estimation of state and fault for networked control systems under stealthy attacks
    Li J.
    Jiang S.
    Pan F.
    Kongzhi yu Juece/Control and Decision, 2023, 38 (12): : 3418 - 3426
  • [24] A Novel Dynamic Watermarking-Based Attack Detection Method for Uncertain Networked Control Systems
    Zhang, Changda
    Du, Dajun
    Zhang, Jingfan
    Fei, Minrui
    Rakic, Aleksandar
    IEEE INTERNATIONAL CONFERENCE ON RECENT ADVANCES IN SYSTEMS SCIENCE AND ENGINEERING (IEEE RASSE 2021), 2021,
  • [25] Novel Architecture for Networked Control Systems
    Rakic, Aleksandar Z.
    Bezanic, Nikola S.
    Popovic, Ivan T.
    2016 INTERNATIONAL SYMPOSIUM ON INDUSTRIAL ELECTRONICS (INDEL), 2016,
  • [26] Adversarial attack and defense strategies for deep speaker recognition systems
    Jati, Arindam
    Hsu, Chin-Cheng
    Pal, Monisankha
    Peri, Raghuveer
    AbdAlmageed, Wael
    Narayanan, Shrikanth
    COMPUTER SPEECH AND LANGUAGE, 2021, 68
  • [27] Adversarial Attack and Defense Strategies of Speaker Recognition Systems: A Survey
    Tan, Hao
    Wang, Le
    Zhang, Huan
    Zhang, Junjian
    Shafiq, Muhammad
    Gu, Zhaoquan
    ELECTRONICS, 2022, 11 (14)
  • [28] Disconnection-aware Attack Detection in Networked Control Systems
    Sasahara, Hampei
    Ishizaki, Takayuki
    Imura, Jun-ichi
    Sandberg, Henrik
    IFAC PAPERSONLINE, 2020, 53 (02): : 3515 - 3520
  • [29] Resilient Control of Networked Switched Systems Against DoS Attack
    Lian, Jie
    Huang, Xi
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2022, 18 (04) : 2354 - 2363
  • [30] Optimal Jamming Attack Scheduling in Networked Sensing and Control Systems
    Zhang, Lifu
    Zhang, Heng
    Li, Cunhua
    Ni, Buxi
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2015,