Real-Time Attack-Recovery for Cyber-Physical Systems Using Linear Approximations

被引:22
|
作者
Zhang, Lin [1 ]
Chen, Xin [2 ]
Kong, Fanxin [1 ]
Cardenas, Alvaro A. [3 ]
机构
[1] Syracuse Univ, Dept Elect Engn & Comp Sci, Syracuse, NY 13244 USA
[2] Univ Dayton, Dept Comp Sci, Dayton, OH 45469 USA
[3] Univ Calif Santa Cruz, Dept Comp Sci & Engn, Santa Cruz, CA 95064 USA
关键词
cyber-physical systems; security; sensor attacks; recovery; real-time; SECURITY; DESIGN;
D O I
10.1109/RTSS49844.2020.00028
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Attack detection and recovery are fundamental elements for the operation of safe and resilient cyber-physical systems. Most of the literature focuses on attack-detection, while leaving attack-recovery as an open problem. In this paper, we propose novel attack-recovery control for securing cyber-physical systems. Our recovery control consists of new concepts required for a safe response to attacks, which includes the removal of poisoned data, the estimation of the current state, a prediction of the reachable states, and the online design of a new controller to recover the system. The synthesis of such recovery controllers for cyber-physical systems has barely investigated so far. To fill this void, we present a formal method-based approach to online compute a recovery control sequence that steers a system under an ongoing sensor attack from the current state to a target state such that no unsafe state is reachable on the way. The method solves a reach-avoid problem on a Linear Time-Invariant (LTI) model with the consideration of an error bound E > 0. The obtained recovery control is guaranteed to work on the original system if the behavioral difference between the LTI model and the system's plant dynamics is not larger than E. Since a recovery control should be obtained and applied at the runtime of the system, in order to keep its computational time cost as low as possible, our approach firstly builds a linear programming restriction with the accordingly constrained safety and target specifications for the given reach-avoid problem, and then uses a linear programming solver to find a solution. To demonstrate the effectiveness of our method, we provide (a) the comparison to the previous work over 5 system models under 3 sensor attack scenarios: modification, delay, and reply; (b) a scalabfiity analysis based on a scalable model to evaluate the performance of our method on large-scale systems.
引用
收藏
页码:205 / 217
页数:13
相关论文
共 50 条
  • [21] Real-Time Cyber-Physical False Data Attack Detection in Smart Grids Using Neural Networks
    Ferragut, Erik M.
    Laska, Jason
    Olama, Mohammed M.
    Ozmen, Ozgur
    PROCEEDINGS 2017 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND COMPUTATIONAL INTELLIGENCE (CSCI), 2017, : 1 - +
  • [22] Real-Time Simulation Support for Runtime Verification of Cyber-Physical Systems
    Zheng, Xi
    Julien, Christine
    Chen, Hongxu
    Podorozhny, Rodion
    Cassez, Franck
    ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 2017, 16 (04)
  • [23] Introduction to the Special Issue on Real-Time aspects in Cyber-Physical Systems
    Almeida, Luis
    Andersson, Bjorn
    Hsieh, Jen-Wei
    Chang, Li-Pin
    Hu, Xiaobo Sharon
    ACM TRANSACTIONS ON CYBER-PHYSICAL SYSTEMS, 2019, 3 (03)
  • [24] Real-time Multi-core Components for Cyber-physical Systems
    Wahler, Michael
    Oriol, Manuel
    Monot, Aurelien
    2015 18TH INTERNATIONAL ACM SIGSOFT SYMPOSIUM ON COMPONENT-BASED SOFTWARE ENGINEERING (CBSE), 2015, : 37 - 42
  • [25] RDDS: A Real-Time Data Distribution Service for Cyber-Physical Systems
    Kang, Woochul
    Kapitanova, Krasimira
    Son, Sang Hyuk
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2012, 8 (02) : 393 - 405
  • [26] An Improved Real-time Task Preemptive Scheduling In Cyber-Physical Systems
    Zhang Jing
    Yang Xiaoduo
    Fan Hongbo
    2017 29TH CHINESE CONTROL AND DECISION CONFERENCE (CCDC), 2017, : 5843 - 5848
  • [27] Introduction to the Special Issue on Real-Time, Embedded and Cyber-Physical Systems
    Chang, Li-Pin
    Kuo, Tei-Wei
    Gill, Chris
    Nakazawa, Jin
    ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 2014, 13
  • [28] Decentralized Real-Time Safety Verification for Distributed Cyber-Physical Systems
    Hoang-Dung Tran
    Luan Viet Nguyen
    Musau, Patrick
    Xiang, Weiming
    Johnson, Taylor T.
    FORMAL TECHNIQUES FOR DISTRIBUTED OBJECTS, COMPONENTS, AND SYSTEMS (FORTE 2019), 2019, 11535 : 261 - 277
  • [29] A PERSONALIZED CYBER-PHYSICAL LABORATORY FOR A REAL-TIME SYSTEMS INTERFACING COURSE
    Kinsner, Witold
    Li, Hongru
    Reid, Siobhan
    Vu, Vinh
    Zhou, Zhou
    Lambeta, Michael
    Shevchenko, Oleg
    Kolansky, Glen
    2021 IEEE CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING (CCECE), 2021,
  • [30] Design Procedure for Real-Time Cyber-Physical Systems Tolerant to Cyberattacks
    Paredes, Carlos M.
    Castro, Diego Martinez
    Potes, Apolinar Gonzalez
    Piedrahita, Andres Rey
    Junquera, Vrani Ibarra
    SYMMETRY-BASEL, 2024, 16 (06):