Setpoint Attack Detection in Cyber-Physical Systems

被引:21
|
作者
Lucia, Walter [1 ]
Gheitasi, Kian [1 ]
Ghaderi, Mohsen [2 ]
机构
[1] Concordia Univ, Concordia Inst Informat Syst Engn, Montreal, PQ H3G 1M8, Canada
[2] Concordia Univ, Dept Elect & Comp Engn, Montreal, PQ H3G 1M8, Canada
基金
加拿大自然科学与工程研究理事会;
关键词
Computer architecture; Communication channels; Closed loop systems; Detectors; Networked control systems; Linear systems; Command governor; constrained control; cyber-physical systems; setpoint attack detection; supervisory control; GRIDS; STATE;
D O I
10.1109/TAC.2020.3004326
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this article, we face the problem of detecting setpoint attacks in networked control systems. We consider a setup where the reference signal (also known as setpoint) is generated by a control center remotely located with respect to a standard feedback controller. In this scenario, an attacker with sufficient resources can exploit the communication channel to alter the setpoint signal and ultimately affect the tracking performance of the control system. With respect to this problem, we propose a novel distributed control architecture that, taking advantage of peculiar capabilities of the command governor control paradigm, enables the detection of reference attacks. We formally prove that for constrained linear systems such detector exists. Moreover, by limiting the attacker's disclosure resources with superimposed cryptographically secure pseudorandom signals, we show that the absence of advanced stealthy attacks is also ensured. Finally, a solid numerical simulation investigating setpoint attacks on the flight control system of a single-engine fighter is presented to provide tangible evidence of the features of the presented methodology.
引用
收藏
页码:2332 / 2338
页数:7
相关论文
共 50 条
  • [21] Robust performance based multiplicative attack detection for cyber-physical systems
    Zhao, Zhen-Gen
    Li, Yu-Zhe
    [J]. Kongzhi Lilun Yu Yingyong/Control Theory and Applications, 2022, 39 (10): : 1952 - 1960
  • [22] Joint attack detection and secure state estimation of cyber-physical systems
    Forti, Nicola
    Battistelli, Giorgio
    Chisci, Luigi
    Sinopoli, Bruno
    [J]. INTERNATIONAL JOURNAL OF ROBUST AND NONLINEAR CONTROL, 2020, 30 (11) : 4303 - 4330
  • [23] Adaptive robust FDI attack detection for cyber-physical systems with disturbance
    Li, Lu
    Chen, Yong
    Li, Meng
    Liu, Yuezhi
    [J]. ICT EXPRESS, 2023, 9 (04): : 656 - 663
  • [24] Performance based attack detection and security analysis for cyber-physical systems
    Zhao, Zhengen
    Xu, Yunsong
    [J]. INTERNATIONAL JOURNAL OF ROBUST AND NONLINEAR CONTROL, 2023, 33 (05) : 3267 - 3284
  • [25] Feasibility and Detection of Replay Attack in Networked Constrained Cyber-Physical Systems
    Hosseinzadeh, Mehdi
    Sinopoli, Bruno
    Garone, Emanuele
    [J]. 2019 57TH ANNUAL ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING (ALLERTON), 2019, : 712 - 717
  • [26] A survey on attack detection, estimation and control of industrial cyber-physical systems
    Zhang, Dan
    Wang, Qing-Guo
    Feng, Gang
    Shi, Yang
    Vasilakos, Athanasios V.
    [J]. ISA TRANSACTIONS, 2021, 116 : 1 - 16
  • [27] A survey on security control and attack detection for industrial cyber-physical systems
    Ding, Derui
    Han, Qing-Long
    Xiang, Yang
    Ge, Xiaohua
    Zhang, Xian-Ming
    [J]. NEUROCOMPUTING, 2018, 275 : 1674 - 1683
  • [28] A Survey of Physics-Based Attack Detection in Cyber-Physical Systems
    Giraldo, Jairo
    Urbina, David
    Cardenas, Alvaro
    Valente, Junia
    Faisal, Mustafa
    Ruths, Justin
    Tippenhauer, Nils Ole
    Sandberg, Henrik
    Candell, Richard
    [J]. ACM COMPUTING SURVEYS, 2018, 51 (04)
  • [29] Optimal ε -stealthy attack in cyber-physical systems
    Tu, Weiwei
    Dong, Jiuxiang
    Zhai, Ding
    [J]. JOURNAL OF THE FRANKLIN INSTITUTE-ENGINEERING AND APPLIED MATHEMATICS, 2021, 358 (01): : 151 - 171
  • [30] A Hybrid Cyber Attack Model for Cyber-Physical Power Systems
    Tu, Haicheng
    Xia, Yongxiang
    Tse, Chi K.
    Chen, Xi
    [J]. IEEE ACCESS, 2020, 8 : 114876 - 114883