Setpoint Attack Detection in Cyber-Physical Systems

被引:21
|
作者
Lucia, Walter [1 ]
Gheitasi, Kian [1 ]
Ghaderi, Mohsen [2 ]
机构
[1] Concordia Univ, Concordia Inst Informat Syst Engn, Montreal, PQ H3G 1M8, Canada
[2] Concordia Univ, Dept Elect & Comp Engn, Montreal, PQ H3G 1M8, Canada
基金
加拿大自然科学与工程研究理事会;
关键词
Computer architecture; Communication channels; Closed loop systems; Detectors; Networked control systems; Linear systems; Command governor; constrained control; cyber-physical systems; setpoint attack detection; supervisory control; GRIDS; STATE;
D O I
10.1109/TAC.2020.3004326
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this article, we face the problem of detecting setpoint attacks in networked control systems. We consider a setup where the reference signal (also known as setpoint) is generated by a control center remotely located with respect to a standard feedback controller. In this scenario, an attacker with sufficient resources can exploit the communication channel to alter the setpoint signal and ultimately affect the tracking performance of the control system. With respect to this problem, we propose a novel distributed control architecture that, taking advantage of peculiar capabilities of the command governor control paradigm, enables the detection of reference attacks. We formally prove that for constrained linear systems such detector exists. Moreover, by limiting the attacker's disclosure resources with superimposed cryptographically secure pseudorandom signals, we show that the absence of advanced stealthy attacks is also ensured. Finally, a solid numerical simulation investigating setpoint attacks on the flight control system of a single-engine fighter is presented to provide tangible evidence of the features of the presented methodology.
引用
收藏
页码:2332 / 2338
页数:7
相关论文
共 50 条
  • [41] Cyber-Physical Attack Detection and Recovery Based on RNN in Automotive Brake Systems
    Shin, Jongho
    Baek, Youngmi
    Lee, Jaeseong
    Lee, Seonghun
    [J]. APPLIED SCIENCES-BASEL, 2019, 9 (01):
  • [42] Optimal periodic watermarking schedule for replay attack detection in cyber-physical systems
    Fang, Chongrong
    Qi, Yifei
    Cheng, Peng
    Zheng, Wei Xing
    [J]. AUTOMATICA, 2020, 112
  • [43] Optimal Attack Strategies Subject to Detection Constraints Against Cyber-Physical Systems
    Chen, Yuan
    Kar, Soummya
    Moura, Jose M. F.
    [J]. IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, 2018, 5 (03): : 1157 - 1168
  • [44] Sensor attack detection for cyber-physical systems based on frequency domain partition
    Gu, Cao-Yuan
    Zhu, Jun-Wei
    Zhang, Wen-An
    Yu, Li
    [J]. IET CONTROL THEORY AND APPLICATIONS, 2020, 14 (11): : 1452 - 1466
  • [45] Attack Detection for Medical Cyber-Physical Systems-A Systematic Literature Review
    Weber, Simon B. B.
    Stein, Stefan
    Pilgermann, Michael
    Schrader, Thomas
    [J]. IEEE ACCESS, 2023, 11 : 41796 - 41815
  • [46] Adaptive cyber-physical system attack detection and reconstruction with application to power systems
    Ao, Wei
    Song, Yongdong
    Wen, Changyun
    [J]. IET CONTROL THEORY AND APPLICATIONS, 2016, 10 (12): : 1458 - 1468
  • [47] Detection and mitigation of coordinated cyber-physical attack in CPPS
    Varshini, G. Y. Sree
    Latha, S.
    [J]. HELIYON, 2024, 10 (04)
  • [48] Stochastic coding detection scheme in cyber-physical systems against replay attack
    Ye, Dan
    Zhang, Tian-Yu
    Guo, Ge
    [J]. INFORMATION SCIENCES, 2019, 481 : 432 - 444
  • [49] Covert Attack Detection Based on Hi/H∞ Optimization for Cyber-Physical Systems
    Qin, Jiao
    Zhong, Maiying
    Liu, Yang
    Wang, Xianghua
    Zhou, Donghua
    [J]. IFAC PAPERSONLINE, 2020, 53 (02): : 4487 - 4492
  • [50] Fast Attack Detection for Cyber-Physical Systems Using Dynamic Data Encryption
    Li, Tongxiang
    Chen, Bo
    Liu, Shichao
    Wang, Zheming
    Zhang, Wen-An
    Yu, Li
    [J]. IEEE TRANSACTIONS ON CYBERNETICS, 2024, 54 (05) : 3251 - 3264