A Stealthy Sensor Attack for Uncertain Cyber-Physical Systems

被引:24
|
作者
Jeon, Heegyun [1 ]
Eun, Yongsoon [1 ]
机构
[1] DGIST, Dept Informat & Commun Engn, Daegu 42988, South Korea
来源
IEEE INTERNET OF THINGS JOURNAL | 2019年 / 6卷 / 04期
基金
新加坡国家研究基金会;
关键词
Cyber-physical systems (CPSs); model uncertainty; stealthy sensor attack; SECURE CONTROL;
D O I
10.1109/JIOT.2019.2905878
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we present a sensor attack on cyber-physical systems (CPSs), which can be constructed with limited knowledge of the target system and can remain stealthy until the attack succeeds. The target CPS consists of a physical plant with unstable linear dynamics and a feedback controller. Specifically, the attack mechanism is to impede the stabilizing function of the feedback controller by injecting false data to the sensors, where the false data are created using the unstable dynamics of the plant. When the only nominal model for the target dynamics is known, the stealthiness is maintained by deploying a mechanism similar to a disturbance observer (DOB) which can be designed to absorb the effect of the mismatch between the nominal and actual dynamics until the attack succeeds. The success of the attack is defined by the norm of the system state exceeding a threshold. Sensor attacks that exploit unstable plant dynamics had been conceived previously. Generation of such attacks require precise knowledge of the target system for stealthiness, i. e., the attack must cancel at the sensor exactly the effect of instability in order to avoid detection. When not exact, the mismatch grows exponentially leading to the detection of abnormality. The attack presented in this paper absorbs the mismatch using the DOB mechanism, where the degree of absorption is selected such that the detection is delayed until the attack succeeds. Thus, the proposed attack, compared to the conventional ones, poses a greater level of threat to CPS. In this paper, generation of the attack is presented, and the effect is analyzed. The consequence of the attack is illustrated and emphasized by simulations on quadrotors and inverted pendulums, respectively.
引用
收藏
页码:6345 / 6352
页数:8
相关论文
共 50 条
  • [1] Optimal ε -stealthy attack in cyber-physical systems
    Tu, Weiwei
    Dong, Jiuxiang
    Zhai, Ding
    [J]. JOURNAL OF THE FRANKLIN INSTITUTE-ENGINEERING AND APPLIED MATHEMATICS, 2021, 358 (01): : 151 - 171
  • [2] SAGE: Stealthy Attack Generation in cyber-physical systems
    Biehler, Michael
    Zhong, Zhen
    Shi, Jianjun
    [J]. IISE TRANSACTIONS, 2024, 56 (01) : 54 - 68
  • [3] Optimal stealthy attack with historical data on cyber-physical systems
    Ren, Xiu-Xiu
    Yang, Guang-Hong
    Zhang, Xiao-Guang
    [J]. AUTOMATICA, 2023, 151
  • [4] Optimal Stealthy Deception Attack Against Cyber-Physical Systems
    Zhang, Qirui
    Liu, Kun
    Xia, Yuanqing
    Ma, Aoyun
    [J]. IEEE TRANSACTIONS ON CYBERNETICS, 2020, 50 (09) : 3963 - 3972
  • [5] Stealthy Adversaries Against Uncertain Cyber-Physical Systems: Threat of Robust Zero-Dynamics Attack
    Park, Gyunghoon
    Lee, Chanhwa
    Shim, Hyungbo
    Eun, Yongsoon
    Johansson, Karl H.
    [J]. IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2019, 64 (12) : 4907 - 4919
  • [6] A Multiplicative Coordinated Stealthy Attack for Nonlinear Cyber-Physical Systems with Homogeneous Property
    Na, Gyujin
    Lee, Hanbit
    Eun, Yongsoon
    [J]. MATHEMATICAL PROBLEMS IN ENGINEERING, 2019, 2019
  • [7] A Finite-Time Stealthy Covert Attack Against Cyber-Physical Systems
    Gheitasi, Kian
    Lucia, Walter
    [J]. 2020 7TH INTERNATIONAL CONFERENCE ON CONTROL, DECISION AND INFORMATION TECHNOLOGIES (CODIT'20), VOL 1, 2020, : 347 - 352
  • [8] Data-driven Stealthy Actuator Attack against Cyber-Physical Systems
    Zhang, Zhixue
    Zhang, Qirui
    Liu, Tao
    Pang, Zhonghua
    Cui, Bing
    Jin, Shuxin
    Liu, Kun
    [J]. PROCEEDINGS OF THE 39TH CHINESE CONTROL CONFERENCE, 2020, : 4395 - 4399
  • [9] Stealthy Deception Attacks for Cyber-Physical Systems
    Goes, Romulo Meira
    Kang, Eunsuk
    Kwong, Raymond
    Lafortune, Stephane
    [J]. 2017 IEEE 56TH ANNUAL CONFERENCE ON DECISION AND CONTROL (CDC), 2017,
  • [10] Optimal Stealthy Attack on Cyber-Physical Systems and Its Application to a Networked PMSM System
    Zhang, Xiao-Guang
    Yang, Guang-Hong
    Ren, Xiu-Xiu
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2023, 70 (06) : 6295 - 6304