Reachability Analysis of Cyber-Physical Systems Under Stealthy Attacks

被引:20
|
作者
Zhang, Qirui [1 ]
Liu, Kun [1 ]
Pang, Zhonghua [2 ]
Xia, Yuanqing [1 ]
Liu, Tao [3 ]
机构
[1] Beijing Inst Technol, Sch Automat, Beijing 100081, Peoples R China
[2] North China Univ Technol, Sch Elect & Control Engn, Beijing 100043, Peoples R China
[3] Beijing Wuzi Univ, Sch Informat, Beijing 101149, Peoples R China
基金
中国国家自然科学基金;
关键词
Detectors; Kalman filters; Technological innovation; Covariance matrices; Estimation error; Symmetric matrices; Safety; Cyber-physical system (CPS) security; Kullback-Leibler divergence (KLD); reachable set; stealthy attack; DATA-INJECTION ATTACKS; FALSE DATA INJECTION; SECURE STATE ESTIMATION; PERFORMANCE;
D O I
10.1109/TCYB.2020.3025307
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This article studies the reachable set of cyber-physical systems subject to stealthy attacks with the Kullback-Leibler divergence adopted to describe the stealthiness. The reachable set is defined as the set in which both the system state and the estimation error of the Kalman filter reside with a certain probability. The necessary and sufficient conditions of the reachable set being unbounded are given for the finite and infinite time cases, respectively. When the reachable set is bounded, an ellipsoidal outer approximation is obtained by solving a convex optimization problem. An application of this approximation to the safety evaluation is also given. A numerical simulation of an unmanned ground vehicle is presented to demonstrate the effectiveness of the proposed approach.
引用
收藏
页码:4926 / 4934
页数:9
相关论文
共 50 条
  • [1] Vulnerability analysis for a class of nonlinear cyber-physical systems under stealthy attacks
    Zhang, Qirui
    Dai, Wei
    Yang, Chunyu
    Chen, Xinkai
    [J]. AUTOMATICA, 2024, 167
  • [2] Stealthy Deception Attacks for Cyber-Physical Systems
    Goes, Romulo Meira
    Kang, Eunsuk
    Kwong, Raymond
    Lafortune, Stephane
    [J]. 2017 IEEE 56TH ANNUAL CONFERENCE ON DECISION AND CONTROL (CDC), 2017,
  • [3] On the Performance Degradation of Cyber-Physical Systems Under Stealthy Integrity Attacks
    Mo, Yilin
    Sinopoli, Bruno
    [J]. IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2016, 61 (09) : 2618 - 2624
  • [4] Performance analysis for cyber-physical systems under two types of stealthy deception attacks
    Liu, Qingchen
    Wang, Jie
    Ni, Yuqing
    Zhang, Cong
    Shi, Ling
    Qin, Jiahu
    [J]. AUTOMATICA, 2024, 160
  • [5] The Vulnerability of Cyber-Physical System Under Stealthy Attacks
    Sui, Tianju
    Mo, Yilin
    Marelli, Damian
    Sun, Ximing
    Fu, Minyue
    [J]. IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2021, 66 (02) : 637 - 650
  • [6] Robust Stealthy Covert Attacks on Cyber-Physical Systems
    Li, Xuerong
    Zhang, Ping
    Dong, Hongli
    [J]. IFAC PAPERSONLINE, 2022, 55 (06): : 520 - 525
  • [7] Stealthy Local Covert Attacks on Cyber-Physical Systems
    Mikhaylenko, Dina
    Zhang, Ping
    [J]. IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2022, 67 (12) : 6778 - 6785
  • [8] Security Analysis for Cyber-Physical Systems against Stealthy Deception Attacks
    Kwon, Cheolhyeon
    Liu, Weiyi
    Hwang, Inseok
    [J]. 2013 AMERICAN CONTROL CONFERENCE (ACC), 2013, : 3344 - 3349
  • [9] Reachability Analysis for Safety Assurance of Cyber-Physical Systems Against Cyber Attacks
    Kwon, Cheolhyeon
    Hwang, Inseok
    [J]. IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2018, 63 (07) : 2272 - 2279
  • [10] Stealthy Local Covert Attacks on Cyber-Physical Systems
    Mikhaylenko, Dina
    Zhang, Ping
    [J]. 2020 AMERICAN CONTROL CONFERENCE (ACC), 2020, : 2568 - 2573