Secure Control Against Replay Attacks

被引:591
|
作者
Mo, Yilin [1 ]
Sinopoli, Bruno [1 ]
机构
[1] Carnegie Mellon Univ, Dept Elect & Comp Engn, Pittsburgh, PA 15213 USA
关键词
D O I
10.1109/ALLERTON.2009.5394956
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper analyzes the effect of replay attacks on a control system. We assume an attacker wishes to disrupt the operation of a control system in steady state. In order to inject an exogenous control input without being detected the attacker will hijack the sensors, observe and record their readings for a certain amount of time and repeat them afterwards while carrying out his attack. This is a very common and natural attack (we have seen numerous times intruders recording and replaying security videos while performing their attack undisturbed) for an attacker who does not know the dynamics of the system but is aware of the fact that the system itself is expected to be in steady state for the duration of the attack. We assume the control system to be a discrete time linear time invariant gaussian system applying an infinite horizon Linear Quadratic Gaussian (LQG) controller We also assume that the system is equipped with a chi(2) failure detector: The main contributions of the paper, beyond the novelty of the problem formulation, consist in 1) providing conditions on the feasibility of the replay attack on the aforementioned system and 2) proposing a countermeasure that guarantees a desired probability of detection (with a fixed false alarm rate) by trading off either detection delay or LQG perfomance, either by decreasing control accuracy or increasing control effort.
引用
收藏
页码:911 / 918
页数:8
相关论文
共 50 条
  • [21] CLPDI-based Fast Secure Code Estimation and Replay Attacks on GNSS Signals
    Soderi, Simone
    Iinatti, Jan
    [J]. 2024 SECURITY FOR SPACE SYSTEMS CONFERENCE, 3S 2024, 2024,
  • [22] Secure Deduplication Against Frequency Analysis Attacks
    Chen, Hang
    Ha, Guanxiong
    Chen, Yuchen
    Ma, Haoyu
    Jia, Chunfu
    [J]. 2022 18TH INTERNATIONAL CONFERENCE ON MOBILITY, SENSING AND NETWORKING, MSN, 2022, : 339 - 346
  • [23] Unconditionally secure steganography against active attacks
    Shikata, Junji
    Matsumoto, Tsutomu
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (06) : 2690 - 2705
  • [24] Switching Watermarking-based Detection Scheme Against Replay Attacks
    Zhai, Lijing
    Vamvoudakis, Kyriakos G.
    Hugues, Jerome
    [J]. 2021 60TH IEEE CONFERENCE ON DECISION AND CONTROL (CDC), 2021, : 4200 - 4205
  • [25] Enhanced Secure Transmission Against Intelligent Attacks
    Li, Chao
    Zhou, Wen
    Yu, Kai
    Fan, Liseng
    Xia, Junjuan
    [J]. IEEE ACCESS, 2019, 7 : 53596 - 53602
  • [26] Entanglement generation secure against general attacks
    Pirker, Alexander
    Dunjko, Vedran
    Duer, Wolfgang
    Briegel, Hans J.
    [J]. NEW JOURNAL OF PHYSICS, 2017, 19
  • [27] Secure Kernel Machines against Evasion Attacks
    Russu, Paolo
    Demontis, Ambra
    Biggio, Battista
    Fumera, Giorgio
    Roli, Fabio
    [J]. AISEC'16: PROCEEDINGS OF THE 2016 ACM WORKSHOP ON ARTIFICIAL INTELLIGENCE AND SECURITY, 2016, : 59 - 69
  • [28] Identification protocols secure against reset attacks
    Bellare, M
    Fischlin, M
    Goldwasser, S
    Micali, S
    [J]. ADVANCES IN CRYPTOLOGY-EUROCRYPT 2001, PROCEEDINGS, 2001, 2045 : 495 - 511
  • [29] PSS Is Secure against Random Fault Attacks
    Coron, Jean-Sebastien
    Mandal, Avradip
    [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2009, 2009, 5912 : 653 - 666
  • [30] Processor Extensions for Hardware Instruction Replay against Fault Injection Attacks
    Ait Manssour, Noura
    Lapotre, Vianney
    Gogniat, Guy
    Tisserand, Arnaud
    [J]. 2022 25TH INTERNATIONAL SYMPOSIUM ON DESIGN AND DIAGNOSTICS OF ELECTRONIC CIRCUITS AND SYSTEMS (DDECS), 2022, : 26 - 31