Secure Control Against Replay Attacks

被引:591
|
作者
Mo, Yilin [1 ]
Sinopoli, Bruno [1 ]
机构
[1] Carnegie Mellon Univ, Dept Elect & Comp Engn, Pittsburgh, PA 15213 USA
关键词
D O I
10.1109/ALLERTON.2009.5394956
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper analyzes the effect of replay attacks on a control system. We assume an attacker wishes to disrupt the operation of a control system in steady state. In order to inject an exogenous control input without being detected the attacker will hijack the sensors, observe and record their readings for a certain amount of time and repeat them afterwards while carrying out his attack. This is a very common and natural attack (we have seen numerous times intruders recording and replaying security videos while performing their attack undisturbed) for an attacker who does not know the dynamics of the system but is aware of the fact that the system itself is expected to be in steady state for the duration of the attack. We assume the control system to be a discrete time linear time invariant gaussian system applying an infinite horizon Linear Quadratic Gaussian (LQG) controller We also assume that the system is equipped with a chi(2) failure detector: The main contributions of the paper, beyond the novelty of the problem formulation, consist in 1) providing conditions on the feasibility of the replay attack on the aforementioned system and 2) proposing a countermeasure that guarantees a desired probability of detection (with a fixed false alarm rate) by trading off either detection delay or LQG perfomance, either by decreasing control accuracy or increasing control effort.
引用
收藏
页码:911 / 918
页数:8
相关论文
共 50 条
  • [41] Countermeasures to Replay Attacks: A Review
    Singh, Madhusudan
    Pati, Debadatta
    [J]. IETE TECHNICAL REVIEW, 2020, 37 (06) : 599 - 614
  • [42] Lightweight 3D-StudentNet for defending against face replay attacks
    Seegehalli, Preethi Jayappa
    Krupa, B. Niranjana
    [J]. SIGNAL IMAGE AND VIDEO PROCESSING, 2024, 18 (10) : 6613 - 6629
  • [43] How efficient are replay attacks against vote privacy? A formal quantitative analysis
    Mestel, David
    Muller, Johannes
    Reisert, Pascal
    [J]. JOURNAL OF COMPUTER SECURITY, 2023, 31 (05) : 421 - 467
  • [44] On the Performance Analysis of Resilient Networked Control Systems Under Replay Attacks
    Zhu, Minghui
    Martinez, Sonia
    [J]. IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2014, 59 (03) : 804 - 808
  • [45] Resilient Control for Cyber-Physical Systems Subject to Replay Attacks
    Franze, Giuseppe
    Tedesco, Francesco
    Lucia, Walter
    [J]. IEEE CONTROL SYSTEMS LETTERS, 2019, 3 (04): : 984 - 989
  • [46] How Efficient are Replay Attacks against Vote Privacy? A Formal Quantitative Analysis
    Mestel, David
    Mueller, Johannes
    Reisert, Pascal
    [J]. 2022 IEEE 35TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF 2022), 2022, : 179 - 194
  • [47] SECURE ESTIMATION AGAINST COMPLEX-VALUED ATTACKS
    Mohammadi, Arash
    Plataniotis, Konstantinos N.
    [J]. 2016 IEEE STATISTICAL SIGNAL PROCESSING WORKSHOP (SSP), 2016,
  • [48] A Secure Network Coding System Against Wiretap Attacks
    Wang Xuebing
    Qin Na
    Liu Yantao
    [J]. 2019 34RD YOUTH ACADEMIC ANNUAL CONFERENCE OF CHINESE ASSOCIATION OF AUTOMATION (YAC), 2019, : 62 - 67
  • [49] Secure Network Coding against Wiretapping and Byzantine Attacks
    Guo, Qin
    Luo, Mingxing
    Li, Lixiang
    Yang, Yixian
    [J]. EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2010,
  • [50] Lightweight and Secure Branch Predictors against Spectre Attacks
    Chen, Congcong
    Shen, Chaoqun
    Zhang, Jiliang
    [J]. 27TH ASIA AND SOUTH PACIFIC DESIGN AUTOMATION CONFERENCE, ASP-DAC 2022, 2022, : 25 - 30