Detecting integrity attacks on control systems using a moving target approach

  • Sean Weerakkody
  • , Bruno Sinopoli

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Maintaining the security of control systems in the presence of integrity attacks is a significant challenge. In literature, several possible attacks against control systems have been formulated including replay, false data injection, and zero dynamics attacks. The detection and prevention of these attacks require the defender to possess a particular subset of trusted communication channels. Alternatively, these attacks can be prevented by keeping the system model secret from the adversary. In this paper, we consider an adversary who has the ability to modify and read all sensor and actuator channels. To thwart this adversary, we introduce external states dependent on the state of the control system, with linear time-varying dynamics unknown to the adversary. We also include sensors to measure these states. The presence of unknown time-varying dynamics is leveraged to detect an adversary who simultaneously aims to identify the system and inject stealthy outputs. Potential attack strategies and bounds on the attacker's performance are provided.

Original languageEnglish
Title of host publication54rd IEEE Conference on Decision and Control,CDC 2015
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages5820-5826
Number of pages7
ISBN (Electronic)9781479978861
DOIs
StatePublished - Feb 8 2015
Event54th IEEE Conference on Decision and Control, CDC 2015 - Osaka, Japan
Duration: Dec 15 2015Dec 18 2015

Publication series

NameProceedings of the IEEE Conference on Decision and Control
ISSN (Print)0743-1546
ISSN (Electronic)2576-2370

Conference

Conference54th IEEE Conference on Decision and Control, CDC 2015
Country/TerritoryJapan
CityOsaka
Period12/15/1512/18/15

Keywords

  • Actuators
  • Communication channels
  • Detectors
  • Kalman filters
  • Security
  • Time-varying systems

Fingerprint

Dive into the research topics of 'Detecting integrity attacks on control systems using a moving target approach'. Together they form a unique fingerprint.

Cite this