TY - GEN
T1 - Detecting integrity attacks on control systems using a moving target approach
AU - Weerakkody, Sean
AU - Sinopoli, Bruno
N1 - Publisher Copyright:
© 2015 IEEE.
PY - 2015/2/8
Y1 - 2015/2/8
N2 - Maintaining the security of control systems in the presence of integrity attacks is a significant challenge. In literature, several possible attacks against control systems have been formulated including replay, false data injection, and zero dynamics attacks. The detection and prevention of these attacks require the defender to possess a particular subset of trusted communication channels. Alternatively, these attacks can be prevented by keeping the system model secret from the adversary. In this paper, we consider an adversary who has the ability to modify and read all sensor and actuator channels. To thwart this adversary, we introduce external states dependent on the state of the control system, with linear time-varying dynamics unknown to the adversary. We also include sensors to measure these states. The presence of unknown time-varying dynamics is leveraged to detect an adversary who simultaneously aims to identify the system and inject stealthy outputs. Potential attack strategies and bounds on the attacker's performance are provided.
AB - Maintaining the security of control systems in the presence of integrity attacks is a significant challenge. In literature, several possible attacks against control systems have been formulated including replay, false data injection, and zero dynamics attacks. The detection and prevention of these attacks require the defender to possess a particular subset of trusted communication channels. Alternatively, these attacks can be prevented by keeping the system model secret from the adversary. In this paper, we consider an adversary who has the ability to modify and read all sensor and actuator channels. To thwart this adversary, we introduce external states dependent on the state of the control system, with linear time-varying dynamics unknown to the adversary. We also include sensors to measure these states. The presence of unknown time-varying dynamics is leveraged to detect an adversary who simultaneously aims to identify the system and inject stealthy outputs. Potential attack strategies and bounds on the attacker's performance are provided.
KW - Actuators
KW - Communication channels
KW - Detectors
KW - Kalman filters
KW - Security
KW - Time-varying systems
UR - https://www.scopus.com/pages/publications/84962034259
U2 - 10.1109/CDC.2015.7403134
DO - 10.1109/CDC.2015.7403134
M3 - Conference contribution
AN - SCOPUS:84962034259
T3 - Proceedings of the IEEE Conference on Decision and Control
SP - 5820
EP - 5826
BT - 54rd IEEE Conference on Decision and Control,CDC 2015
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 54th IEEE Conference on Decision and Control, CDC 2015
Y2 - 15 December 2015 through 18 December 2015
ER -