Ensuring Resilience Against Stealthy Attacks on Cyber-Physical Systems

Paul Griffioen, Bruce H. Krogh, Bruno Sinopoli

Research output: Contribution to journalArticlepeer-review

Abstract

This article provides a tool for analyzing mechanisms that aim to achieve resilience against stealthy, or undetectable, attacks on cyber-physical systems. We consider attackers who are able to corrupt all of the inputs and outputs of the system. To counter such attackers, a response scheme must be implemented that keeps the attacker from corrupting the inputs and outputs of the system for certain periods of time. To aid in the design of such a response scheme, our tool provides sufficient lengths for these periods of time in order to ensure safety with a particular probability. We provide an upper bound on how long the system can remain under stealthy attack before the safety constraints are violated. Furthermore, we show how a detector limits the set of biases an attacker can exert on the system while still remaining stealthy, aiding a system operator in the design of the detector. Our contributions are demonstrated with an illustrative example.

Original languageEnglish
Pages (from-to)8234-8246
Number of pages13
JournalIEEE Transactions on Automatic Control
Volume69
Issue number12
DOIs
StatePublished - 2024

Keywords

  • Cyber-physical systems (CPSs)
  • fault detection
  • fault-tolerant systems
  • robust control

Fingerprint

Dive into the research topics of 'Ensuring Resilience Against Stealthy Attacks on Cyber-Physical Systems'. Together they form a unique fingerprint.

Cite this