Feasibility and Detection of Replay Attack in Networked Constrained Cyber-Physical Systems

  • Mehdi Hosseinzadeh
  • , Bruno Sinopoli
  • , Emanuele Garone

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

51 Scopus citations

Abstract

This paper analyzes the effect of replay attacks on constrained cyber-physical systems which are subject to linear probabilistic constraints. In order to inject an exogenous control input without being detected the attacker will hijack the sensors, observe and record their readings for a certain amount of time and repeat them afterwards while carrying out his attack. The conditions under which the attacker can induce perturbation in the control loop without being detected is studied. Then, in order to make the system resilient to the replay attack, a random signal (serving as the authentication signal) is added to the control input. Since this signal can hamper the performance of the system, finally, the optimization of the authentication signals is proposed to maximize the detection rate while keeping the process deterioration bounded. The effectiveness of the proposed scheme is demonstrated on a simulated case study.

Original languageEnglish
Title of host publication2019 57th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2019
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages712-717
Number of pages6
ISBN (Electronic)9781728131511
DOIs
StatePublished - Sep 2019
Event57th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2019 - Monticello, United States
Duration: Sep 24 2019Sep 27 2019

Publication series

Name2019 57th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2019

Conference

Conference57th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2019
Country/TerritoryUnited States
CityMonticello
Period09/24/1909/27/19

Fingerprint

Dive into the research topics of 'Feasibility and Detection of Replay Attack in Networked Constrained Cyber-Physical Systems'. Together they form a unique fingerprint.

Cite this