TY - GEN
T1 - Feasibility and Detection of Replay Attack in Networked Constrained Cyber-Physical Systems
AU - Hosseinzadeh, Mehdi
AU - Sinopoli, Bruno
AU - Garone, Emanuele
N1 - Publisher Copyright:
© 2019 IEEE.
PY - 2019/9
Y1 - 2019/9
N2 - This paper analyzes the effect of replay attacks on constrained cyber-physical systems which are subject to linear probabilistic constraints. In order to inject an exogenous control input without being detected the attacker will hijack the sensors, observe and record their readings for a certain amount of time and repeat them afterwards while carrying out his attack. The conditions under which the attacker can induce perturbation in the control loop without being detected is studied. Then, in order to make the system resilient to the replay attack, a random signal (serving as the authentication signal) is added to the control input. Since this signal can hamper the performance of the system, finally, the optimization of the authentication signals is proposed to maximize the detection rate while keeping the process deterioration bounded. The effectiveness of the proposed scheme is demonstrated on a simulated case study.
AB - This paper analyzes the effect of replay attacks on constrained cyber-physical systems which are subject to linear probabilistic constraints. In order to inject an exogenous control input without being detected the attacker will hijack the sensors, observe and record their readings for a certain amount of time and repeat them afterwards while carrying out his attack. The conditions under which the attacker can induce perturbation in the control loop without being detected is studied. Then, in order to make the system resilient to the replay attack, a random signal (serving as the authentication signal) is added to the control input. Since this signal can hamper the performance of the system, finally, the optimization of the authentication signals is proposed to maximize the detection rate while keeping the process deterioration bounded. The effectiveness of the proposed scheme is demonstrated on a simulated case study.
UR - https://www.scopus.com/pages/publications/85077792646
U2 - 10.1109/ALLERTON.2019.8919762
DO - 10.1109/ALLERTON.2019.8919762
M3 - Conference contribution
AN - SCOPUS:85077792646
T3 - 2019 57th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2019
SP - 712
EP - 717
BT - 2019 57th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2019
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 57th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2019
Y2 - 24 September 2019 through 27 September 2019
ER -