TY - GEN
T1 - Integrity attacks on cyber-physical systems
AU - Mo, Yilin
AU - Sinopoli, Bruno
PY - 2012
Y1 - 2012
N2 - In this paper we consider the integrity attack on Cyber- Physical System(CPS), which is modeled as a discrete linear time-invariant system equipped with a Kalman filter, LQG controller and χ2 failure detector. An attacker wishes to disturb the system by injecting external control inputs and fake sensor measurements. In order to perform the attack without being detected, the adversary will need to carefully design its actions to fool the failure detector as abnormal sensor measurements will result in an alarm. The adversary's strategy is formulated as a constrained control problem. In this paper, we characterize the reachable set of the system state and estimation error under the attack, which provides a quantitative measure of the resilience of the system. To this end, we will provide an ellipsoidal algorithm to compute the outer approximation of the reachable set. We also prove a necessary condition under which the reachable set is unbounded, indicating that the attacker can successfully destabilize the system.
AB - In this paper we consider the integrity attack on Cyber- Physical System(CPS), which is modeled as a discrete linear time-invariant system equipped with a Kalman filter, LQG controller and χ2 failure detector. An attacker wishes to disturb the system by injecting external control inputs and fake sensor measurements. In order to perform the attack without being detected, the adversary will need to carefully design its actions to fool the failure detector as abnormal sensor measurements will result in an alarm. The adversary's strategy is formulated as a constrained control problem. In this paper, we characterize the reachable set of the system state and estimation error under the attack, which provides a quantitative measure of the resilience of the system. To this end, we will provide an ellipsoidal algorithm to compute the outer approximation of the reachable set. We also prove a necessary condition under which the reachable set is unbounded, indicating that the attacker can successfully destabilize the system.
KW - Cyber-physical systems
KW - Reachability analysis
KW - Security
UR - https://www.scopus.com/pages/publications/84860619819
U2 - 10.1145/2185505.2185514
DO - 10.1145/2185505.2185514
M3 - Conference contribution
AN - SCOPUS:84860619819
SN - 9781450312639
T3 - HiCoNS'12 - Proceedings of the 1st ACM International Conference on High Confidence Networked Systems
SP - 47
EP - 54
BT - HiCoNS'12 - Proceedings of the 1st ACM International Conference on High Confidence Networked Systems
T2 - 2012 1st ACM International Conference on High Confidence Networked Systems, HiCoNS'12
Y2 - 17 April 2012 through 19 April 2012
ER -