Integrity attacks on cyber-physical systems

  • Yilin Mo
  • , Bruno Sinopoli

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

111 Scopus citations

Abstract

In this paper we consider the integrity attack on Cyber- Physical System(CPS), which is modeled as a discrete linear time-invariant system equipped with a Kalman filter, LQG controller and χ2 failure detector. An attacker wishes to disturb the system by injecting external control inputs and fake sensor measurements. In order to perform the attack without being detected, the adversary will need to carefully design its actions to fool the failure detector as abnormal sensor measurements will result in an alarm. The adversary's strategy is formulated as a constrained control problem. In this paper, we characterize the reachable set of the system state and estimation error under the attack, which provides a quantitative measure of the resilience of the system. To this end, we will provide an ellipsoidal algorithm to compute the outer approximation of the reachable set. We also prove a necessary condition under which the reachable set is unbounded, indicating that the attacker can successfully destabilize the system.

Original languageEnglish
Title of host publicationHiCoNS'12 - Proceedings of the 1st ACM International Conference on High Confidence Networked Systems
Pages47-54
Number of pages8
DOIs
StatePublished - 2012
Event2012 1st ACM International Conference on High Confidence Networked Systems, HiCoNS'12 - Beijing, China
Duration: Apr 17 2012Apr 19 2012

Publication series

NameHiCoNS'12 - Proceedings of the 1st ACM International Conference on High Confidence Networked Systems

Conference

Conference2012 1st ACM International Conference on High Confidence Networked Systems, HiCoNS'12
Country/TerritoryChina
CityBeijing
Period04/17/1204/19/12

Keywords

  • Cyber-physical systems
  • Reachability analysis
  • Security

Fingerprint

Dive into the research topics of 'Integrity attacks on cyber-physical systems'. Together they form a unique fingerprint.

Cite this