Abstract
In this paper, we analyze the vulnerabilities due to novel integrity cyber attacks in CPS, which are modeled as a stochastic Linear Time-Invariant (LTI) system equipped with a Kalman filter, an LQG controller, and a χ2 failure detector from an attacker's standpoint. The attacks are designed by a sophisticated attacker so that the measurement residual of the compromised system coincides with the healthy one. Additionally, the attacked system state is manipulated to an objective which is designed by the adversary. We first show an existence condition and a design procedure of the stealthy attacks using invariant subspace property. Then, we formulate the stealthy attacks with a malicious objective, and the condition of the feasible objectives is derived. Finally, the dangerousness of the attacks is verified through a numerical simulation.
Original language | English |
---|---|
Title of host publication | 1st Annual IEEE Conference on Control Technology and Applications, CCTA 2017 |
Publisher | Institute of Electrical and Electronics Engineers Inc. |
Pages | 1123-1128 |
Number of pages | 6 |
Volume | 2017-January |
ISBN (Electronic) | 9781509021826 |
DOIs | |
Publication status | Published - 2017 Oct 6 |
Event | 1st Annual IEEE Conference on Control Technology and Applications, CCTA 2017 - Kohala Coast, United States Duration: 2017 Aug 27 → 2017 Aug 30 |
Other
Other | 1st Annual IEEE Conference on Control Technology and Applications, CCTA 2017 |
---|---|
Country | United States |
City | Kohala Coast |
Period | 17/8/27 → 17/8/30 |
ASJC Scopus subject areas
- Theoretical Computer Science
- Hardware and Architecture
- Software
- Control and Systems Engineering