Manipulative zero-stealthy attacks in cyber-physical systems: Existence space of feasible attack objectives

Takumi Shinohara, Toru Namerikawa

研究成果: Conference contribution

4 被引用数 (Scopus)

抄録

In this paper, we analyze the vulnerabilities due to novel integrity cyber attacks in CPS, which are modeled as a stochastic Linear Time-Invariant (LTI) system equipped with a Kalman filter, an LQG controller, and a χ2 failure detector from an attacker's standpoint. The attacks are designed by a sophisticated attacker so that the measurement residual of the compromised system coincides with the healthy one. Additionally, the attacked system state is manipulated to an objective which is designed by the adversary. We first show an existence condition and a design procedure of the stealthy attacks using invariant subspace property. Then, we formulate the stealthy attacks with a malicious objective, and the condition of the feasible objectives is derived. Finally, the dangerousness of the attacks is verified through a numerical simulation.

本文言語English
ホスト出版物のタイトル1st Annual IEEE Conference on Control Technology and Applications, CCTA 2017
出版社Institute of Electrical and Electronics Engineers Inc.
ページ1123-1128
ページ数6
ISBN(電子版)9781509021826
DOI
出版ステータスPublished - 2017 10 6
イベント1st Annual IEEE Conference on Control Technology and Applications, CCTA 2017 - Kohala Coast, United States
継続期間: 2017 8 272017 8 30

出版物シリーズ

名前1st Annual IEEE Conference on Control Technology and Applications, CCTA 2017
2017-January

Other

Other1st Annual IEEE Conference on Control Technology and Applications, CCTA 2017
国/地域United States
CityKohala Coast
Period17/8/2717/8/30

ASJC Scopus subject areas

  • 理論的コンピュータサイエンス
  • ハードウェアとアーキテクチャ
  • ソフトウェア
  • 制御およびシステム工学

フィンガープリント

「Manipulative zero-stealthy attacks in cyber-physical systems: Existence space of feasible attack objectives」の研究トピックを掘り下げます。これらがまとまってユニークなフィンガープリントを構成します。

引用スタイル