Mathematics – Optimization and Control
Scientific paper
2012-02-28
Mathematics
Optimization and Control
Scientific paper
Cyber-physical systems integrate computation, communication, and physical capabilities to interact with the physical world and humans. Besides failures of components, cyber-physical systems are prone to malignant attacks, and specific analysis tools as well as monitoring mechanisms need to be developed to enforce system security and reliability. This paper proposes a unified framework to analyze the resilience of cyber-physical systems against attacks cast by an omniscient adversary. We model cyber-physical systems as linear descriptor systems, and attacks as exogenous unknown inputs. Despite its simplicity, our model captures various real-world cyber-physical systems, and it includes and generalizes many prototypical attacks, including stealth, (dynamic) false-data injection and replay attacks. First, we characterize fundamental limitations of static, dynamic, and active monitors for attack detection and identification. Second, we provide constructive algebraic conditions to cast undetectable and unidentifiable attacks. Third, by using the system interconnection structure, we describe graph-theoretic conditions for the existence of undetectable and unidentifiable attacks. Finally, we validate our findings through some illustrative examples with different cyber-physical systems, such as a municipal water supply network and two electrical power grids.
Bullo Francesco
Dorfler Florian
Pasqualetti Fabio
No associations
LandOfFree
Attack Detection and Identification in Cyber-Physical Systems -- Part I: Models and Fundamental Limitations does not yet have a rating. At this time, there are no reviews or comments for this scientific paper.
If you have personal experience with Attack Detection and Identification in Cyber-Physical Systems -- Part I: Models and Fundamental Limitations, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Attack Detection and Identification in Cyber-Physical Systems -- Part I: Models and Fundamental Limitations will most certainly appreciate the feedback.
Profile ID: LFWR-SCP-O-605961