Attack Detection and Identification in Cyber-Physical Systems -- Part I: Models and Fundamental Limitations

Mathematics – Optimization and Control

Scientific paper

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

Scientific paper

Cyber-physical systems integrate computation, communication, and physical capabilities to interact with the physical world and humans. Besides failures of components, cyber-physical systems are prone to malignant attacks, and specific analysis tools as well as monitoring mechanisms need to be developed to enforce system security and reliability. This paper proposes a unified framework to analyze the resilience of cyber-physical systems against attacks cast by an omniscient adversary. We model cyber-physical systems as linear descriptor systems, and attacks as exogenous unknown inputs. Despite its simplicity, our model captures various real-world cyber-physical systems, and it includes and generalizes many prototypical attacks, including stealth, (dynamic) false-data injection and replay attacks. First, we characterize fundamental limitations of static, dynamic, and active monitors for attack detection and identification. Second, we provide constructive algebraic conditions to cast undetectable and unidentifiable attacks. Third, by using the system interconnection structure, we describe graph-theoretic conditions for the existence of undetectable and unidentifiable attacks. Finally, we validate our findings through some illustrative examples with different cyber-physical systems, such as a municipal water supply network and two electrical power grids.

No associations

LandOfFree

Say what you really think

Search LandOfFree.com for scientists and scientific papers. Rate them and share your experience with other people.

Rating

Attack Detection and Identification in Cyber-Physical Systems -- Part I: Models and Fundamental Limitations does not yet have a rating. At this time, there are no reviews or comments for this scientific paper.

If you have personal experience with Attack Detection and Identification in Cyber-Physical Systems -- Part I: Models and Fundamental Limitations, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Attack Detection and Identification in Cyber-Physical Systems -- Part I: Models and Fundamental Limitations will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFWR-SCP-O-605961

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.