2017
DOI: 10.1016/j.automatica.2017.04.047
|View full text |Cite
|
Sign up to set email alerts
|

Data-injection attacks in stochastic control systems: Detectability and performance tradeoffs

Abstract: Consider a stochastic process being controlled across a communication channel. The control signal that is transmitted across the control channel can be replaced by a malicious attacker. The controller is allowed to implement any arbitrary detection algorithm to detect if an attacker is present. This work characterizes some fundamental limitations of when such an attack can be detected, and quantifies the performance degradation that an attacker that seeks to be undetected or stealthy can introduce.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
62
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
8
2

Relationship

0
10

Authors

Journals

citations
Cited by 203 publications
(62 citation statements)
references
References 34 publications
0
62
0
Order By: Relevance
“…In [225], [226], Kullback-Leibler divergence is employed to develop a stealthiness and obtain worst-case attack policies as a trade-off between system performance degradation and attack stealthiness. In [227], [228], worst case deception attacks are analyzed in stochastic systems and the number of sensors to secure the system using a Kalman filter approach is proposed. Attacks on Kalman filters have been also analyzed in [229].…”
Section: A Threat Assessmentmentioning
confidence: 99%
“…In [225], [226], Kullback-Leibler divergence is employed to develop a stealthiness and obtain worst-case attack policies as a trade-off between system performance degradation and attack stealthiness. In [227], [228], worst case deception attacks are analyzed in stochastic systems and the number of sensors to secure the system using a Kalman filter approach is proposed. Attacks on Kalman filters have been also analyzed in [229].…”
Section: A Threat Assessmentmentioning
confidence: 99%
“…is maintained at 0 by node i. 9 2) The valuesz (j) il [k] are sorted from largest to smallest; subsequently, the largest f and the smallest f of such values are discarded (i.e., 2f values are discarded in all) andẑ…”
Section: Secure State Estimation Over Time-varying Networkmentioning
confidence: 99%
“…Real-world instances of security breaches in CPS, that were discovered and made public, include the revenge sewage attack in Maroochy Shire, Australia; the Ukraine power grid cyber-attack; the German steel mill cyber-attack; the Davis-Besse nuclear power plant attack in Ohio, USA; and the Iranian uranium-enrichment facility attack via the Stuxnet malware [6]. Studying and preventing such security breaches via control-theoretic methods has received a great deal of attention in recent years [7]- [24].…”
Section: Introductionmentioning
confidence: 99%