2019
DOI: 10.1109/access.2019.2927484
|View full text |Cite
|
Sign up to set email alerts
|

Mitigating Sensor Attacks Against Industrial Control Systems

Abstract: This paper describes how to design and implement a mechanism that helps to mitigate sensor attacks on industrial control systems. The proposed architecture is based on concepts from fault-tolerant control techniques. This short note explains how a Kalman filter can be used simultaneously with optimal disturbance decoupling observers to improve the performance of the mitigation mechanism for sensor attacks in cyber-physical control systems. Our proposal mitigates attacks by generating a signal that compensates … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

2
14
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 23 publications
(16 citation statements)
references
References 31 publications
2
14
0
Order By: Relevance
“…which needs to be solved for , γ and P and, therefore, it is not an LMI. Finally, applying the Schur complement to each of the principal diagonal elements and defining α −1 = ε γ 2 , the problem of finding the upper limit for the attack in order the complete closed-loop system (controller together with observer) remains stable can be formulated as (20). If we only apply the Schur complement to the term −P + ε −1 P D D P in (32), the problem can be formulated as (21), with β = ε γ 2 .…”
Section: B Quadratic Lyapunov Stability For the Attacked Systemmentioning
confidence: 99%
See 1 more Smart Citation
“…which needs to be solved for , γ and P and, therefore, it is not an LMI. Finally, applying the Schur complement to each of the principal diagonal elements and defining α −1 = ε γ 2 , the problem of finding the upper limit for the attack in order the complete closed-loop system (controller together with observer) remains stable can be formulated as (20). If we only apply the Schur complement to the term −P + ε −1 P D D P in (32), the problem can be formulated as (21), with β = ε γ 2 .…”
Section: B Quadratic Lyapunov Stability For the Attacked Systemmentioning
confidence: 99%
“…The effect on the tracking closed-loop control systems stability of these two types of attacks is then analyzed and the vulnerability level of each sensor is quantified. We also use the attack detection, isolation, and mitigation mechanisms described in [20] to see if the considered attacks can be mitigated, finding that once the attacker succeeds in making the system unstable, secure state estimation and, therefore, the mitigation of the sensor attack cannot be achieved. We use some tools from robust control theory to formulate two equivalent optimization problems with LMI constraints, which allows us to find a conservative limit on the gain of each sensor of the system to determine which of the system outputs is more vulnerable to multiplicative attacks.…”
Section: Introductionmentioning
confidence: 99%
“…In addition, sensor resilience can be improved using software approaches that do not require to add extra hardware devices. For example, the techniques proposed in [12], [5], [6] and [25] provide resilient state estimation and reconstruction in the presence of integrity attacks.…”
Section: B Design and Structure Analysismentioning
confidence: 99%
“…The protection of communication protocols, asset management, physical infrastructures, and controlled processes will come under the security of the SCADA system that is the most important element of the smart grid, and these cannot be handled the same as IT system contemporaries. Some of the key components are supporting software such as Human Machine Interface (HMI), Distributed Control Systems (DCS), Programmable Logical Controllers (PLC), Remote Terminal Units (RTU), network equipment, servers, and computers (Co ´mbita et al 2019, Pang et al 2020, Sun et al 2020, Elnour et al 2020). Hence, it is essential to protect the system against attacks and secure communication.…”
Section: Introductionmentioning
confidence: 99%