2017
DOI: 10.9746/jcmsi.10.563
|View full text |Cite
|
Sign up to set email alerts
|

On the Vulnerabilities Due to Manipulative Zero-Stealthy Attacks in Cyber-Physical Systems

Abstract: :In this paper, we analyze the vulnerabilities due to integrity cyber attacks named zero-stealthy attacks in cyber-physical systems, which are modeled as a stochastic linear time invariant (LTI) system equipped with a Kalman filter, an LQG controller, and a χ 2 failure detector. The attacks are designed by a sophisticated attacker so that the measurement residual of the compromised system coincides with the healthy one, and thus it is impossible to detect the attacks. First, we characterize and analyze an exis… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 10 publications
(3 citation statements)
references
References 21 publications
0
3
0
Order By: Relevance
“…An attacker can even freeze one sensor measurement in a PLC, misleading in this way the operator (Krotofil et al, 2014). It is even possible to modify the sensor measurement and trigger a faulty safety alarm (Shinohara & Namerikawa, 2017). The navigation computer systems can be infected using SQL injections (DNV GL, 2016;Flaus, 2019) and the ship navigation systems have been proved vulnerable to malware installations (Wingrove, 2018).…”
Section: Resultsmentioning
confidence: 99%
“…An attacker can even freeze one sensor measurement in a PLC, misleading in this way the operator (Krotofil et al, 2014). It is even possible to modify the sensor measurement and trigger a faulty safety alarm (Shinohara & Namerikawa, 2017). The navigation computer systems can be infected using SQL injections (DNV GL, 2016;Flaus, 2019) and the ship navigation systems have been proved vulnerable to malware installations (Wingrove, 2018).…”
Section: Resultsmentioning
confidence: 99%
“…In a power network, the state estimation problem in the steady-state aims to estimate the state (the vector consisting of the bus phase angles) from the measured value (the vector consisting of active power flow measurements). In state estimation of steadystate power networks, a false data injection (FDI) attack that cannot be detected from the residual (i.e., the difference between the observed and estimated values) is well known [4], [6], [11], [14]. FDI attacks can be realized by attacking multiple sensors simultaneously under the assumption that an attacker knows the structure (i.e., the sensor placement) of a given power network.…”
Section: Introductionmentioning
confidence: 99%
“…One challenge to a secure operation of CPS is identifying the vulnerabilities due to malicious attacks and developing countermeasures against them [8]- [12]. To be honest, however, while IoT (Internet of Things) devices have increased, cyber incidents are also increasing, and it is generally difficult to ensure the security of all sensors or devices.…”
Section: Introductionmentioning
confidence: 99%