Abstract
This entry introduces security issues in cyber-physical systems mainly from two perspectives: one is to analyze the attack effectiveness from the malicious attacker’s perspective and the other is to design the attack detection mechanism and control scheme from the system designer’s perspective. For the first research aspect, existing works focused on the worst-case performance degradation analysis when the system is under a certain type of attack are introduced, among which DoS attack and integrity attack are of the most interest. For the second research aspect, existing works providing countermeasures to detect the existence of attacks and proposing resilient estimation and control methodologies against hostile attacks are introduced. The main framework of cyber-physical systems is provided, and solid results about security issues are reviewed from selected high-quality journal papers in this entry.
Similar content being viewed by others
Bibliography
Andress J (2014) The basics of information security: understanding the fundamentals of InfoSec in theory and practice, 2nd edition. Syngress Media, Waltham, MA
Bai C-Z, Pasqualetti F, Gupta V (2015) Security in stochastic control systems: fundamental limitations and performance bounds. In: Proceedings of the American control conference, pp 195–200
Bai C-Z, Pasqualetti F, Gupta V (2017a) Data-injection attacks in stochastic control systems: detectability and performance tradeoffs. Automatica 82:251–260
Bai C-Z, Gupta V, Pasqualetti F (2017b) On Kalman filtering with compromised sensors: attack stealthiness and performance bounds. IEEE Trans Autom Control 62(12):6641–6648
Bertsekas DP (1995) Dynamic programming and optimal control, vol 1. Athena Scientific, Belmont
Chen Y, Kar S, Moura JMF. Cyber-physical attacks with control objectives. IEEE Trans Autom Control 63(5):1418–1425
Ding K, Li Y, Quevedo DE, Dey S, Shi L (2017) A multi-channel transmission schedule for remote state estimation under DoS attacks. Automatica 78:194–201
Ding K, Ren X, Quevedo DE, Dey S, Shi L (2019) DoS attacks on remote state estimation with asymmetric information. IEEE Trans Control Netw Syst 6(2):653–666
Farwell JP, Rohozinski R (2011) Stuxnet and the future of cyber war. Survival 53(1):23–40
Fawzi H, Tabuada P, Diggavi S (2014) Secure estimation and control for cyber-physical systems under adversarial attacks. IEEE Trans Autom Control 59(6): 1454–1467
Frank R (2013) Understanding smart sensors. Artech House, Norwood, MA
Gungor VC, Hancke GP (2009) Industrial wireless sensor networks: challenges, design principles, and technical approaches. IEEE Trans Ind Electron 56(10):4258–4265
Guo Z, Shi D, Johansson KH, Shi L (2017) Optimal linear cyber-attack on remote state estimation. IEEE Trans Control Netw Syst 4(1):4–13
Guo Z, Shi D, Johansson KH, Shi L (2018) Worst-case stealthy innovation-based linear attack on remote state estimation. Automatica 89:117–124
Guo Z, Shi D, Quevedo DE, Shi L (2019) Secure state estimation against integrity attacks: a Gaussian mixture model approach. IEEE Trans Signal Process 67(1):194–207
Han D, Mo Y, Xie L (2016) Resilience and performance analysis for state estimation against integrity attacks. IFAC-PapersOnLine 49(22):55–60
Hovareshti P, Gupta V, Baras JS (2007) Sensor scheduling using smart sensors. In: Proceedings of IEEE conference on decision and control, pp 494–499
Hu L, Wang Z, Han Q, Liu X (2018) State estimation under false data injection attacks: security analysis and system protection. Automatica 87:176–183
Kim KD, Kumar PR (2012) Cyber-physical systems: a perspective at the centennial. Proc IEEE 100:1287–1308
Kung E, Dey S, Shi L (2017) The performance and limitations of 𝜖-stealthy attacks on higher order systems. IEEE Trans Autom Control 62(2):941–947
Leong AS, Quevedo DE, Dolz D, Dey S (2019) Transmission scheduling for remote state estimation over packet dropping links in the presence of an eavesdropper. IEEE Trans Autom Control 64(9):3732–3739
Lewis FL (2004) Wireless sensor networks. In: Smart environments: technologies, protocols, and applications, pp 11–46
Li Y, Quevedo DE, Dey S, Shi L (2015a) Fake-acknowledgment attack on ACK-based sensor power schedule for remote state estimation. In: Proceedings of IEEE conference on decision and control, pp 5795–5800
Li Y, Shi L, Cheng P, Chen J, Quevedo DE (2015b) Jamming attacks on remote state estimation in cyber-physical systems: a game-theoretic approach. IEEE Trans Autom Control 60(10):2831–2836
Li Y, Shi L, Chen T (2019) Detection against linear deception attacks on multi-sensor remote state estimation. IEEE Trans Control Netw Syst 5(3):846–856
Mehra RK, Peschon J (1971) An innovations approach to fault detection and diagnosis in dynamic systems. Automatica 7(5):637–640
Miao F, Pajic M, Pappas GJ (2013) Stochastic game approach for replay attack detection. In: Proceedings of IEEE conference on decision and control, pp 1854–1859
Mishra S, Shoukry Y, Karamchandani N, Diggavi SN, Tabuada P (2017) Secure state estimation against sensor attacks in the presence of noise. IEEE Trans Control Netw Syst 4(1):49–59
Mo Y, Garone E (2016) Secure dynamic state estimation via local estimators. In: Proceedings of IEEE conference on decision and control, pp 5073–5078
Mo Y, Murray RM (2017) Privacy preserving average consensus. IEEE Trans Autom Control 62(2):753–765
Mo Y, Sinopoli B (2009) Secure control against replay attacks. In: Proceedings of annual Allerton conference on communication, control, and computing (Allerton), pp 911–918
Mo Y, Sinopoli B (2010) False data injection attacks in control systems. In: Proceedings of 1st workshop on secure control systems, pp 1–6
Mo Y, Sinopoli B (2016) On the performance degradation of cyber-physical systems under stealthy integrity attacks. IEEE Trans Autom Control 61(9):2618–2624
Mo Y, Weerakkody S, Sinopoli B (2015) Physical authentication of control systems: designing watermarked control inputs to detect counterfeit sensor outputs. IEEE Control Syst Mag 35(1):93–109
Pajic M, Weimer J, Bezzo N, Tabuada P, Sokolsky O, Lee I, Pappas GJ (2014) Robustness of attack-resilient state estimators. In: Proceedings of international conference on cyber-physical systems, pp 1163–1174
Qin J, Li M, Shi L, Yu X (2018) Optimal denial-of-service attack scheduling with energy constraint over packet-dropping networks. IEEE Trans Autom Control 63(6):1648–1663
Schenato L (2008) Optimal estimation in networked control systems subject to random delay and packet drop. IEEE Trans Autom Control 53(5):1311–1317
Shi D, Elliott RJ, Chen T (2017) On finite-state stochastic modeling and secure estimation of cyber-physical systems. IEEE Trans Autom Control 62(1):65–80
Shi D, Guo Z, Johansson KH, Shi L (2018) Causality countermeasures for anomaly detection in cyber-physical systems. IEEE Trans Autom Control 63(2):386–401
Shoukry Y, Nuzzo P, Puggelli A, Sangiovanni-Vincentelli AL, Seshia SA, Tabuada P (2017) Secure state estimation for cyber-physical systems under sensor attacks: a satisfiability modulo theory approach. IEEE Trans Autom Control 62(10):4917–4932
Slay J, Miller M (2007) Lessons learned from the Maroochy Water breach. In: Proceedings of the international conference on critical infrastructure protection, pp 73–82
Teixeira A, Shames I, Sandberg H, Johansson KH (2015) A secure control framework for resource-limited adversaries. Automatica 51:135–148
Xu W, Ma K, Trappe W, Zhang Y (2006) Jamming sensor networks: attack and defense strategies. IEEE Netw 20(3):41–47
Zhang H, Cheng P, Shi L, Chen J (2015) Optimal denial-of-service attack scheduling with energy constraint. IEEE Trans Autom Control 60(11):3023–3028
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Section Editor information
Rights and permissions
Copyright information
© 2020 Springer-Verlag London Ltd., part of Springer Nature
About this entry
Cite this entry
Ni, Y., Guo, Z., Shi, L. (2020). Cyber-Physical Systems Security: A Control-Theoretic Approach. In: Baillieul, J., Samad, T. (eds) Encyclopedia of Systems and Control. Springer, London. https://doi.org/10.1007/978-1-4471-5102-9_100138-1
Download citation
DOI: https://doi.org/10.1007/978-1-4471-5102-9_100138-1
Published:
Publisher Name: Springer, London
Print ISBN: 978-1-4471-5102-9
Online ISBN: 978-1-4471-5102-9
eBook Packages: Springer Reference EngineeringReference Module Computer Science and Engineering