Skip to main content

Cyber-Physical Security

  • Reference work entry
  • First Online:
Encyclopedia of Systems and Control

Abstract

Recent cyberattacks targeting critical infrastructures, such as power systems and nuclear facilities, have shown that malicious, advanced attacks on control and monitoring systems are a serious concern. These systems rely on tight integration of cyber and physical components, implying that cyberattacks may have serious physical consequences. This has led to an increased interest for Cyber-Physical Systems (CPS) security, and we here review some of the fundamental problems considered. We review basic modeling of the CPS components in networked control systems and how to model a cyberattack. We discuss different classes of attack strategies and the resources required. Particular attention is given to analysis of detectability and impact of attacks. For the system operator, attack mitigation is a particular concern, and we review some common strategies. Finally, we point out future directions for research.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 1,699.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 1,999.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Bibliography

  • Amin S, Cárdenas AA, Sastry SS (2009) Safe and secure networked control systems under denial-of-service attacks. In: International workshop on hybrid systems: computation and control. Springer, pp 31–45

    Google Scholar 

  • Amin S, Litrico X, Sastry S, Bayen AM (2013) Cyber security of water SCADA systems-Part I: analysis and experimentation of stealthy deception attacks. IEEE Trans Control Syst Technol 21(5):1963–1970

    Article  Google Scholar 

  • Bai CZ, Pasqualetti F, Gupta V (2017) Data-injection attacks in stochastic control systems: detectability and performance tradeoffs. Automatica 82:251–260

    Article  MathSciNet  MATH  Google Scholar 

  • Basseville M (1988) Detecting changes in signals and systems: a survey. Automatica 24(3):309–326

    Article  MathSciNet  MATH  Google Scholar 

  • Bishop M (2002) Computer security: art and science. Addison-Wesley Professional, USA

    Google Scholar 

  • Blanke M, Kinnaert M, Lunze J, Staroswiecki M (2015) Diagnosis and fault-tolerant control, 3rd edn. Springer

    MATH  Google Scholar 

  • Cardenas AA (2019) Cyber-physical systems security. Knowledge area report, CyBOK

    Google Scholar 

  • Cárdenas AA, Amin S, Lin ZS, Huang YL, Huang CY, Sastry S (2011) Attacks against process control systems: risk assessment, detection, and response. In: Proceedings of the 6th ACM symposium on information, computer and communications security, ASIACCS’11. ACM, New York, pp 355–366

    Chapter  Google Scholar 

  • Cetinkaya A, Ishii H, Hayakawa T (2017) Networked control under random and malicious packet losses. IEEE Trans Autom Control 62(5):2434–2449

    Article  MathSciNet  MATH  Google Scholar 

  • Chong MS, Sandberg H, Teixeira AMH (2019) A tutorial introduction to security and privacy for cyber-physical systems. In: 2019 18th European control conference (ECC), pp 968–978

    Google Scholar 

  • Cortés J, Dullerud GE, Han S, Le Ny J, Mitra S, Pappas GJ (2016) Differential privacy in control and network systems. In: 2016 IEEE 55th conference on decision and control (CDC). IEEE, pp 4252–4272

    Google Scholar 

  • De Persis C, Tesi P (2015) Input-to-state stabilizing control under denial-of-service. IEEE Trans Autom Control 60(11):2930–2944

    Article  MathSciNet  MATH  Google Scholar 

  • Farokhi F, Shames I, Batterham N (2017) Secure and private control using semi-homomorphic encryption. Control Eng Pract 67:13–20

    Article  Google Scholar 

  • Fawzi H, Tabuada P, Diggavi S (2014) Secure estimation and control for cyber-physical systems under adversarial attacks. IEEE Trans Autom Control 59(6):1454–1467

    Article  MathSciNet  MATH  Google Scholar 

  • Ferrari RM, Teixeira AM (2017) Detection and isolation of replay attacks through sensor watermarking. IFAC-PapersOnLine 50(1):7363–7368

    Article  Google Scholar 

  • Giraldo J, Urbina D, Cardenas A, Valente J, Faisal M, Ruths J, Tippenhauer NO, Sandberg H, Candell R (2018) A survey of physics-based attack detection in cyber-physical systems. ACM Comput Surv 51(4):76:1–76:36

    Google Scholar 

  • Hemsley KE, Fisher RE (2018) History of industrial control system cyber incidents. Technical Report INL/CON-18-44411-Rev002, Idaho National Lab. (INL), Idaho Falls

    Google Scholar 

  • Kim J, Lee C, Shim H, Cheon JH, Kim A, Kim M, Song Y (2016) Encrypting controller using fully homomorphic encryption for security of cyber-physical systems. IFAC-PapersOnLine 49(22):175–180

    Article  Google Scholar 

  • Leong AS, Redder A, Quevedo DE, Dey S (2018) On the use of artificial noise for secure state estimation in the presence of eavesdroppers. In: 2018 European control conference (ECC), pp 325–330

    Google Scholar 

  • Miao F, Zhu Q, Pajic M, Pappas GJ (2017) Coding schemes for securing cyber-physical systems against stealthy data injection attacks. IEEE Trans Control Netw Syst 4(1):106–117

    Article  MathSciNet  MATH  Google Scholar 

  • Mo Y, Sinopoli B (2009) Secure control against replay attacks. In: 2009 47th annual Allerton conference on communication, control, and computing, Allerton, pp 911–918

    Google Scholar 

  • Mo Y, Garone E, Casavola A, Sinopoli B (2010) False data injection attacks against state estimation in wireless sensor networks. In: 49th IEEE conference on decision and control (CDC), pp 5967–5972

    Google Scholar 

  • Mo Y, Weerakkody S, Sinopoli B (2015) Physical authentication of control systems: designing watermarked control inputs to detect counterfeit sensor outputs. IEEE Control Syst 35(1):93–109

    Article  MathSciNet  Google Scholar 

  • Pasqualetti F, Dörfler F, Bullo F (2013) Attack detection and identification in cyber-physical systems. IEEE Trans Autom Control 58(11):2715–2729

    Article  MathSciNet  MATH  Google Scholar 

  • Sandberg H, Amin S, Johansson KH (2015) Cyberphysical security in networked control systems: an introduction to the issue. IEEE Control Syst Mag 35(1):20–23

    Article  MathSciNet  Google Scholar 

  • Sundaram S, Hadjicostis CN (2011) Distributed function calculation via linear iterative strategies in the presence of malicious agents. IEEE Trans Autom Control 56(7):1495–1508

    Article  MathSciNet  MATH  Google Scholar 

  • Teixeira A, Shames I, Sandberg H, Johansson KH (2015) A secure control framework for resource-limited adversaries. Automatica 51(1):135–148

    Article  MathSciNet  MATH  Google Scholar 

  • Ugrinovskii V, Langbort C (2017) Controller–jammer game models of denial of service in control systems operating over packet-dropping links. Automatica 84:128–141

    Article  MathSciNet  MATH  Google Scholar 

  • Weerakkody S, Sinopoli B (2015) Detecting integrity attacks on control systems using a moving target approach. In: 2015 54th IEEE conference on decision and control (CDC). IEEE, pp 5820–5826

    Google Scholar 

  • Wiese M, Oechtering TJ, Johansson KH, Papadimitratos P, Sandberg H, Skoglund M (2019) Secure estimation and zero-error secrecy capacity. IEEE Trans Autom Control. 64(3):1047–1062

    Article  MathSciNet  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Henrik Sandberg .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Switzerland AG

About this entry

Check for updates. Verify currency and authenticity via CrossMark

Cite this entry

Sandberg, H. (2021). Cyber-Physical Security. In: Baillieul, J., Samad, T. (eds) Encyclopedia of Systems and Control. Springer, Cham. https://doi.org/10.1007/978-3-030-44184-5_100112

Download citation

Publish with us

Policies and ethics