Abstract
Recent cyberattacks targeting critical infrastructures, such as power systems and nuclear facilities, have shown that malicious, advanced attacks on control and monitoring systems are a serious concern. These systems rely on tight integration of cyber and physical components, implying that cyberattacks may have serious physical consequences. This has led to an increased interest for Cyber-Physical Systems (CPS) security, and we here review some of the fundamental problems considered. We review basic modeling of the CPS components in networked control systems and how to model a cyberattack. We discuss different classes of attack strategies and the resources required. Particular attention is given to analysis of detectability and impact of attacks. For the system operator, attack mitigation is a particular concern, and we review some common strategies. Finally, we point out future directions for research.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Bibliography
Amin S, Cárdenas AA, Sastry SS (2009) Safe and secure networked control systems under denial-of-service attacks. In: International workshop on hybrid systems: computation and control. Springer, pp 31–45
Amin S, Litrico X, Sastry S, Bayen AM (2013) Cyber security of water SCADA systems-Part I: analysis and experimentation of stealthy deception attacks. IEEE Trans Control Syst Technol 21(5):1963–1970
Bai CZ, Pasqualetti F, Gupta V (2017) Data-injection attacks in stochastic control systems: detectability and performance tradeoffs. Automatica 82:251–260
Basseville M (1988) Detecting changes in signals and systems: a survey. Automatica 24(3):309–326
Bishop M (2002) Computer security: art and science. Addison-Wesley Professional, USA
Blanke M, Kinnaert M, Lunze J, Staroswiecki M (2015) Diagnosis and fault-tolerant control, 3rd edn. Springer
Cardenas AA (2019) Cyber-physical systems security. Knowledge area report, CyBOK
Cárdenas AA, Amin S, Lin ZS, Huang YL, Huang CY, Sastry S (2011) Attacks against process control systems: risk assessment, detection, and response. In: Proceedings of the 6th ACM symposium on information, computer and communications security, ASIACCS’11. ACM, New York, pp 355–366
Cetinkaya A, Ishii H, Hayakawa T (2017) Networked control under random and malicious packet losses. IEEE Trans Autom Control 62(5):2434–2449
Chong MS, Sandberg H, Teixeira AMH (2019) A tutorial introduction to security and privacy for cyber-physical systems. In: 2019 18th European control conference (ECC), pp 968–978
Cortés J, Dullerud GE, Han S, Le Ny J, Mitra S, Pappas GJ (2016) Differential privacy in control and network systems. In: 2016 IEEE 55th conference on decision and control (CDC). IEEE, pp 4252–4272
De Persis C, Tesi P (2015) Input-to-state stabilizing control under denial-of-service. IEEE Trans Autom Control 60(11):2930–2944
Farokhi F, Shames I, Batterham N (2017) Secure and private control using semi-homomorphic encryption. Control Eng Pract 67:13–20
Fawzi H, Tabuada P, Diggavi S (2014) Secure estimation and control for cyber-physical systems under adversarial attacks. IEEE Trans Autom Control 59(6):1454–1467
Ferrari RM, Teixeira AM (2017) Detection and isolation of replay attacks through sensor watermarking. IFAC-PapersOnLine 50(1):7363–7368
Giraldo J, Urbina D, Cardenas A, Valente J, Faisal M, Ruths J, Tippenhauer NO, Sandberg H, Candell R (2018) A survey of physics-based attack detection in cyber-physical systems. ACM Comput Surv 51(4):76:1–76:36
Hemsley KE, Fisher RE (2018) History of industrial control system cyber incidents. Technical Report INL/CON-18-44411-Rev002, Idaho National Lab. (INL), Idaho Falls
Kim J, Lee C, Shim H, Cheon JH, Kim A, Kim M, Song Y (2016) Encrypting controller using fully homomorphic encryption for security of cyber-physical systems. IFAC-PapersOnLine 49(22):175–180
Leong AS, Redder A, Quevedo DE, Dey S (2018) On the use of artificial noise for secure state estimation in the presence of eavesdroppers. In: 2018 European control conference (ECC), pp 325–330
Miao F, Zhu Q, Pajic M, Pappas GJ (2017) Coding schemes for securing cyber-physical systems against stealthy data injection attacks. IEEE Trans Control Netw Syst 4(1):106–117
Mo Y, Sinopoli B (2009) Secure control against replay attacks. In: 2009 47th annual Allerton conference on communication, control, and computing, Allerton, pp 911–918
Mo Y, Garone E, Casavola A, Sinopoli B (2010) False data injection attacks against state estimation in wireless sensor networks. In: 49th IEEE conference on decision and control (CDC), pp 5967–5972
Mo Y, Weerakkody S, Sinopoli B (2015) Physical authentication of control systems: designing watermarked control inputs to detect counterfeit sensor outputs. IEEE Control Syst 35(1):93–109
Pasqualetti F, Dörfler F, Bullo F (2013) Attack detection and identification in cyber-physical systems. IEEE Trans Autom Control 58(11):2715–2729
Sandberg H, Amin S, Johansson KH (2015) Cyberphysical security in networked control systems: an introduction to the issue. IEEE Control Syst Mag 35(1):20–23
Sundaram S, Hadjicostis CN (2011) Distributed function calculation via linear iterative strategies in the presence of malicious agents. IEEE Trans Autom Control 56(7):1495–1508
Teixeira A, Shames I, Sandberg H, Johansson KH (2015) A secure control framework for resource-limited adversaries. Automatica 51(1):135–148
Ugrinovskii V, Langbort C (2017) Controller–jammer game models of denial of service in control systems operating over packet-dropping links. Automatica 84:128–141
Weerakkody S, Sinopoli B (2015) Detecting integrity attacks on control systems using a moving target approach. In: 2015 54th IEEE conference on decision and control (CDC). IEEE, pp 5820–5826
Wiese M, Oechtering TJ, Johansson KH, Papadimitratos P, Sandberg H, Skoglund M (2019) Secure estimation and zero-error secrecy capacity. IEEE Trans Autom Control. 64(3):1047–1062
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Switzerland AG
About this entry
Cite this entry
Sandberg, H. (2021). Cyber-Physical Security. In: Baillieul, J., Samad, T. (eds) Encyclopedia of Systems and Control. Springer, Cham. https://doi.org/10.1007/978-3-030-44184-5_100112
Download citation
DOI: https://doi.org/10.1007/978-3-030-44184-5_100112
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-44183-8
Online ISBN: 978-3-030-44184-5
eBook Packages: Intelligent Technologies and RoboticsReference Module Computer Science and Engineering