Abstract
In this chapter, we characterize and illustrate fundamental limitations and trade-offs for the detection of attacks in stochastic systems with linear dynamics. Focusing on attacks that alter the control signals (actuator attacks), we propose metrics to measure the stealthiness level of an attack, which are independent from the specifics of the detection algorithm being used and thus lead to fundamental detectability bounds. Further, we characterize attacks that induce the largest performance degradation, as measured by the error covariance at a state estimator, and illustrate our results via simple examples and more involved power system models.
Text in this chapter is reproduced from Bai et al. (Automatica 82:251–260, 2017), Copyright 2017, with permission from Elsevier.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Farwell, J.P., Rohozinski, R.: Stuxnet and the future of cyber war. Survival 53(1), 23–40 (2011)
Kuvshinkova, S.: SQL Slammer worm lessons learned for consideration by the electricity sector. North American Electric Reliability Council (2003)
Mo, Y., Chabukswar, R., Sinopoli, B.: Detecting integrity attacks on SCADA systems. IEEE Trans. Control Syst. Technol. 22(4), 1396–1407 (2014)
Pasqualetti, F., Dörfler, F., Bullo, F.: Attack detection and identification in cyber-physical systems. IEEE Trans. Autom. Control 58(11), 2715–2729 (2013)
Richards, G.: Hackers vs slackers. Eng. Technol. 3(19), 40–43 (2008)
Slay, J., Miller, M.: Lessons learned from the Maroochy water breach. Crit. Infrastruct. Prot. 253, 73–82 (2007)
Teixeira, A., Pérez, D., Sandberg, H., Johansson, K.H.: Attack models and scenarios for networked control systems. In: Proceedings of the 1st International Conference on High Confidence Networked Systems, pp. 55–64. ACM (2012)
Patton, R., Frank, P., Clark, R.: Fault Diagnosis in Dynamic Systems: Theory and Applications. Prentice Hall, Upper Saddle River (1989)
Pasqualetti, F., Dörfler, F., Bullo, F.: Control-theoretic methods for cyberphysical security: geometric principles for optimal cross-layer resilient control systems. IEEE Control Syst. Mag. 35(1), 110–127 (2015)
Foroush, H.S., Martínez, S.: On multi-input controllable linear systems under unknown periodic DoS jamming attacks. In: SIAM Conference on Control and Its Applications, pp. 222–229. SIAM (2013)
Mo, Y., Sinopoli, B.: Secure control against replay attacks. In: Allerton Conference on Communications, Control and Computing, Monticello, IL, USA, September, pp. 911–918 (2010)
Smith, R.: A decoupled feedback structure for covertly appropriating network control systems. In: IFAC World Congress, Milan, Italy, August, pp. 90–95 (2011)
Dan, G., Sandberg, H.: Stealth attacks and protection schemes for state estimators in power systems. In: IEEE International Conference on Smart Grid Communications, Gaithersburg, MD, USA, October, pp. 214–219 (2010)
Giani, A., Bitar, E., Garcia, M., McQueen, M., Khargonekar, P., Poolla, K.: Smart grid data integrity attacks: characterizations and countermeasures. In: IEEE International Conference on Smart Grid Communications, Brussels, Belgium, pp. 232–237 (2011)
Liu, Y., Reiter, M.K., Ning, P.: False data injection attacks against state estimation in electric power grids. In: ACM Conference on Computer and Communications Security, Chicago, IL, USA, November, pp. 21–32 (2009)
Mohsenian-Rad, A.-H., Leon-Garcia, A.: Distributed internet-based load altering attacks against smart power grids. IEEE Trans. Smart Grid 2(4), 667–674 (2011)
Teixeira, A., Amin, S., Sandberg, H., Johansson, K.H., Sastry, S.S.: Cyber security analysis of state estimators in electric power systems. In: IEEE Conference on Decision and Control, Atlanta, GA, USA, December, pp. 5991–5998 (2010)
Bhattacharya, S., Başar, T.: Differential game-theoretic approach to a spatial jamming problem. In: Advances in Dynamic Games, pp. 245–268. Springer, Berlin (2013)
Hamza, F., Tabuada, P., Diggavi, S.: Secure state-estimation for dynamical systems under active adversaries. In: Allerton Conference on Communications, Control and Computing, September, pp. 337–344 (2011)
Maharjan, S., Zhu, Q., Zhang, Y., Gjessing, S., Başar, T.: Dependable demand response management in the smart grid: a Stackelberg game approach. IEEE Trans. Smart Grid 4(1), 120–132 (2013)
Manshaei, M., Zhu, Q., Alpcan, T., Başar, T., Hubaux, J.-P.: Game theory meets network security and privacy. ACM Comput. Surv. 45(3), 1–39 (2011)
Zhu, M., Martínez, S.: Stackelberg-game analysis of correlated attacks in cyber-physical systems. In: American Control Conference, San Francisco, CA, USA, July, pp. 4063–4068 (2011)
Zhu, Q., Tembine, H., Başar, T.: Hybrid learning in stochastic games and its application in network security. In: Reinforcement Learning and Approximate Dynamic Programming for Feedback Control, pp. 303–329 (2013)
Basile, G., Marro, G.: Controlled and Conditioned Invariants in Linear System Theory. Prentice Hall, Upper Saddle River (1991)
Fawzi, H., Tabuada, P., Diggavi, S.: Secure estimation and control for cyber-physical systems under adversarial attacks. IEEE Trans. Autom. Control 59(6), 1454–1467 (2014)
Cui, S., Han, Z., Kar, S., Kim, T.T., Poor, H.V., Tajer, A.: Coordinated data-injection attack and detection in the smart grid: a detailed look at enriching detection solutions. IEEE Signal Process. Mag. 29(5), 106–115 (2012)
Kosut, O., Jia, L., Thomas, R.J., Tong, L.: Malicious data attacks on the smart grid. IEEE Trans. Smart Grid 2(4), 645–658 (2011)
Kwon, C., Liu, W., Hwang, I.: Security analysis for cyber-physical systems against stealthy deception attacks. In: American Control Conference, Washington, DC, USA, pp. 3344–3349. IEEE (2013)
Liu, Y., Ning, P., Reiter, M.K.: False data injection attacks against state estimation in electric power grids. ACM Trans. Inf. Syst. Secur. 14(1), 13 (2011)
Bai, C.-Z., Gupta, V.: On Kalman filtering in the presence of a compromised sensor: fundamental performance bounds. In: American Control Conference, Portland, OR, June, pp. 3029–3034 (2014)
Bai, C.-Z., Pasqualetti, F., Gupta, V.: Security in stochastic control systems: fundamental limitations and performance bounds. In: American Control Conference, Chicago, IL, USA, July, pp. 195–200 (2015)
Kung, E., Dey, S., Shi, L.: The performance and limitations of \(\epsilon \)-stealthy attacks on higher order systems. IEEE Trans. Autom. Control 62(2), 941–947 (2017)
Zhang, R., Venkitasubramaniam, P.: Stealthy control signal attacks in vector LQG systems. In: American Control Conference, Boston, MA, USA, pp. 1179–1184 (2016)
Guo, Z., Shi, D., Johansson, K.H., Shi, L.: Optimal linear cyber-attack on remote state estimation. IEEE Trans. Control Netw. Syst. 4(1), 4–13 (2017)
Weerakkody, S., Sinopoli, B., Kar, S., Datta, A.: Information flow for security in control systems. IEEE Conference on Decision and Control, Las Vegas, NV, USA, pp. 5065–5072 (2016)
Chen, Y., Kar, S., Moura, J.M.F.: Optimal attack strategies subject to detection constraints against cyber-physical systems. IEEE Trans. Control Netw. Syst. 5(3), 1157–1168 (2018)
Cover, T.M., Thomas, J.A.: Elements of Information Theory, 2nd edn. Wiley, Hoboken (2006)
Bai, C.-Z., Pasqualetti, F., Gupta, V.: Data-injection attacks in stochastic control systems: detectability and performance tradeoffs. Automatica 82, 251–260 (2017)
Hespanha, J.P.: Linear Systems Theory. Princeton University Press, Princeton (2009)
El Gamal, A., Kim, Y.-H.: Network Information Theory. Cambridge University Press, Cambridge (2011)
Kundur, P.: Power System Stability and Control. McGraw-Hill Education, New York (1994)
Athay, T., Podmore, R., Virmani, S.: A practical method for the direct analysis of transient stability. IEEE Trans. Power Appar. Syst. (PAS) 98(2), 573–584 (1979)
Varga, A.: Descriptor system tools (DSTOOLS) user’s guide (2018). ArXiv eprint arXiv:1707.07140
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Katewa, V., Bai, CZ., Gupta, V., Pasqualetti, F. (2021). Detection of Attacks in Cyber-Physical Systems: Theory and Applications. In: Ferrari, R.M., Teixeira, A.M.H. (eds) Safety, Security and Privacy for Cyber-Physical Systems. Lecture Notes in Control and Information Sciences, vol 486. Springer, Cham. https://doi.org/10.1007/978-3-030-65048-3_5
Download citation
DOI: https://doi.org/10.1007/978-3-030-65048-3_5
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-65047-6
Online ISBN: 978-3-030-65048-3
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)