scispace - formally typeset
Journal ArticleDOI

Cyber Security of Water SCADA Systems—Part I: Analysis and Experimentation of Stealthy Deception Attacks

Reads0
Chats0
TLDR
The deception attack presented here can enable remote water pilfering from automated canal systems and is reported on a field-operational test attack on the Gignac canal system located in Southern France.
Abstract
This brief aims to perform security threat assessment of networked control systems with regulatory and supervisory control layers. We analyze the performance of a proportional-integral controller (regulatory layer) and a model-based diagnostic scheme (supervisory layer) under a class of deception attacks. We adopt a conservative approach by assuming that the attacker has knowledge of: 1) the system dynamics; 2) the parameters of the diagnostic scheme; and 3) the sensor-control signals. The deception attack presented here can enable remote water pilfering from automated canal systems. We also report a field-operational test attack on the Gignac canal system located in Southern France.

read more

Citations
More filters
Proceedings ArticleDOI

Prevention of Cyber Attacks in Control Systems: A Review

TL;DR: A general survey based on the detection and prevention of attacks in wireless network covering relevant works such that different techniques, various types of intruders and typical prevention approach are covered.
Journal ArticleDOI

Security investment of interdependent and identical CPSs: Stochastic games with asymmetric information

TL;DR: This paper considers remote state estimation in cyber‐physical systems (CPSs) with multiple sensors, where measurements of each sensor are transmitted to the corresponding remote estimator over a shared communication network with interdependent security.
Journal ArticleDOI

Analyzing and Mitigating Water Utility System Vulnerabilities

TL;DR: Water distribution and wastewater systems are vulnerable to physical attacks and cyberattacks as mentioned in this paper , and they need to be protected against physical and cyber-attacks, and they should be protected from physical attacks.
Book ChapterDOI

Cyberattack-Resilient Hybrid Controller Design with Application to UAS

TL;DR: This work proposes a hybrid control framework containing multiple sub-controllers that can adapt to various cyberattacks by switching sub- Controllers, and the robustness of the controller is achieved by the switching logic which determines the safest sub-controller whose future performance under attack is the least bad.
References
More filters
Journal ArticleDOI

False data injection attacks against state estimation in electric power grids

TL;DR: In this article, a new class of attacks, called false data injection attacks, against state estimation in electric power grids is presented and analyzed, under the assumption that the attacker can access the current power system configuration information and manipulate the measurements of meters at physically protected locations such as substations.
Proceedings ArticleDOI

False data injection attacks against state estimation in electric power grids

TL;DR: A new class of attacks, called false data injection attacks, against state estimation in electric power grids are presented, showing that an attacker can exploit the configuration of a power system to launch such attacks to successfully introduce arbitrary errors into certain state variables while bypassing existing techniques for bad measurement detection.
Journal ArticleDOI

Full-order observers for linear systems with unknown inputs

TL;DR: This note presents a simple method to design a full-order observer for linear systems with unknown inputs and the necessary and sufficient conditions for the existence of the observer are given.
Proceedings ArticleDOI

Attacks against process control systems: risk assessment, detection, and response

TL;DR: By incorporating knowledge of the physical system under control, this paper is able to detect computer attacks that change the behavior of the targeted control system and analyze the security and safety of the mechanisms by exploring the effects of stealthy attacks, and by ensuring that automatic attack-response mechanisms will not drive the system to an unsafe state.
Book ChapterDOI

Lessons Learned from the Maroochy Water Breach

TL;DR: This paper examines the response to the 2000 SCADA security incident at Maroochy Water Services in Queensland, Australia and the lessons learned are useful for establishing academic and industry-based research agendas inSCADA security as well as for safeguarding critical infrastructure.
Related Papers (5)