scispace - formally typeset
Open AccessJournal ArticleDOI

Secure Estimation and Control for Cyber-Physical Systems Under Adversarial Attacks

TLDR
A new simple characterization of the maximum number of attacks that can be detected and corrected as a function of the pair (A,C) of the system is given and it is shown that it is impossible to accurately reconstruct the state of a system if more than half the sensors are attacked.
Abstract
The vast majority of today's critical infrastructure is supported by numerous feedback control loops and an attack on these control loops can have disastrous consequences. This is a major concern since modern control systems are becoming large and decentralized and thus more vulnerable to attacks. This paper is concerned with the estimation and control of linear systems when some of the sensors or actuators are corrupted by an attacker. We give a new simple characterization of the maximum number of attacks that can be detected and corrected as a function of the pair $(A,C)$ of the system and we show in particular that it is impossible to accurately reconstruct the state of a system if more than half the sensors are attacked. In addition, we show how the design of a secure local control loop can improve the resilience of the system. When the number of attacks is smaller than a threshold, we propose an efficient algorithm inspired from techniques in compressed sensing to estimate the state of the plant despite attacks. We give a theoretical characterization of the performance of this algorithm and we show on numerical simulations that the method is promising and allows to reconstruct the state accurately despite attacks. Finally, we consider the problem of designing output-feedback controllers that stabilize the system despite sensor attacks. We show that a principle of separation between estimation and control holds and that the design of resilient output feedback controllers can be reduced to the design of resilient state estimators.

read more

Citations
More filters
Journal ArticleDOI

A survey on security control and attack detection for industrial cyber-physical systems

TL;DR: An overview of recent advances on security control and attack detection of industrial CPSs is presented, and robustness, security and resilience as well as stability are discussed to govern the capability of weakening various attacks.
Journal ArticleDOI

Digital Twins and Cyber–Physical Systems toward Smart Manufacturing and Industry 4.0: Correlation and Comparison

TL;DR: This paper reviews and analyzes CPS and DTs from multiple perspectives, including their origin, development, engineering practices, cyber–physical mapping, and core elements.
Journal ArticleDOI

Detecting Integrity Attacks on SCADA Systems

TL;DR: The main contributions of this paper lies in enumerating the conditions of the feasibility of the replay attack, and suggesting countermeasures that optimize the probability of detection by conceding control performance.
Journal ArticleDOI

Physical Authentication of Control Systems: Designing Watermarked Control Inputs to Detect Counterfeit Sensor Outputs

TL;DR: A wide variety of motivations exists for launching an attack on CPSs, ranging from economic reasons, such as obtaining a financial gain, all the way to terrorism, for instance, threatening an entire population by manipulating life-critical resources.
Journal ArticleDOI

Big data for cyber physical systems in industry 4.0: a survey

TL;DR: This survey conducts this survey to bring more attention to this critical intersection between cyber physical systems and big data and highlight the future research direction to achieve the fully autonomy in Industry 4.0.
References
More filters
Journal ArticleDOI

Decoding by linear programming

TL;DR: F can be recovered exactly by solving a simple convex optimization problem (which one can recast as a linear program) and numerical experiments suggest that this recovery procedure works unreasonably well; f is recovered exactly even in situations where a significant fraction of the output is corrupted.
Posted Content

Decoding by Linear Programming

TL;DR: In this paper, it was shown that under suitable conditions on the coding matrix, the input vector can be recovered exactly by solving a simple convex optimization problem (which one can recast as a linear program).
Book

Essentials of Robust Control

TL;DR: In this article, the authors introduce linear algebraic Riccati Equations and linear systems with Ha spaces and balance model reduction, and Ha Loop Shaping, and Controller Reduction.
Journal ArticleDOI

Foundations of Control and Estimation Over Lossy Networks

TL;DR: In this paper, the authors consider control and estimation problems where the sensor signals and the actuator signals are transmitted to various subsystems over a network and characterize the impact of the network reliability on the performance of the feedback loop.
Posted Content

Attack Detection and Identification in Cyber-Physical Systems -- Part I: Models and Fundamental Limitations

TL;DR: This paper proposes a mathematical framework for cyber-physical systems, attacks, and monitors, and describes fundamental monitoring limitations from system-theoretic and graph- theoretic perspectives and designs centralized and distributed attack detection and identification monitors.
Related Papers (5)