TY - GEN
T1 - Stealthy deception attacks for cyber-physical systems
AU - Góes, Rômulo Meira
AU - Kang, Eunsuk
AU - Kwong, Raymond
AU - Lafortune, Stéphane
N1 - Publisher Copyright:
© 2017 IEEE.
PY - 2017/6/28
Y1 - 2017/6/28
N2 - We study the security of Cyber-Physical Systems (CPS) in the context of the supervisory control layer. Specifically, we propose a general model of a CPS attacker in the framework of Discrete Event Systems (DES) and investigate the problem of synthesizing an attack strategy for a given controlled system. Our model captures a class of deception attacks, where the attacker has the ability to modify a subset of sensor readings and mislead the supervisor, with the goal of inducing the system into an undesirable state. We introduce a new type of a bipartite transition structure, called Insertion-Deletion Attack structure (IDA), to capture the game-like interaction between the supervisor and the environment (which includes the system and attacker). This structure is a discrete transition system that embeds information about all possible attacker's stealthy actions, and all states (some possibly unsafe) that become reachable as a result of those actions. We present a procedure for the construction of the IDA and discuss its properties. Based on the IDA, we discuss the characterization of successful stealthy attacks, i.e., attacks that avoid detection from the supervisor and cause damage to the system.
AB - We study the security of Cyber-Physical Systems (CPS) in the context of the supervisory control layer. Specifically, we propose a general model of a CPS attacker in the framework of Discrete Event Systems (DES) and investigate the problem of synthesizing an attack strategy for a given controlled system. Our model captures a class of deception attacks, where the attacker has the ability to modify a subset of sensor readings and mislead the supervisor, with the goal of inducing the system into an undesirable state. We introduce a new type of a bipartite transition structure, called Insertion-Deletion Attack structure (IDA), to capture the game-like interaction between the supervisor and the environment (which includes the system and attacker). This structure is a discrete transition system that embeds information about all possible attacker's stealthy actions, and all states (some possibly unsafe) that become reachable as a result of those actions. We present a procedure for the construction of the IDA and discuss its properties. Based on the IDA, we discuss the characterization of successful stealthy attacks, i.e., attacks that avoid detection from the supervisor and cause damage to the system.
UR - http://www.scopus.com/inward/record.url?scp=85046267251&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85046267251&partnerID=8YFLogxK
U2 - 10.1109/CDC.2017.8264281
DO - 10.1109/CDC.2017.8264281
M3 - Conference contribution
AN - SCOPUS:85046267251
T3 - 2017 IEEE 56th Annual Conference on Decision and Control, CDC 2017
SP - 4224
EP - 4230
BT - 2017 IEEE 56th Annual Conference on Decision and Control, CDC 2017
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 56th IEEE Annual Conference on Decision and Control, CDC 2017
Y2 - 12 December 2017 through 15 December 2017
ER -