2019
DOI: 10.1049/iet-cta.2018.6075
|View full text |Cite
|
Sign up to set email alerts
|

Masking attack for sampled‐data systems via input redundancy

Abstract: In this paper, we introduce a new vulnerability of cyber-physical systems to malicious attack. It arises when the physical plant, that is modeled as a continuous-time LTI system, is controlled by a digital controller. In the sampled-data framework, most anomaly detectors monitor the plant's output only at discrete time instants, and thus, nothing abnormal can be detected as long as the sampled output behaves normal. This implies that if an actuator attack drives the plant's state to pass through the kernel of … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
2
2
1

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(7 citation statements)
references
References 23 publications
0
7
0
Order By: Relevance
“…It should be noted that ( 14) holds if the number of inputs, p, is large and/or the sampling period for actuation, T a , is small. Based on ( 14), a disruptive stealthy attack is proposed in [12], and the attack is termed as 'masking attack.' In order to introduce the idea of the masking attack (we call it 'enforced-zerodynamics attack' in this chapter), let us simplify the situation as…”
Section: Enforced-zero-dynamics Attackmentioning
confidence: 99%
“…It should be noted that ( 14) holds if the number of inputs, p, is large and/or the sampling period for actuation, T a , is small. Based on ( 14), a disruptive stealthy attack is proposed in [12], and the attack is termed as 'masking attack.' In order to introduce the idea of the masking attack (we call it 'enforced-zerodynamics attack' in this chapter), let us simplify the situation as…”
Section: Enforced-zero-dynamics Attackmentioning
confidence: 99%
“…In control security, a large number of attacks have focused on manipulating the outputs of a control task before it is applied to the physical plant [6]. These include biasinjection attacks [6], zero-dynamics attack 2 [6]- [11], replay attacks [12], etc. For example, a zero-dynamics attack happens when the attacker generates outputs that maliciously disguise as the unstable zero dynamics of the plant [8].…”
Section: Schedule-based Attacksmentioning
confidence: 99%
“…Similarly, in the domain of cyber-physical systems (CPS) security, the success of a large number of attacks that focus on compromising data integrity (e.g., to deceive the control task, degrade the performance of the system, or damage the environment) depends on the execution window of the attacker and the time at which the system interacts with its physical environment. For example, bias-injection attacks [6], zero-dynamics attack, [6]- [11], and replay attacks [12] affect the output of the controller and hence must be performed after the targeted task completes, while false-data injection attacks [13]- [17] must execute before the targeted task accesses its input data.…”
Section: Introductionmentioning
confidence: 99%
“…Denial of Service) [7][8][9]; and (iii) deception which is the corruption of signals (e.g. spoofing, false-data injection) [10][11][12][13][14][15][16][17][18].…”
Section: Introductionmentioning
confidence: 99%
“…outputs error, stability) [10][11][12][13][14]18]. In (b), the cyberattacks control directly the physical system at the attacker's convenience, with the aim to degrade the control performances [15][16][17]. In the literature, the degradation of the control performances have been investigated by providing analysis methods to compute the effect of such cyberattacks on the control.…”
Section: Introductionmentioning
confidence: 99%