2019
DOI: 10.1109/tac.2019.2898510
|View full text |Cite
|
Sign up to set email alerts
|

Relaxing Integrity Requirements for Attack-Resilient Cyber-Physical Systems

Abstract: The increase in network connectivity has also resulted in several high-profile attacks on cyber-physical systems. An attacker that manages to access a local network could remotely affect control performance by tampering with sensor measurements delivered to the controller. Recent results have shown that with network-based attacks, such as Man-in-the-Middle attacks, the attacker can introduce an unbounded state estimation error if measurements from a suitable subset of sensors contain false data when delivered … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

2
55
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
3
2

Relationship

2
7

Authors

Journals

citations
Cited by 55 publications
(57 citation statements)
references
References 31 publications
2
55
0
Order By: Relevance
“…In [30], the authors distinguish between the notions of information and infrastructure dependability, and clearly illustrate the need to formally model and reason about the dependability aspects of CPS applications. Jovanov and Pajic [31] focus on the CPSs communication aspects and study the effects of intermittent data integrity guarantees on system performance under stealthy attacks. Cardenas et al [32] also tackle the security issues in CPSs by identifying the problem of secure control, investigating the defenses that information security and control theory provide, and proposing a set of challenges that need to be addressed to improve the survivability of a CPS in case of cyberattacks.…”
Section: Related Workmentioning
confidence: 99%
“…In [30], the authors distinguish between the notions of information and infrastructure dependability, and clearly illustrate the need to formally model and reason about the dependability aspects of CPS applications. Jovanov and Pajic [31] focus on the CPSs communication aspects and study the effects of intermittent data integrity guarantees on system performance under stealthy attacks. Cardenas et al [32] also tackle the security issues in CPSs by identifying the problem of secure control, investigating the defenses that information security and control theory provide, and proposing a set of challenges that need to be addressed to improve the survivability of a CPS in case of cyberattacks.…”
Section: Related Workmentioning
confidence: 99%
“…For localization, the UAV mainly relies on a GPS sensor that can be compromised to effectively steer the UAV away from its original path. While aggressive attacks can be detected, some may remain stealthy by introducing only bounded errors at each step [20,26,22,16]. For example, Fig.…”
Section: Stochastic Gamesmentioning
confidence: 99%
“…These attacks are usually studied in two categories (Cárdenas et al, 2008a;Kwon et al, 2013;Lun et al, 2019). First, deceptive attacks, where the adversary interferes in the connection between sensor-controller-actuator and sends incorrect information (Amin et al, 2010;Jovanov and Pajic, 2019;Kwon et al, 2013;Liu et al, 2011;Miao et al, 2016). Second, denial-of-service attacks, where the adversary prevents sensors, controllers, or actuators from receiving data (Amin et al, 2009;Gupta et al, 2010).…”
Section: Introduction and Related Workmentioning
confidence: 99%