kth.sePublications
Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Experimental evaluation of sensor attacks and defense mechanisms in feedback systems
KTH, School of Electrical Engineering and Computer Science (EECS), Intelligent systems, Decision and Control Systems (Automatic Control).ORCID iD: 0000-0002-7459-3019
KTH, School of Electrical Engineering and Computer Science (EECS), Intelligent systems, Decision and Control Systems (Automatic Control).ORCID iD: 0000-0003-1835-2963
2022 (English)In: Control Engineering Practice, ISSN 0967-0661, E-ISSN 1873-6939, Vol. 124, article id 105178Article in journal (Refereed) Published
Abstract [en]

We evaluate theoretical results, developed under linearity assumptions, on the feasibility of, the worst-case impact of, and defense mechanisms against a stealthy sensor attack in an experimental setup. The goal is to determine if this sensor attack poses a threat to real systems as well. We demonstrate that for a controller with stable dynamics the stealthy sensor attack is possible to conduct and the theoretical worst-case impact is close to the achieved practical one. However, although the attack should theoretically be possible when the controller has integral action, we show that the integral action slows the attacker down and the attacker is not able to remain stealthy if it has not perfect knowledge of the controller state. In addition to that, we investigate the effect of different anomaly detectors on the attack impact and our experiments indicate that the impact under detectors with internal dynamics is smaller for the considered attack objective. Finally, we demonstrate how noise injection into the controller dynamics can unveil the otherwise stealthy attacks.

Place, publisher, year, edition, pages
Elsevier BV , 2022. Vol. 124, article id 105178
Keywords [en]
Resilient control systems, Attack detection, Cyber-physical security
National Category
Computer Sciences Reliability and Maintenance Control Engineering
Identifiers
URN: urn:nbn:se:kth:diva-315812DOI: 10.1016/j.conengprac.2022.105178ISI: 000822546600003Scopus ID: 2-s2.0-85129486566OAI: oai:DiVA.org:kth-315812DiVA, id: diva2:1684102
Note

QC 20220721

Available from: 2022-07-21 Created: 2022-07-21 Last updated: 2022-07-21Bibliographically approved

Open Access in DiVA

No full text in DiVA

Other links

Publisher's full textScopus

Authority records

Umsonst, DavidSandberg, Henrik

Search in DiVA

By author/editor
Umsonst, DavidSandberg, Henrik
By organisation
Decision and Control Systems (Automatic Control)
In the same journal
Control Engineering Practice
Computer SciencesReliability and MaintenanceControl Engineering

Search outside of DiVA

GoogleGoogle Scholar

doi
urn-nbn

Altmetric score

doi
urn-nbn
Total: 72 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf