A Secure Control Framework for Resource-Limited Adversaries
2015 (English)In: Automatica, Vol. 51, no 1, 135-148 p.Article in journal (Refereed) Published
Cyber-secure networked control is modeled, analyzed, and experimentally illustrated in this paper. An attack space dened bythe adversary's model knowledge, disclosure, and disruption resources is introduced. Adversaries constrained by these resourcesare modeled for a networked control system architecture. It is shown that attack scenarios corresponding to denial-of-service,replay, zero-dynamics, and bias injection attacks on linear time-invariant systems can be analyzed using this framework.Furthermore, the attack policy for each scenario is described and the attack's impact is characterized using the concept ofsafe sets. An experimental setup based on a quadruple-tank process controlled over a wireless network is used to illustrate theattack scenarios, their consequences, and potential counter-measures.
Place, publisher, year, edition, pages
2015. Vol. 51, no 1, 135-148 p.
Attack space, Cyber-physical systems, Secure control systems, System security
IdentifiersURN: urn:nbn:se:kth:diva-159725DOI: 10.1016/j.automatica.2014.10.067ISI: 000348015500017ScopusID: 2-s2.0-84920703223OAI: oai:DiVA.org:kth-159725DiVA: diva2:787043
FunderEU, FP7, Seventh Framework Programme, 608224Swedish Research Council, 2009-4565; 2013-5523Knut and Alice Wallenberg Foundation
QC 201502202015-02-092015-02-092015-02-20Bibliographically approved