On the confidentiality of controller states under sensor attacks
From MaRDI portal
Publication:2662292
Abstract: With the emergence of cyber-attacks on control systems it has become clear that improving the security of control systems is an important task in today's society. We investigate how an attacker that has access to the measurements transmitted from the plant to the controller can perfectly estimate the internal state of the controller. This attack on sensitive information of the control loop is, on the one hand, a violation of the privacy, and, on the other hand, a violation of the security of the closed-loop system if the obtained estimate is used in a larger attack scheme. Current literature on sensor attacks often assumes that the attacker has already access to the controller's state. However, this is not always possible. We derive conditions for when the attacker is able to perfectly estimate the controller's state. These conditions show that if the controller has unstable poles a perfect estimate of the controller state is not possible. Moreover, we propose a defence mechanism to render the attack infeasible. This defence is based on adding uncertainty to the controller dynamics. We also discuss why an unstable controller is only a good defence for certain plants. Finally, simulations with a three-tank system verify our results.
Recommendations
- Attack-resilient state estimation with intermittent data authentication
- Stealthy attacks and attack-resilient interval observers
- Security via multirate control in cyber-physical systems
- Securing state reconstruction under sensor and actuator attacks: theory and design
- Stealthy output injection attacks on control systems with bounded variables
Cites work
- scientific article; zbMATH DE number 44406 (Why is no real title available?)
- A secure control framework for resource-limited adversaries
- Convergence properties of the Riccati difference equation in optimal filtering of nonstabilizable systems
- Existence and comparison theorems for algebraic Riccati equations for continuous- and discrete-time systems
- Riccati equations in optimal filtering of nonstabilizable systems having singular state transition matrices
- Security concepts for the dynamics of autonomous vehicle networks
- Sensitivity integrals for multivariable discrete-time systems
- Worst-case stealthy innovation-based linear attack on remote state estimation
Cited in
(9)- Attack-resilient state estimation with intermittent data authentication
- Security via multirate control in cyber-physical systems
- Design of Privacy-Preserving Dynamic Controllers
- Persuasion-Based Robust Sensor Design Against Attackers With Unknown Control Objectives
- On a security vs privacy trade-off in interconnected dynamical systems
- Control systems under attack: the securable and unsecurable subspaces of a linear stochastic system
- Stealthy attacks and attack-resilient interval observers
- A switching-based moving target defense against sensor attacks in control systems
- Privacy-preserving co-synthesis against sensor-actuator eavesdropping intruder
This page was built for publication: On the confidentiality of controller states under sensor attacks
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2662292)