Cyber Physical Attacks with Control Objectives
From MaRDI portal
Publication:5375223
Abstract: This paper studies attackers with control objectives against cyber-physical systems (CPS). The system is equipped with its own controller and attack detector, and the goal of the attacker is to move the system to a target state while altering the system's actuator input and sensor output to avoid detection. We formulate a cost function that reflects the attacker's goals, and, using dynamic programming, we show that the optimal attack strategy reduces to a linear feedback of the attacker's state estimate. By changing the parameters of the cost function, we show how an attacker can design optimal attacks to balance the control objective and the detection avoidance objective. Finally, we provide a numerical illustration based on a remotely-controlled helicopter under attack.
Cited in
(14)- False data injection attacks on sensors against state estimation in cyber-physical systems
- Stealthy switching attacks on sensors against state estimation in cyber‐physical systems
- Quickest physical watermarking-based detection of measurement replacement attacks in networked control systems
- Worst-case \(\varepsilon \)-stealthy false data injection attacks in cyber-physical systems
- Detection of stealthy false data injection attacks against cyber-physical systems: a stochastic coding scheme
- Security of networked control systems subject to deception attacks: a survey
- Vulnerability analysis for a class of nonlinear cyber-physical systems under stealthy attacks
- Vulnerability analysis of distributed state estimation under joint deception attacks
- Analysis of stealthy false data injection attacks against networked control systems: three case studies
- Quickest detection of deception attacks on cyber-physical systems with a parsimonious watermarking policy
- Malicious adversaries against secure state estimation: Sparse sensor attack design
- Optimal strictly stealthy attacks in cyber-physical systems with multiple channels under the energy constraint
- Optimal deception attacks against remote state estimation in cyber-physical systems
- Two-channel stealthy false data injection attacks design without estimator knowledge
This page was built for publication: Cyber Physical Attacks with Control Objectives
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5375223)