Note: This content is accessible to all versions of every browser. However, this browser does not seem to support current Web standards, preventing the display of our site's design details.

  

Attack Detection and Identification in Cyber-Physical Systems – Part I: Models and Fundamental Limitations

Author(s):

F. Pasqualetti, F. Dörfler, F. Bullo
Conference/Journal:

Abstract:

Cyber-physical systems integrate computation, communication, and physical capabilities to interact with the physical world and humans. Besides failures of components, cyberphysical systems are prone to malignant attacks, and specific analysis tools as well as monitoring mechanisms need to be developed to enforce system security and reliability. This paper proposes a unified framework to analyze the resilience of cyberphysical systems against attacks cast by an omniscient adversary. We model cyber-physical systems as linear descriptor systems, and attacks as exogenous unknown inputs. Despite its simplicity, our model captures various real-world cyber-physical systems, and it includes and generalizes many prototypical attacks, including stealth, (dynamic) false-data injection and replay attacks. First, we characterize fundamental limitations of static, dynamic, and active monitors for attack detection and identification. Second, we provide constructive algebraic conditions to cast undetectable and unidentifiable attacks. Third, by using the system interconnection structure, we describe graph-theoretic conditions for the existence of undetectable and unidentifiable attacks. Finally, we validate our findings through some illustrative examples with different cyber-physical systems, such as a municipal water supply network and two electrical power grids

Year:

2012
Type of Publication:

(15)Miscellaneous
Supervisor:



File Download:

Request a copy of this publication.
(Uses JavaScript)
% Autogenerated BibTeX entry
@Misc { PasD_r:2012:IFA_4949,
    author={F. Pasqualetti and F. D{\"o}rfler and F. Bullo},
    title={{Attack Detection and Identification in Cyber-Physical
	  Systems – Part I: Models and Fundamental Limitations}},
    month=feb,
    year={2012},
    url={http://control.ee.ethz.ch/index.cgi?page=publications;action=details;id=4949}
}
Permanent link