Control of Cyber-Physical Systems pp 123-142 | Cite as
Quantifying Cyber-Security for Networked Control Systems
Abstract
In this paper we consider a typical architecture for a networked control system under false-data injection attacks. Under a previously proposed adversary modeling framework, various formulations for quantifying cyber-security of control systems are proposed and formulated as constrained optimization problems. These formulations capture trade-offs in terms of attack impact on the control performance, attack detectability, and adversarial resources. The formulations are then discussed and related to system theoretic concepts, followed by numerical examples illustrating the various trade-offs for a quadruple-tank process.
Keywords
Security Networked Control Systems Impact AnalysisPreview
Unable to display preview. Download preview PDF.
References
- 1.Boyd, S., Vandenberghe, L.: Convex Optimization. Cambridge University Press (2004)Google Scholar
- 2.Cárdenas, A., Amin, S., Lin, Z., Huang, Y., Huang, C., Sastry, S.: Attacks against process control systems: risk assessment, detection, and response. In: Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2011, pp. 355–366. ACM, New York (2011)Google Scholar
- 3.Ding, S.X.: Model-based Fault Diagnosis Techniques: Design Schemes. Springer (2008)Google Scholar
- 4.Esfahani, P., Vrakopoulou, M., Margellos, K., Lygeros, J., Andersson, G.: Cyber attack in a two-area power system: Impact identification using reachability. In: American Control Conference, pp. 962–967 (July 2010)Google Scholar
- 5.Fawzi, H., Tabuada, P., Diggavi, S.: Security for control systems under sensor and actuator attacks. In: Proceedings of the 51st IEEE Conference on Decision and Control, Maui, Hawaii, USA (December 2012)Google Scholar
- 6.Hwang, I., Kim, S., Kim, Y., Seah, C.E.: A survey of fault detection, isolation, and reconfiguration methods. IEEE Transactions on Control Systems Technology 18(3), 636–653 (2010)CrossRefGoogle Scholar
- 7.Johansson, K.: The quadruple-tank process: a multivariable laboratory process with an adjustable zero. IEEE Transactions on Control Systems Technology 8(3), 456–465 (2000)MathSciNetCrossRefGoogle Scholar
- 8.Liu, J., Ye, J.: Efficient L1/Lq Norm Regularization. ArXiv e-prints (September 2010)Google Scholar
- 9.Marler, R.T., Arora, J.S.: Survey of multi-objective optimization methods for engineering. Structural and Multidisciplinary Optimization 26(6), 369–395 (2004)MathSciNetMATHCrossRefGoogle Scholar
- 10.Meserve, J.: Sources: Staged cyber attack reveals vulnerability in power grid. CNN (2007), http://edition.cnn.com/2007/US/09/26/power.at.risk/index.html
- 11.Pasqualetti, F., Dorfler, F., Bullo, F.: Cyber-physical attacks in power networks: Models, fundamental limitations and monitor design. In: Proc. of the 50th IEEE Conf. on Decision and Control and European Control Conference, Orlando, FL, USA (December 2011)Google Scholar
- 12.Rid, T.: Cyber war will not take place. Journal of Strategic Studies 35(1), 5–32 (2011)CrossRefGoogle Scholar
- 13.Sandberg, H., Teixeira, A., Johansson, K.H.: On security indices for state estimators in power networks. In: Preprints of the First Workshop on Secure Control Systems, CPSWEEK 2010, Stockholm, Sweden (April 2010)Google Scholar
- 14.Smith, R.: A decoupled feedback structure for covertly appropriating networked control systems. In: Proc. of the 18th IFAC World Congress, Milano, Italy (August-September 2011)Google Scholar
- 15.Sundaram, S., Hadjicostis, C.: Distributed function calculation via linear iterative strategies in the presence of malicious agents. IEEE Transactions on Automatic Control 56(7), 1495–1508 (2011)MathSciNetCrossRefGoogle Scholar
- 16.Symantec: Stuxnet introduces the first known rootkit for industrial control systems. Symantec (August 6, 2010), http://www.symantec.com/connect/blogs/stuxnet-introduces-first-known-rootkit-scada-devices
- 17.Teixeira, A., Shames, I., Sandberg, H., Johansson, K.H.: A Secure Control Framework for Resource-Limited Adversaries. Submitted to Automatica (December 2012) ArXiv e-printsGoogle Scholar
- 18.Tokarzewski, J.: Finite zeros in discrete time control systems. LNCIS, vol. 338. Springer, Heidelberg (2006)MATHGoogle Scholar
- 19.U.S.-Canada PSOTF: Final report on the August 14th blackout in the United States and Canada. Tech. rep., U.S.-Canada Power System Outage Task Force (April 2004)Google Scholar
- 20.Zhou, K., Doyle, J.C., Glover, K.: Robust and Optimal Control. Prentice-Hall, Inc., Upper Saddle River (1996)MATHGoogle Scholar