Data-Driven Koopman Operator Based Cyber-Attacks for Nonlinear Control Affine Cyber-Physical Systems
Author | Taheri, M. |
Author | Khorasani, Khashayar |
Author | Meskin, Nader |
Author | Shames, Iman |
Available date | 2023-03-29T11:28:38Z |
Publication Date | 2022-01-01 |
Publication Name | Proceedings of the IEEE Conference on Decision and Control |
Identifier | http://dx.doi.org/10.1109/CDC51059.2022.9993087 |
Citation | Taheri, M., Khorasani, K., Meskin, N., & Shames, I. (2022, December). Data-Driven Koopman Operator Based Cyber-Attacks for Nonlinear Control Affine Cyber-Physical Systems. In 2022 IEEE 61st Conference on Decision and Control (CDC) (pp. 6769-6775). IEEE. |
ISBN | 9781665467612 |
ISSN | 07431546 |
Abstract | This paper studies the data-driven implementation of stealthy cyber-attacks for a class of nonlinear cyber-physical systems (CPS). In particular, we consider and study zero dynamics and covert cyber-attacks. By utilizing the Koopman operator theory, a given control affine CPS is transformed into the Koopman canonical form, and its relative degree is defined in terms of the Koopman modes, Koopman eigenvalues, and Koopman eigenfunctions. Consequently, the relative degree of the CPS is utilized to determine zero dynamics cyber-attacks. In contrast to the linear case, adversaries need to compromise both input and output communication channels of the CPS to maintain their attacks undetected. Moreover, the Koopman canonical form of the CPS is used to define and implement covert cyber-attacks in nonlinear CPS. The extended dynamic mode decomposition (EDMD) provides a linear finite-dimensional approximation of the CPS. Consequently, approximated dynamics of the CPS are utilized to introduce data-driven zero dynamics and covert cyber-attacks. Finally, a numerical example is provided to illustrate the effectiveness of our proposed methods. |
Sponsor | The authors would like to acknowledge the financial support received from NATO under the Emerging Security Challenges Division program. K. Khorasani and N. Meskin would like to acknowledge the support received from NPRP grant number 10-0105-17017 from the Qatar National Research Fund (a member of Qatar Foundation). K. Khorasani would also like to acknowledge the support received from the Natural Sciences and Engineering Research Council of Canada (NSERC) and the Department of National Defence (DND) under the Discovery Grant and DND Supplemental Programs. This work was also supported in part by funding from the Innovation for Defence Excellence and Security (IDEaS) program from the Department of National Defence (DND). Any opinions and conclusions in this work are strictly those of the authors and do not reflect the views, positions, or policies of - and are not endorsed by - IDEaS, DND, or the Government of Canada. |
Language | en |
Publisher | Institute of Electrical and Electronics Engineers Inc. |
Subject | Computer crime Crime Cyber attacks |
Type | Conference |
Pagination | 6769-6775 |
Volume Number | 2022-December |
Files in this item
Files | Size | Format | View |
---|---|---|---|
There are no files associated with this item. |
This item appears in the following Collection(s)
-
Electrical Engineering [2685 items ]