Data-Driven Covert-Attack Strategies and Countermeasures for Cyber-Physical Systems
Author | Taheri, Mahdi |
Author | Khorasani, Khashayar |
Author | Shames, Iman |
Author | Meskin, Nader |
Available date | 2024-08-15T04:48:36Z |
Publication Date | 2021 |
Publication Name | Proceedings of the IEEE Conference on Decision and Control |
Resource | Scopus |
ISSN | 7431546 |
Abstract | This paper studies covert-attacks for cyber-physical systems (CPS) under conditions that adversaries do not explicitly know the system characteristic matrices (A, B, C). Covert-attacks are considered as undetectable type of cyber-attacks. We propose and develop conditions under which adversaries are capable of performing covert-attacks for CPS only by utilizing Markov parameters of the system, which are assumed to be known to adversaries. In order to demonstrate the execution of proposed covert-attacks in this paper, a specific sensor attack signal which should be accompanied by an actuator attack is introduced based on Markov parameters of the CPS. The minimum number of sensors which should be attacked to perform covert-attacks while only one actuator is manipulated by adversaries is investigated. The latter can be used by adversaries to select a specific actuator to compromise. In order to make the CPS more secure against covert-attacks, we propose and develop a coding scheme which increases the number of required sensors that should be compromised during a covert-attack. Hence, if the proposed coding scheme is utilized, adversaries need to compromise all the output communication channels of CPS to perform covert-attacks. An illustrative simulation case study is provided to demonstrate the effectiveness of the proposed covert-attack method and the coding scheme. |
Sponsor | The authors would like to acknowledge the financial support received from NATO under the Emerging Security Challenges Division program. K. Khorasani and N. Meskin would like to acknowledge the support received from NPRP grant number 10-0105-17017 from the Qatar National Research Fund (a member of Qatar Foundation). K. Khorasani would also like to acknowledge the support received from the Natural Sciences and Engineering Research Council of Canada (NSERC) and the Department of National Defence (DND) under the Discovery Grant and DND Supplemental Programs. This work was also supported in part by funding from the Innovation for Defence Excellence and Security (IDEaS) program from the Department of National Defence (DND). Any opinions and conclusions in this work are strictly those of the authors and do not reflect the views, positions, or policies of - and are not endorsed by - IDEaS, DND, or the Government of Canada. |
Language | en |
Publisher | Institute of Electrical and Electronics Engineers Inc. |
Subject | Actuators Computer crime Crime Cyber attacks Cyber Physical System Markov processes Network security Attack strategies Case-studies Characteristic matrix Coding scheme Communications channels Condition Data driven Markov's parameters Specific sensors System characteristics Embedded systems |
Type | Conference |
Pagination | 4170-4175 |
Volume Number | 2021-December |
Files in this item
This item appears in the following Collection(s)
-
Electrical Engineering [2685 items ]