Adversarial Sensor Attacks Against Uncertain Cyber-Physical Systems: A Dynamic Output Feedback Approach

IF 2.4 Q2 AUTOMATION & CONTROL SYSTEMS IEEE Control Systems Letters Pub Date : 2024-12-17 DOI:10.1109/LCSYS.2024.3519435
Kartik A. Pant;Shiraz Khan;Inseok Hwang
{"title":"Adversarial Sensor Attacks Against Uncertain Cyber-Physical Systems: A Dynamic Output Feedback Approach","authors":"Kartik A. Pant;Shiraz Khan;Inseok Hwang","doi":"10.1109/LCSYS.2024.3519435","DOIUrl":null,"url":null,"abstract":"The design of sensor spoofing attacks for cyber-physical systems (CPSs) has received considerable attention in the literature, as it can reveal the underlying vulnerabilities of the CPS. We present a dynamic output feedback approach for designing stealthy sensor spoofing attacks against CPSs. Unlike the existing works, we consider the case where the attacker has limited knowledge of the victim CPS’s dynamical model, characterized by polytopic uncertainty. It is shown that despite the limited knowledge of the attacker, the proposed stealthy sensor spoofing attack method can provably avoid detection by the onboard detection mechanism, even in the presence of model uncertainties, measurement noises, and disturbances. Furthermore, we show that the resulting attack design is recursively feasible, i.e., the designed attack at the current time step ensures persistent detection constraint satisfaction throughout the attack. Finally, we demonstrate the effectiveness of our approach through an illustrative numerical simulation of a sensor spoofing attack on a quadrotor.","PeriodicalId":37235,"journal":{"name":"IEEE Control Systems Letters","volume":"8 ","pages":"2997-3002"},"PeriodicalIF":2.4000,"publicationDate":"2024-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Control Systems Letters","FirstCategoryId":"1085","ListUrlMain":"https://ieeexplore.ieee.org/document/10804607/","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"AUTOMATION & CONTROL SYSTEMS","Score":null,"Total":0}
引用次数: 0

Abstract

The design of sensor spoofing attacks for cyber-physical systems (CPSs) has received considerable attention in the literature, as it can reveal the underlying vulnerabilities of the CPS. We present a dynamic output feedback approach for designing stealthy sensor spoofing attacks against CPSs. Unlike the existing works, we consider the case where the attacker has limited knowledge of the victim CPS’s dynamical model, characterized by polytopic uncertainty. It is shown that despite the limited knowledge of the attacker, the proposed stealthy sensor spoofing attack method can provably avoid detection by the onboard detection mechanism, even in the presence of model uncertainties, measurement noises, and disturbances. Furthermore, we show that the resulting attack design is recursively feasible, i.e., the designed attack at the current time step ensures persistent detection constraint satisfaction throughout the attack. Finally, we demonstrate the effectiveness of our approach through an illustrative numerical simulation of a sensor spoofing attack on a quadrotor.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
针对不确定网络物理系统的对抗性传感器攻击:一种动态输出反馈方法
针对网络物理系统(CPS)的传感器欺骗攻击的设计在文献中受到了相当大的关注,因为它可以揭示CPS的潜在漏洞。我们提出了一种动态输出反馈方法来设计针对cps的隐形传感器欺骗攻击。与现有的工作不同,我们考虑了攻击者对受害者CPS动态模型的知识有限的情况,其特征是多面体不确定性。结果表明,在攻击者知识有限的情况下,即使存在模型不确定性、测量噪声和干扰,所提出的隐身传感器欺骗攻击方法也能有效地避免机载检测机制的检测。此外,我们证明了所得到的攻击设计是递归可行的,即在当前时间步长的设计攻击确保在整个攻击过程中持续满足检测约束。最后,我们通过对四旋翼飞行器的传感器欺骗攻击的说明性数值模拟来证明我们方法的有效性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
IEEE Control Systems Letters
IEEE Control Systems Letters Mathematics-Control and Optimization
CiteScore
4.40
自引率
13.30%
发文量
471
期刊最新文献
Data-Driven Analysis of T-Product-Based Dynamical Systems Novel Sufficient Conditions for Stabilization of Linear Positive Discrete-Time Systems Using Event-Triggered Control Modified Finite-Time and Prescribed-Time Convergence Parameter Estimators via the DREM Method Refined Eigenvalue Decay Bounds for Controllability Gramians of Sparsely-Actuated Symmetric LTI Systems Distributed Thompson Sampling Under Constrained Communication
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1