TY - JOUR
T1 - Masking attack for sampled-data systems via input redundancy
AU - Kim, Jihan
AU - Park, Gyunghoon
AU - Shim, Hyungbo
AU - Eun, Yongsoon
N1 - Publisher Copyright:
© The Institution of Engineering and Technology 2019.
PY - 2019/9/24
Y1 - 2019/9/24
N2 - This study discovers a new vulnerability of cyber-physical systems to malicious attack. It arises when the physical plant, that is modelled as a continuous-time LTI system, is controlled by a digital controller with periodic sampling and actuation. In the sampled-data framework, most anomaly detectors monitor the plant's output only at discrete time instants. Consequently, abnormal behaviour between sampling instants cannot be detected if output behaves normally at every sampling instant. This implies that if an actuator attack drives the plant's state to pass through the kernel of the output matrix at each sensing time, then the attack compromises the system while remaining stealthy. It is shown that this type of attack always exists when the sampled-data system has an input redundancy, i.e. the number of inputs being larger than that of outputs and/or the sampling rate of the actuators being higher than that of the sensors. Simulation results for the X-38 vehicle and other numerical examples illustrate this new attack strategy may result in disastrous consequences.
AB - This study discovers a new vulnerability of cyber-physical systems to malicious attack. It arises when the physical plant, that is modelled as a continuous-time LTI system, is controlled by a digital controller with periodic sampling and actuation. In the sampled-data framework, most anomaly detectors monitor the plant's output only at discrete time instants. Consequently, abnormal behaviour between sampling instants cannot be detected if output behaves normally at every sampling instant. This implies that if an actuator attack drives the plant's state to pass through the kernel of the output matrix at each sensing time, then the attack compromises the system while remaining stealthy. It is shown that this type of attack always exists when the sampled-data system has an input redundancy, i.e. the number of inputs being larger than that of outputs and/or the sampling rate of the actuators being higher than that of the sensors. Simulation results for the X-38 vehicle and other numerical examples illustrate this new attack strategy may result in disastrous consequences.
UR - http://www.scopus.com/inward/record.url?scp=85072229790&partnerID=8YFLogxK
U2 - 10.1049/iet-cta.2018.6075
DO - 10.1049/iet-cta.2018.6075
M3 - Article
AN - SCOPUS:85072229790
SN - 1751-8644
VL - 13
SP - 2300
EP - 2308
JO - IET Control Theory and Applications
JF - IET Control Theory and Applications
IS - 14
ER -