Skip to main content
U.S. Department of Energy
Office of Scientific and Technical Information

Cyber-Physical Attacks With Control Objectives

Journal Article · · IEEE Transactions on Automatic Control
 [1];  [2];  [2]
  1. Carnegie Mellon Univ., Pittsburgh, PA (United States). Dept. of Electrical and Computer Engineering; University of Arkansas
  2. Carnegie Mellon Univ., Pittsburgh, PA (United States). Dept. of Electrical and Computer Engineering

This study studies attackers with control objectives against cyber-physical systems (CPSs). The goal of the attacker is to counteract the CPS's controller and move the system to a target state while evading detection. We formulate a cost function that reflects the attacker's goals, and, using dynamic programming, we show that the optimal attack strategy reduces to a linear feedback of the attacker's state estimate. By changing the parameters of the cost function, we show how an attacker can design optimal attacks to balance the control objective and the detection avoidance objective. In conclusion, we provide a numerical illustration based on a remotely controlled helicopter under attack.

Research Organization:
Carnegie Mellon Univ., Pittsburgh, PA (United States)
Sponsoring Organization:
USDOE Office of Electricity Delivery and Energy Reliability (OE); Defense Advanced Research Projects Agency (DARPA) (United States)
Grant/Contract Number:
OE0000779
OSTI ID:
1433632
Journal Information:
IEEE Transactions on Automatic Control, Journal Name: IEEE Transactions on Automatic Control Journal Issue: 5 Vol. 63; ISSN 0018-9286
Publisher:
IEEECopyright Statement
Country of Publication:
United States
Language:
English

Cited By (1)

Cooperative attack strategy design via H / H scheme for linear cyber‐physical systems journal October 2019

Similar Records

Optimal Attack Strategies Subject to Detection Constraints Against Cyber-Physical Systems
Journal Article · Fri Mar 31 00:00:00 EDT 2017 · IEEE Transactions on Control of Network Systems · OSTI ID:1406998

Physical Watermarking for Securing Cyber-Physical Systems via Packet Drop Injections
Conference · Mon Oct 23 00:00:00 EDT 2017 · OSTI ID:1406349