Cyber-Physical Attacks With Control Objectives
                    Journal Article
                    ·
                    
                    · IEEE Transactions on Automatic Control
                    
                
            - Carnegie Mellon Univ., Pittsburgh, PA (United States). Dept. of Electrical and Computer Engineering; University of Arkansas
- Carnegie Mellon Univ., Pittsburgh, PA (United States). Dept. of Electrical and Computer Engineering
This study studies attackers with control objectives against cyber-physical systems (CPSs). The goal of the attacker is to counteract the CPS's controller and move the system to a target state while evading detection. We formulate a cost function that reflects the attacker's goals, and, using dynamic programming, we show that the optimal attack strategy reduces to a linear feedback of the attacker's state estimate. By changing the parameters of the cost function, we show how an attacker can design optimal attacks to balance the control objective and the detection avoidance objective. In conclusion, we provide a numerical illustration based on a remotely controlled helicopter under attack.
- Research Organization:
- Carnegie Mellon Univ., Pittsburgh, PA (United States)
- Sponsoring Organization:
- USDOE Office of Electricity Delivery and Energy Reliability (OE); Defense Advanced Research Projects Agency (DARPA) (United States)
- Grant/Contract Number:
- OE0000779
- OSTI ID:
- 1433632
- Journal Information:
- IEEE Transactions on Automatic Control, Journal Name: IEEE Transactions on Automatic Control Journal Issue: 5 Vol. 63; ISSN 0018-9286
- Publisher:
- IEEECopyright Statement
- Country of Publication:
- United States
- Language:
- English
| Cooperative attack strategy design via H − / H  ∞  scheme for linear cyber‐physical systems 
 | journal | October 2019 | 
Similar Records
                        
                        
                            
                        
                            
                                
                                
                                    Optimal Attack Strategies Subject to Detection Constraints Against Cyber-Physical Systems
                                
                                
                                            
                                                
                                                
                                            
                                                
                                                
                                            
                                                
                                                
                                            
                                            
                                        
                                
                                                
                                
                            
                        
                            
                                
Physical Watermarking for Securing Cyber-Physical Systems via Packet Drop Injections
                                            
                                                
                                                
                                            
                                                
                                                
                                            
                                                
                                                
                                            
                                            
                                        
                                
                                                
                                
                            
                        
                            
                                
Modeling and Detection of Future Cyber-Enabled DSM Data Attacks
                
                                    Journal Article
                                    ·
                                    Fri Mar 31 04:00:00 UTC 2017
                                    · IEEE Transactions on Control of Network Systems
                                    ·
                                    OSTI ID:1406998
                                
                                
                                        Physical Watermarking for Securing Cyber-Physical Systems via Packet Drop Injections
                                    Conference
                                    ·
                                    Mon Oct 23 04:00:00 UTC 2017
                                    
                                    ·
                                    OSTI ID:1406349
                                
                                
                                        Modeling and Detection of Future Cyber-Enabled DSM Data Attacks
                                    Journal Article
                                    ·
                                    Fri Aug 21 04:00:00 UTC 2020
                                    · Energies
                                    ·
                                    OSTI ID:1801317
                                
                                
                                        
                                            
                                                
                                                
                                            
                                                
                                                
                                            
                                                
                                                
                                            
                                            +3 more
                                        
                                
                                                
                                
                            
                        
                            
                        
                            
                        
                            
                        
                            
                        
                            
                        
                            
                        
                            
                        
                            
                        
                            
                        
                            
                        
                            
                                                    
                    