Finite energy and bounded actuator attacks on cyber-physical systems

Seddik M. Djouadi, Alexander M. Melin, Erik M. Ferragut, Jason A. Laska, Jin Dong, Anis Drira

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

15 Scopus citations

Abstract

As control system networks are being connected to enterprise level networks for remote monitoring, operation, and system-wide performance optimization, these same connections are providing vulnerabilities that can be exploited by malicious actors for attack, financial gain, and theft of intellectual property. Much effort in cyber-physical system (CPS) protection has focused on protecting the borders of the system through traditional information security techniques. Less effort has been applied to the protection of cyber-physical systems from intelligent attacks launched after an attacker has defeated the information security protections to gain access to the control system. In this paper, attacks on actuator signals are analyzed from a system theoretic context. The threat surface is classified into finite energy and bounded attacks. These two broad classes encompass a large range of potential attacks. The effect of theses attacks on a linear quadratic (LQ) control are analyzed, and the optimal actuator attacks for both finite and infinite horizon LQ control are derived, therefore the worst case attack signals are obtained. The closed-loop system under the optimal attack signals is given and a numerical example illustrating the effect of an optimal bounded attack is provided.

Original languageEnglish
Title of host publication2015 European Control Conference, ECC 2015
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages3659-3664
Number of pages6
ISBN (Electronic)9783952426937
DOIs
StatePublished - Nov 16 2015
EventEuropean Control Conference, ECC 2015 - Linz, Austria
Duration: Jul 15 2015Jul 17 2015

Publication series

Name2015 European Control Conference, ECC 2015

Conference

ConferenceEuropean Control Conference, ECC 2015
Country/TerritoryAustria
CityLinz
Period07/15/1507/17/15

Funding

Research sponsored by the Laboratory Directed Research and Development Program of Oak Ridge National Laboratory (ORNL), managed by UT-Battelle, LLC for the U.S. Department of Energy under Contract No. DE-AC05-00OR22725. The submitted manuscript has been authored by a contractor of the U.S. Government under Contract DE-AC05-00OR22725. Accordingly, the U.S. Government retains a nonexclusive, royalty-free license to publish or reproduce the published form of this contribution, or allow others to do so, for U.S. Government purposes

FundersFunder number
U.S. Government
U.S. Government purposes
UT-Battelle
U.S. Department of EnergyDE-AC05-00OR22725
U.S. Department of Energy
Oak Ridge National LaboratoryORNL
Oak Ridge National Laboratory
Laboratory Directed Research and Development

    Fingerprint

    Dive into the research topics of 'Finite energy and bounded actuator attacks on cyber-physical systems'. Together they form a unique fingerprint.

    Cite this