...
首页> 外文期刊>IEEE Transactions on Automatic Control >Relaxing Integrity Requirements for Attack-Resilient Cyber-Physical Systems
【24h】

Relaxing Integrity Requirements for Attack-Resilient Cyber-Physical Systems

机译:放宽攻击弹性网络物理系统的完整性要求

获取原文
获取原文并翻译 | 示例
   

获取外文期刊封面封底 >>

       

摘要

The increase in network connectivity has also resulted in several high-profile attacks on cyber-physical systems. An attacker that manages to access a local network could remotely affect control performance by tampering with sensor measurements delivered to the controller. Recent results have shown that with network-based attacks, such as man-in-the-middle attacks, the attacker can introduce an unbounded state estimation error if measurements from a suitable subset of sensors contain false data when delivered to the controller. While these attacks can be addressed with the standard cryptographic tools that ensure data integrity, their continuous use would introduce significant communication and computation overhead. Consequently, we study effects of intermittent data integrity guarantees on system performance under stealthy attacks. We consider linear estimators equipped with a general type of residual-based intrusion detectors (including, e.g., widely used $chi <^>2$ detectors) and show that even when integrity of sensor measurements is enforced only intermittently, the attack impact is significantly limited; specifically, the state estimation error is bounded or the attacker cannot remain stealthy. Furthermore, we present methods to: 1)evaluate the effects of any given integrity enforcement policy in terms of reachable state estimation errors for any type of stealthy attacks; and 2)design an enforcement policy that provides the desired estimation error guarantees under attack. Finally, on three automotive case studies, we show that even with less than 10 of authenticated messages, we can ensure satisfiable control performance in the presence of attacks.
机译:网络连接的增加也导致了几种关于网络物理系统的高调攻击。管理访问本地网络的攻击者可以通过篡改传送到控制器的传感器测量来远程影响控制性能。最近的结果表明,通过基于网络的攻击,例如中间人攻击,如果来自交付到控制器的合适的传感器子集中包含错误数据,则攻击者可以引入无界状态估计误差。虽然这些攻击可以通过标准加密工具来解决,但是它们的连续使用将引入显着的通信和计算开销。因此,我们研究间歇性数据完整性保证对隐身攻击下的系统性能的影响。我们考虑配备有一般类型的残留的入侵探测器的线性估计(包括例如广泛使用的$ Chi <^> 2 $探测器),并表明即使在传感器测量的完整性间歇地强制执行时,攻击影响也是如此显着限制;具体而言,界限误差或攻击者不能保持隐秘。此外,我们提出了以下方法:1)根据任何类型的隐身攻击评估任何给定的完整性执法政策的效果。 2)设计一个执行攻击所需估计错误保证的执法策略。最后,在三个汽车案例研究中,我们表明即使经过身份验证的消息少于10个,我们也可以确保在存在攻击时确保满足的控制性能。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号