465
Views
7
CrossRef citations to date
0
Altmetric
Original Articles

Stealthy output injection attacks on control systems with bounded variables

&
Pages 1389-1402 | Received 10 Mar 2016, Accepted 25 Jun 2016, Published online: 27 Jul 2016
 

ABSTRACT

As more and more critical infrastructures such as transportation, power systems and water are being embedded with sensing and control and linked to the Internet, the resulting security vulnerability can be exploited to inflict systematic damage to the connected physical systems. The class of false-data injection attacks is of particular interest as it only requires the ability to compromise the measurements. We construct such attacks, that are stealthy to set-membership-based anomaly detectors over widely used constrained control systems with bounded disturbances. The design of robust controllers and detectors based on the ability to withstand disturbance lets the attacker masquerade itself as disturbance and necessitates the development of a disturbance set-estimator as a soft-constrained optimisation problem. We then formulate another constrained optimisation problem that maximises the state estimation error by manipulating measurements and results in a computable performance loss and derive its explicit solution as the attack vector. These methods are used to demonstrate the vulnerability of a test system, with attacker having limited knowledge of the control system.

Disclosure statement

No potential conflict of interest was reported by the authors.

Additional information

Funding

This work was supported by National Science Foundation.

Log in via your institution

Log in to Taylor & Francis Online

PDF download + Online access

  • 48 hours access to article PDF & online version
  • Article PDF can be downloaded
  • Article PDF can be printed
USD 61.00 Add to cart

Issue Purchase

  • 30 days online access to complete issue
  • Article PDFs can be downloaded
  • Article PDFs can be printed
USD 1,709.00 Add to cart

* Local tax will be added as applicable

Related Research

People also read lists articles that other readers of this article have read.

Recommended articles lists articles that we recommend and is powered by our AI driven recommendation engine.

Cited by lists all citing articles based on Crossref citations.
Articles with the Crossref icon will open in a new tab.