Robustness of Attack-Resilient State Estimators

作者: Miroslav Pajic , James Weimer , Nicola Bezzo , Paulo Tabuada , Oleg Sokolsky

DOI: 10.1109/ICCPS.2014.6843720

关键词:

摘要: The interaction between information technology and physical world makes Cyber-Physical Systems (CPS) vulnerable to malicious attacks beyond the standard cyber attacks. This has motivated need for attack-resilient state estimation. Yet, existing state-estimators are based on non-realistic assumption that exact system model is known. Consequently, in this work we present a method estimation presence of attacks, systems with noise modeling errors. When estimated states used by state-based feedback controller, show attacker cannot destabilize exploiting difference real dynamics system. Furthermore, describe how implementation issues such as jitter, latency synchronization errors can be mapped into parameters procedure errors, provide bound state-estimation error caused enables mapping control performance requirements real-time (i.e., timing related) specifications imposed underlying platform. Finally, illustrate experimentally evaluate approach an unmanned ground vehicle case-study.

参考文章(20)
Hovav Shacham, Karl Koscher, Alexei Czeskis, Franziska Roesner, Brian Kantor, Damon McCoy, Tadayoshi Kohno, Stefan Savage, Danny Anderson, Stephen Checkoway, Comprehensive experimental analyses of automotive attack surfaces usenix security symposium. pp. 6- 6 ,(2011)
Yasser Shoukry, Paul Martin, Paulo Tabuada, Mani Srivastava, Non-invasive Spoofing Attacks for Anti-lock Braking Systems Cryptographic Hardware and Embedded Systems - CHES 2013. ,vol. 2015, pp. 55- 72 ,(2013) , 10.1007/978-3-642-40349-1_4
Shankar Sastry, Saurabh Amin, Alvaro A. Cárdenas, Research challenges for the security of control systems usenix security symposium. pp. 6- ,(2008)
Jill Slay, Michael Miller, Lessons Learned from the Maroochy Water Breach international conference on critical infrastructure protection. pp. 73- 82 ,(2007) , 10.1007/978-0-387-75462-8_6
John Tsitsiklis, Dimitris Bertsimas, Introduction to linear optimization ,(1997)
James P. Farwell, Rafal Rohozinski, Stuxnet and the Future of Cyber War Survival. ,vol. 53, pp. 23- 40 ,(2011) , 10.1080/00396338.2011.555586
Miroslav Pajic, Rahul Mangharam, Oleg Sokolsky, David Arney, Julian Goldman, Insup Lee, Model-Driven Safety Analysis of Closed-Loop Medical Systems IEEE Transactions on Industrial Informatics. ,vol. 10, pp. 3- 16 ,(2014) , 10.1109/TII.2012.2226594
Fabio Pasqualetti, Florian Dorfler, Francesco Bullo, Attack Detection and Identification in Cyber-Physical Systems IEEE Transactions on Automatic Control. ,vol. 58, pp. 2715- 2729 ,(2013) , 10.1109/TAC.2013.2266831
Miroslav Pajic, Stephanie Weirich, Insup Lee, Nicola Bezzo, James Weimer, Rajeev Alur, Rahul Mangharam, Nathan Michael, George J. Pappas, Oleg Sokolsky, Paulo Tabuada, Towards synthesis of platform-aware attack-resilient control systems Proceedings of the 2nd ACM international conference on High confidence networked systems - HiCoNS '13. pp. 75- 76 ,(2013) , 10.1145/2461446.2461457
Joo P. Hespanha, Payam Naghshtabrizi, Yonggang Xu, A Survey of Recent Results in Networked Control Systems Proceedings of the IEEE. ,vol. 95, pp. 138- 162 ,(2007) , 10.1109/JPROC.2006.887288