Authentication of cyber-physical systems under learning-based attacks

09/17/2018
by   Mohammad Javad Khojasteh, et al.
0

The problem of attacking and authenticating cyber-physical systems is considered. This paper concentrates on the case of a scalar, discrete-time, time-invariant, linear plant under an attack which can override the sensor and the controller signals. Prior works assumed the system was known to all parties and developed watermark-based methods. In contrast, in this paper the attacker needs to learn the open-loop gain in order to carry out a successful attack. A class of two-phase attacks are considered: during an exploration phase, the attacker passively eavesdrops and learns the plant dynamics, followed by an exploitation phase, during which the attacker hijacks the input to the plant and replaces the input to the controller with a carefully crafted fictitious sensor reading with the aim of destabilizing the plant without being detected by the controller. For an authentication test that examines the variance over a time window, tools from information theory and statistics are utilized to derive bounds on the detection and deception probabilities with and without a watermark signal, when the attacker uses an arbitrary learning algorithm to estimate the open-loop gain of the plant.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
11/21/2020

Learning-based attacks in Cyber-Physical Systems: Exploration, Detection, and Control Cost trade-offs

We study the problem of learning-based attacks in linear systems, where ...
research
02/13/2020

Compensation of Linear Attacks to Cyber Physical Systems through ARX System Identification

Cyber-Physical Systems (CPSs) are vastly used in today's cities critical...
research
04/25/2023

Model Extraction Attacks Against Reinforcement Learning Based Controllers

We introduce the problem of model-extraction attacks in cyber-physical s...
research
06/12/2019

Cyber attacks with bounded sensor reading edits for partially-observed discrete event systems

The problem of cyber attacks with bounded sensor reading edits for parti...
research
05/01/2020

A framework for the analysis of supervised discrete event systems under attack

This paper focuses on the problem of cyber attacks for discrete event sy...
research
09/06/2020

On Decidability of Existence of Nonblocking Supervisors Resilient to Smart Sensor Attacks

Cybersecurity of discrete event systems (DES) has been gaining more and ...
research
12/23/2020

Distributed Adaptive Control: An ideal Cognitive Architecture candidate for managing a robotic recycling plant

In the past decade, society has experienced notable growth in a variety ...

Please sign up or login with your details

Forgot password? Click here to reset