{"title":"Feasibility and Detection of Replay Attack in Networked Constrained Cyber-Physical Systems","authors":"M. Hosseinzadeh, B. Sinopoli, E. Garone","doi":"10.1109/ALLERTON.2019.8919762","DOIUrl":null,"url":null,"abstract":"This paper analyzes the effect of replay attacks on constrained cyber-physical systems which are subject to linear probabilistic constraints. In order to inject an exogenous control input without being detected the attacker will hijack the sensors, observe and record their readings for a certain amount of time and repeat them afterwards while carrying out his attack. The conditions under which the attacker can induce perturbation in the control loop without being detected is studied. Then, in order to make the system resilient to the replay attack, a random signal (serving as the authentication signal) is added to the control input. Since this signal can hamper the performance of the system, finally, the optimization of the authentication signals is proposed to maximize the detection rate while keeping the process deterioration bounded. The effectiveness of the proposed scheme is demonstrated on a simulated case study.","PeriodicalId":120479,"journal":{"name":"2019 57th Annual Allerton Conference on Communication, Control, and Computing (Allerton)","volume":"16 45 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"36","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 57th Annual Allerton Conference on Communication, Control, and Computing (Allerton)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ALLERTON.2019.8919762","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 36
Abstract
This paper analyzes the effect of replay attacks on constrained cyber-physical systems which are subject to linear probabilistic constraints. In order to inject an exogenous control input without being detected the attacker will hijack the sensors, observe and record their readings for a certain amount of time and repeat them afterwards while carrying out his attack. The conditions under which the attacker can induce perturbation in the control loop without being detected is studied. Then, in order to make the system resilient to the replay attack, a random signal (serving as the authentication signal) is added to the control input. Since this signal can hamper the performance of the system, finally, the optimization of the authentication signals is proposed to maximize the detection rate while keeping the process deterioration bounded. The effectiveness of the proposed scheme is demonstrated on a simulated case study.