{"title":"Stealthy Attacks and Robust Detectors for Cyber-Physical Systems With Bounded Disturbances: A Zonotope Approach","authors":"Ziyi Guo;Jing Zhou;Tongwen Chen","doi":"10.1109/TCNS.2024.3487648","DOIUrl":null,"url":null,"abstract":"This article investigates stealthy attacks on cyber-physical systems that are monitored by a parity-space-based detector and corrupted by bounded disturbances. Specifically, this work proposes a receding horizon attack strategy subject to strict and relaxed stealthiness constraints. Necessary and sufficient conditions for the existence of strictly stealthy attacks of arbitrary lengths are derived. On the defender's side, a robust detector is designed to detect malicious attacks utilizing zonotopes to handle bounded disturbances. A new recursive update method and a reduction operator are proposed to improve the accuracy and reduce the storage space of the detector. Unlike traditional parity-space-based detectors, it is proved that any attack that can completely bypass the robust detector must be bounded. Furthermore, two methods of determining the optimal gains of the proposed detector are provided. The effectiveness of the proposed methods is demonstrated through numerical examples.","PeriodicalId":56023,"journal":{"name":"IEEE Transactions on Control of Network Systems","volume":"12 1","pages":"416-429"},"PeriodicalIF":4.0000,"publicationDate":"2024-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Transactions on Control of Network Systems","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10737460/","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"AUTOMATION & CONTROL SYSTEMS","Score":null,"Total":0}
引用次数: 0
Abstract
This article investigates stealthy attacks on cyber-physical systems that are monitored by a parity-space-based detector and corrupted by bounded disturbances. Specifically, this work proposes a receding horizon attack strategy subject to strict and relaxed stealthiness constraints. Necessary and sufficient conditions for the existence of strictly stealthy attacks of arbitrary lengths are derived. On the defender's side, a robust detector is designed to detect malicious attacks utilizing zonotopes to handle bounded disturbances. A new recursive update method and a reduction operator are proposed to improve the accuracy and reduce the storage space of the detector. Unlike traditional parity-space-based detectors, it is proved that any attack that can completely bypass the robust detector must be bounded. Furthermore, two methods of determining the optimal gains of the proposed detector are provided. The effectiveness of the proposed methods is demonstrated through numerical examples.
期刊介绍:
The IEEE Transactions on Control of Network Systems is committed to the timely publication of high-impact papers at the intersection of control systems and network science. In particular, the journal addresses research on the analysis, design and implementation of networked control systems, as well as control over networks. Relevant work includes the full spectrum from basic research on control systems to the design of engineering solutions for automatic control of, and over, networks. The topics covered by this journal include: Coordinated control and estimation over networks, Control and computation over sensor networks, Control under communication constraints, Control and performance analysis issues that arise in the dynamics of networks used in application areas such as communications, computers, transportation, manufacturing, Web ranking and aggregation, social networks, biology, power systems, economics, Synchronization of activities across a controlled network, Stability analysis of controlled networks, Analysis of networks as hybrid dynamical systems.