Optimal Switching Attacks and Countermeasures in Cyber-Physical Systems

Guangyu Wu, Gang Wang*, Jian Sun, Lu Xiong

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

26 Citations (Scopus)

Abstract

The work analyzes dynamic responses of a healthy plant under optimal switching data-injection attacks on sensors and develops countermeasures from the vantage point of optimal control. This is approached in a cyber-physical system setting, where the attacker can inject false data into a selected subset of sensors to maximize the quadratic cost of states and the energy consumption of the controller at a minimal effort. A 0-1 integer program is formulated, through which the adversary finds an optimal sequence of sets of sensors to attack at optimal switching instants. Specifically, the number of compromised sensors per instant is kept fixed, yet their locations can be dynamic. Leveraging the embedded transformation and mathematical programming, an analytical solution is obtained, which includes an algebraic switching condition determining the optimal sequence of attack locations (compromised sensor sets), along with an optimal state-feedback-based data-injection law. To thwart the adversary, however, a resilient control approach is put forward for stabilizing the compromised system under arbitrary switching attacks constructed based on a set of state-feedback laws, each of which corresponds to a compromised sensor set. Finally, an application using power generators in a cyber-enabled smart grid is provided to corroborate the effectiveness of the resilient control scheme and the practical merits of the theory.

Original languageEnglish
Article number8876887
Pages (from-to)4825-4835
Number of pages11
JournalIEEE Transactions on Systems, Man, and Cybernetics: Systems
Volume51
Issue number8
DOIs
Publication statusPublished - Aug 2021

Keywords

  • Data-injection attacks
  • dynamic set
  • resilient control
  • switching condition

Fingerprint

Dive into the research topics of 'Optimal Switching Attacks and Countermeasures in Cyber-Physical Systems'. Together they form a unique fingerprint.

Cite this