Optimal Attack Strategies Subject to Detection Constraints Against Cyber-Physical Systems

Yuan Chen,Soummya Kar,Jose M. F. Moura
DOI: https://doi.org/10.1109/tcns.2017.2690399
IF: 4.347
2018-09-01
IEEE Transactions on Control of Network Systems
Abstract:This paper studies an attacker against a cyber-physical system (CPS) whose goal is to move the state of a CPS to a target state while ensuring that his or her probability of being detected does not exceed a given bound. The attacker's probability of being detected is related to the non-negative bias induced by his or her attack on the CPS's detection statistic. We formulate a linear quadratic cost function that captures the attacker's control goal and establish constraints on the induced bias that reflect the attacker's detection-avoidance objectives. When the attacker is constrained to be detected at the false alarm rate of the detector, we show that the optimal attack strategy reduces to a linear feedback of the attacker's state estimate. In the case that the attacker's bias is upper bounded by a positive constant, we provide two algorithmsan optimal algorithm and a suboptimal, less computationally intensive algorithmto find suitable attack sequences. Finally, we illustrate our attack strategies in numerical examples based on a remotely controlled helicopter under attack.
computer science, information systems,automation & control systems
What problem does this paper attempt to address?