TY - JOUR
T1 - Learning-based attacks in cyber-physical systems
AU - Khojasteh, Mohammad Javad
AU - Khina, Anatoly
AU - Franceschetti, Massimo
AU - Javidi, Tara
N1 - Publisher Copyright:
© 2014 IEEE.
PY - 2021/3
Y1 - 2021/3
N2 - We introduce the problem of learning-based attacks in a simple abstraction of cyber-physical systems - the case of a discrete-time, linear, time-invariant plant that may be subject to an attack that overrides sensor readings and controller actions. The attacker attempts to learn the dynamics of the plant and subsequently overrides the controller's actuation signal to destroy the plant without being detected. The attacker can feed fictitious sensor readings to the controller using its estimate of the plant dynamics and mimic the legitimate plant operation. The controller, in contrast, is constantly on the lookout for an attack; once the controller detects an attack, it immediately shuts the plant off. In the case of scalar plants, we derive an upper bound on the attacker's deception probability for any measurable control policy when the attacker uses an arbitrary learning algorithm to estimate the system dynamics. We then derive lower bounds for the attacker's deception probability for both scalar and vector plants by assuming an authentication test that inspects the empirical variance of the system disturbance. We also show how the controller can improve the security of the system by superimposing a carefully crafted privacy-enhancing signal on top of the 'nominal control policy.' Finally, for nonlinear scalar dynamics that belong to the reproducing kernel Hilbert space, we investigate the performance of attacks based on nonlinear Gaussian process learning algorithms.
AB - We introduce the problem of learning-based attacks in a simple abstraction of cyber-physical systems - the case of a discrete-time, linear, time-invariant plant that may be subject to an attack that overrides sensor readings and controller actions. The attacker attempts to learn the dynamics of the plant and subsequently overrides the controller's actuation signal to destroy the plant without being detected. The attacker can feed fictitious sensor readings to the controller using its estimate of the plant dynamics and mimic the legitimate plant operation. The controller, in contrast, is constantly on the lookout for an attack; once the controller detects an attack, it immediately shuts the plant off. In the case of scalar plants, we derive an upper bound on the attacker's deception probability for any measurable control policy when the attacker uses an arbitrary learning algorithm to estimate the system dynamics. We then derive lower bounds for the attacker's deception probability for both scalar and vector plants by assuming an authentication test that inspects the empirical variance of the system disturbance. We also show how the controller can improve the security of the system by superimposing a carefully crafted privacy-enhancing signal on top of the 'nominal control policy.' Finally, for nonlinear scalar dynamics that belong to the reproducing kernel Hilbert space, we investigate the performance of attacks based on nonlinear Gaussian process learning algorithms.
KW - Cyber-physical system security
KW - learning for dynamics and control
KW - man-in-the-middle attack
KW - physical layer authentication
KW - secure control
KW - system identification
UR - http://www.scopus.com/inward/record.url?scp=85099535060&partnerID=8YFLogxK
U2 - 10.1109/TCNS.2020.3028035
DO - 10.1109/TCNS.2020.3028035
M3 - ???researchoutput.researchoutputtypes.contributiontojournal.article???
AN - SCOPUS:85099535060
SN - 2325-5870
VL - 8
SP - 437
EP - 449
JO - IEEE Transactions on Control of Network Systems
JF - IEEE Transactions on Control of Network Systems
IS - 1
M1 - 9210155
ER -