Secure State Estimation and Attack Reconstruction in Cyber-Physical Systems

Secure State Estimation and Attack Reconstruction in Cyber-Physical Systems
Author: Shamila Nateghi
Publisher:
Total Pages: 0
Release: 2020
Genre: Electronic books
ISBN:

A cyber-physical system (CPS) is a tight coupling of computational resources, network communication, and physical processes. They are composed of a set of networked components, including sensors, actuators, control processing units, and communication agents that instrument the physical world to make ,Äúsmarter.,Äù However, cyber components are also the source of new, unprecedented vulnerabilities to malicious attacks. In order to protect a CPS from attacks, three security levels of protection, detection, and identification are considered. In this chapter, we will discuss the identification level, i.e., secure state estimation and attack reconstruction of CPS with corrupted states and measurements. Considering different attack plans that may assault the states, sensors, or both of them, different online attack reconstruction approaches are discussed. Fixed-gain and adaptive-gain finite-time convergent observation algorithms, specifically sliding mode observers, are applied to online reconstruction of sensor and state attacks. Next, the corrupted measurements and states are to be cleaned up online in order to stop the attack propagation to the CPS via the control signal. The proposed methodologies are applied to an electric power network, whose states and sensors are under attack. Simulation results illustrate the efficacy of the proposed observers.

Security of Cyber-Physical Systems: State Estimation and Control

Security of Cyber-Physical Systems: State Estimation and Control
Author: Chengwei Wu
Publisher: Springer Nature
Total Pages: 293
Release: 2021-10-19
Genre: Technology & Engineering
ISBN: 3030883507

This book analyzes the secure problems of cyber-physical systems from both the adversary and defender sides. Targeting the challenging security problems of cyber-physical systems under malicious attacks, this book presents some recent novel secure state estimation and control algorithms, in which moving target defense scheme, zero-sum game-theoretical approach, reinforcement learning, neural networks, and intelligent control are adopted. Readers will find not only the valuable secure state estimation and control schemes combined with the approaches aforementioned, but also some vital conclusions for securing cyber-physical systems, for example, the critical value of allowed attack probability, the maximum number of sensors to be attacked, etc. The book also provides practical applications, example of which are unmanned aerial vehicles, interruptible power system, and robot arm to validate the proposed secure algorithms. Given its scope, it offers a valuable resource for undergraduate and graduate students, academics, scientists, and engineers who are working in this field.

Security and Resilience in Cyber-Physical Systems

Security and Resilience in Cyber-Physical Systems
Author: Masoud Abbaszadeh
Publisher: Springer Nature
Total Pages: 383
Release: 2022-08-08
Genre: Technology & Engineering
ISBN: 303097166X

This book discusses the latest advances in cyber-physical security and resilience of cyber-physical systems, including cyber-attack detection, isolation, situation awareness, resilient estimation and resilient control under attack. It presents both theoretical results and important applications of the methods. Security and Resilience in Cyber-Physical Systems begins by introducing the topic of cyber-physical security, covering state-of-the-art trends in both theory and applications, as well as some of the emerging methodologies and future directions for research. It then moves on to detail theoretical methods of attack detection, resilient estimation and control within cyber-physical systems, before discussing their various applications, such as power generation and distribution, autonomous systems, wireless communication networks and chemical plants. Focusing on the detection of and accommodation to cyber-attacks on cyber-physical systems, and including both estimation and artificial-intelligence-based methods, this book will be of interest to researchers, engineers and graduate students within the fields of cyber-physical security and resilient control.

Security of Cyber-Physical Systems

Security of Cyber-Physical Systems
Author: Hadis Karimipour
Publisher: Springer Nature
Total Pages: 328
Release: 2020-07-23
Genre: Computers
ISBN: 3030455416

This book presents a comprehensive overview of security issues in Cyber Physical Systems (CPSs), by analyzing the issues and vulnerabilities in CPSs and examining state of the art security measures. Furthermore, this book proposes various defense strategies including intelligent attack and anomaly detection algorithms. Today’s technology is continually evolving towards interconnectivity among devices. This interconnectivity phenomenon is often referred to as Internet of Things (IoT). IoT technology is used to enhance the performance of systems in many applications. This integration of physical and cyber components within a system is associated with many benefits; these systems are often referred to as Cyber Physical Systems (CPSs). The CPSs and IoT technologies are used in many industries critical to our daily lives. CPSs have the potential to reduce costs, enhance mobility and independence of patients, and reach the body using minimally invasive techniques. Although this interconnectivity of devices can pave the road for immense advancement in technology and automation, the integration of network components into any system increases its vulnerability to cyber threats. Using internet networks to connect devices together creates access points for adversaries. Considering the critical applications of some of these devices, adversaries have the potential of exploiting sensitive data and interrupting the functionality of critical infrastructure. Practitioners working in system security, cyber security & security and privacy will find this book valuable as a reference. Researchers and scientists concentrating on computer systems, large-scale complex systems, and artificial intelligence will also find this book useful as a reference.

Security and Privacy in Cyber-Physical Systems: Physical Attacks and Countermeasures

Security and Privacy in Cyber-Physical Systems: Physical Attacks and Countermeasures
Author: Yasser Shoukry Sakr
Publisher:
Total Pages: 233
Release: 2015
Genre:
ISBN:

The increasingly tight coupling of cyber (computing/communication) and physical (sensing/actuation) components has opened the door for developing many engineering systems with increasing complexity. On the one hand, these systems (commonly termed cyber-physical systems, or CPS for short) have enabled a multitude of applications where decisions are taken at various time-scales, driven by the sensory information, and are used for purposes such as automated control and adaptive interventions. On the other hand, there has been a corresponding increase in attacks targeting the integrity and security of these systems. These attacks pose a significant threat to often sensitive devices, potentially impairing our relation with these technologies. Various unique attributes of sensory information make it particularly challenging to formalize and address these concerns, and approaches thus far to handle them have been largely insufficient. The objective of this dissertation is to develop a principled understanding of these emerging concerns and develop formalisms, algorithms, and system mechanisms to effectively address them. The contributions of this dissertation are multi-fold. We start by playing the role of an adversarial attacker trying to discover new attack vectors for which traditional security mechanisms provide no defense guarantees. In particular, we focus on attacks that take place on sensors that collect information about the physical process in CPS. We show that by exploiting the weakness in securing sensor information, a malicious attacker can cause life-threatening situations which plays as a motivation for the rest of this dissertation. Next, we explore two countermeasures called sensor-level countermeasures and system-level countermeasures. In the sensor-level countermeasures, we propose a physical challenge-response authentication (PyCRA) scheme for sensors that is designed to provide an authorization mechanism that not only detects malicious attacks but provides resilience against them. The majority of this dissertation focuses on designing system-level counter measures to sensor attacks. In the system-level countermeasures, we consider the problem of designing algorithms for CPS whose sensor measurements are corrupted by a malicious attacker. The attacker capabilities are limited in the sense that only a subset of all the sensors can be attacked although this subset is unknown. In particular, we focus on the setup where all measurements from various sensors are sent to a central unit whose functionality is to fuse all these measurements in order to estimate the state of the CPS regardless of the existence of the malicious attacker. We call this problem the secure state estimation problem. We analyze sufficient and necessary conditions for the solvability of the secure state estimation problem under three different setups namely, linear deterministic systems, linear stochastic systems, and nonlinear deterministic systems. We propose the notion of s-sparse observability and show how it plays a vital role in solving the secure state estimation problem. We show that the secure state estimation problem is a combinatorial problem. The most notable contribution of this dissertation is a novel Satisfiability Modulo Theory (SMT) solver that splits the reasoning, about the combinatorial complexity of the secure state estimation problem, over Boolean and real domains and uses a powerful tool from each domain. By leveraging results from formal methods over real numbers, we provide guarantees on the soundness and completeness of our algorithm. We also extend the SMT-solver to estimate the state under sensor attacks to the context of stochastic linear dynamical system and nonlinear differentially flat systems Finally, we touch upon the related problem of privacy attacks in cyber-physical systems. Unlike sensor attacks, privacy attacks are a form of passive attacks that target data collection that can be used to leak sensitive information. We present a novel model-based obfuscation approach with strong formal guarantees. Our approach preserves both the utility of the event trace and its spatio-temporal-plausibility while providing strong privacy guarantees.

Modeling and Design of Secure Internet of Things

Modeling and Design of Secure Internet of Things
Author: Charles A. Kamhoua
Publisher: John Wiley & Sons
Total Pages: 704
Release: 2020-08-04
Genre: Technology & Engineering
ISBN: 1119593360

An essential guide to the modeling and design techniques for securing systems that utilize the Internet of Things Modeling and Design of Secure Internet of Things offers a guide to the underlying foundations of modeling secure Internet of Things' (IoT) techniques. The contributors—noted experts on the topic—also include information on practical design issues that are relevant for application in the commercial and military domains. They also present several attack surfaces in IoT and secure solutions that need to be developed to reach their full potential. The book offers material on security analysis to help with in understanding and quantifying the impact of the new attack surfaces introduced by IoT deployments. The authors explore a wide range of themes including: modeling techniques to secure IoT, game theoretic models, cyber deception models, moving target defense models, adversarial machine learning models in military and commercial domains, and empirical validation of IoT platforms. This important book: Presents information on game-theory analysis of cyber deception Includes cutting-edge research finding such as IoT in the battlefield, advanced persistent threats, and intelligent and rapid honeynet generation Contains contributions from an international panel of experts Addresses design issues in developing secure IoT including secure SDN-based network orchestration, networked device identity management, multi-domain battlefield settings, and smart cities Written for researchers and experts in computer science and engineering, Modeling and Design of Secure Internet of Things contains expert contributions to provide the most recent modeling and design techniques for securing systems that utilize Internet of Things.

Cyber-attack Detection and Resilient State Estimation in Power Systems

Cyber-attack Detection and Resilient State Estimation in Power Systems
Author: Ana Jevtić (Ph. D.)
Publisher:
Total Pages: 108
Release: 2020
Genre:
ISBN:

Many critical infrastructures, such as transportation and electric energy networks, and health care, are now becoming highly integrated with information and communication technology, in order to be more efficient and reliable. These cyber-physical systems (CPS) now face an increasing threat of cyber-attacks. Intelligent attackers can leverage their knowledge of the system, disruption, and disclosure resources to critically damage the system while remaining undiscovered. In this dissertation, we develop a defense strategy, with the ability to uncover malicious and intelligent attacks and enable resilient operation of cyber-physical systems. Specifically, we apply this defense strategy to power systems, described by linear frequency dynamics around the nominal operating point. Our methodology is based on the notion of data aggregation as a tool for extracting internal information about the system that may be unknown to the attacker. As the first step to resilience and security, we propose several methods for active attack detection in cyber-physical systems. In one approach we design a clustering-based moving-target active detection algorithm and evaluate it against stealthy attacks on the 5-bus and 24-bus power grids. Next, we consider an approach based on Interaction Variables (IntVar), as another intuitive way to extract internal information in power grids. We evaluate the eectiveness of this approach on Automatic Generation Control (AGC), a vital control mechanism in today’s power grid. After an attack has been detected, mitigation procedures must be put in place to allow continued reliable operation or graceful degradation of the power grid. To that end, we develop a resilient state estimation algorithm, that provides the system operator with situational awareness in the presence of wide-spread coordinated cyber-attacks when many system measurements may become unavailable.

Cybersecurity and Privacy in Cyber Physical Systems

Cybersecurity and Privacy in Cyber Physical Systems
Author: Yassine Maleh
Publisher: CRC Press
Total Pages: 434
Release: 2019
Genre: BUSINESS & ECONOMICS
ISBN: 9780429263897

Cybersecurity and Privacy in Cyber-Physical Systems collects and reports on recent high-quality research that addresses different problems related to cybersecurity and privacy in cyber-physical systems (CPSs). It Presents high-quality contributions addressing related theoretical and practical aspects Improves the reader's awareness of cybersecurity and privacy in CPSs Analyzes and presents the state of the art of CPSs, cybersecurity, and related technologies and methodologies Highlights and discusses recent developments and emerging trends in cybersecurity and privacy in CPSs Proposes new models, practical solutions, and technological advances related to cybersecurity and privacy in CPSs Discusses new cybersecurity and privacy models, prototypes, and protocols for CPSs This comprehensive book promotes high-quality research by bringing together researchers and experts in CPS security and privacy from around the world to share their knowledge of the different aspects of CPS security. Cybersecurity and Privacy in Cyber-Physical Systems is ideally suited for policymakers, industrial engineers, researchers, academics, and professionals seeking a thorough understanding of the principles of cybersecurity and privacy in CPSs. They will learn about promising solutions to these research problems and identify unresolved and challenging problems for their own research. Readers will also have an overview of CPS cybersecurity and privacy design. P> Discusses new cybersecurity and privacy models, prototypes, and protocols for CPSs This comprehensive book promotes high-quality research by bringing together researchers and experts in CPS security and privacy from around the world to share their knowledge of the different aspects of CPS security. Cybersecurity and Privacy in Cyber-Physical Systems is ideally suited for policymakers, industrial engineers, researchers, academics, and professionals seeking a thorough understanding of the principles of cybersecurity and privacy in CPSs. They will learn about promising solutions to these research problems and identify unresolved and challenging problems for their own research. Readers will also have an overview of CPS cybersecurity and privacy design.