This paper proposes a stealthy integrity attack detection methodology for a class of nonlinear cyber– physical systems subject to disturbances. An equivalent increment of the system at a time prior to the attack occurrence time is introduced, which is theoretically proved to be effective to detect stealthy integrity attacks. A backward-in-time estimator is developed via the fixed-point smoother design tool to exploit this equivalent increment and allow the detection of the attack. More specifically, an asymptotically stable incremental system is introduced to characterize stealthy integrity attacks, and its backward-in-time solution at a fixed time prior to the attack occurrence formulates the equivalent increment. When running reversely in time, the divergence property of such an asymptotically stable incremental system enables the equivalent increment to detect stealthy integrity attacks. A fixedpoint smoother is introduced to estimate the unknown equivalent increment for a class of Lipschitz nonlinear physical plants, such that the estimation error satisfies the H∞ performance objective. Based on the equivalent increment and its estimation provided by the smoother, suitable residual and threshold signals are generated, allowing the detection of the considered stealthy integrity attacks. A detectability analysis is conducted to rigorously characterize the class of detectable attacks. Finally, a case study is presented to illustrate the effectiveness of the developed backward-in-time attack detection methodology.
Detecting Stealthy Integrity Attacks in a Class of Nonlinear Cyber-Physical Systems: A Backward-in-Time Approach
M. PolycarpouMembro del Collaboration Group
;T. ParisiniMembro del Collaboration Group
2022-01-01
Abstract
This paper proposes a stealthy integrity attack detection methodology for a class of nonlinear cyber– physical systems subject to disturbances. An equivalent increment of the system at a time prior to the attack occurrence time is introduced, which is theoretically proved to be effective to detect stealthy integrity attacks. A backward-in-time estimator is developed via the fixed-point smoother design tool to exploit this equivalent increment and allow the detection of the attack. More specifically, an asymptotically stable incremental system is introduced to characterize stealthy integrity attacks, and its backward-in-time solution at a fixed time prior to the attack occurrence formulates the equivalent increment. When running reversely in time, the divergence property of such an asymptotically stable incremental system enables the equivalent increment to detect stealthy integrity attacks. A fixedpoint smoother is introduced to estimate the unknown equivalent increment for a class of Lipschitz nonlinear physical plants, such that the estimation error satisfies the H∞ performance objective. Based on the equivalent increment and its estimation provided by the smoother, suitable residual and threshold signals are generated, allowing the detection of the considered stealthy integrity attacks. A detectability analysis is conducted to rigorously characterize the class of detectable attacks. Finally, a case study is presented to illustrate the effectiveness of the developed backward-in-time attack detection methodology.File | Dimensione | Formato | |
---|---|---|---|
Zhang_Keliris_Polycarpou_Parisini_Automatica_2022.pdf
Accesso chiuso
Tipologia:
Documento in Versione Editoriale
Licenza:
Copyright Editore
Dimensione
1.84 MB
Formato
Adobe PDF
|
1.84 MB | Adobe PDF | Visualizza/Apri Richiedi una copia |
Zhang_Keliris_Polycarpou_Parisini_Automatica_Accepted_5_Dec_2021.pdf
accesso aperto
Tipologia:
Altro materiale allegato
Licenza:
Digital Rights Management non definito
Dimensione
1.76 MB
Formato
Adobe PDF
|
1.76 MB | Adobe PDF | Visualizza/Apri |
Pubblicazioni consigliate
I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.