This paper proposes a stealthy integrity attack detection methodology for a class of nonlinear cyber– physical systems subject to disturbances. An equivalent increment of the system at a time prior to the attack occurrence time is introduced, which is theoretically proved to be effective to detect stealthy integrity attacks. A backward-in-time estimator is developed via the fixed-point smoother design tool to exploit this equivalent increment and allow the detection of the attack. More specifically, an asymptotically stable incremental system is introduced to characterize stealthy integrity attacks, and its backward-in-time solution at a fixed time prior to the attack occurrence formulates the equivalent increment. When running reversely in time, the divergence property of such an asymptotically stable incremental system enables the equivalent increment to detect stealthy integrity attacks. A fixedpoint smoother is introduced to estimate the unknown equivalent increment for a class of Lipschitz nonlinear physical plants, such that the estimation error satisfies the H∞ performance objective. Based on the equivalent increment and its estimation provided by the smoother, suitable residual and threshold signals are generated, allowing the detection of the considered stealthy integrity attacks. A detectability analysis is conducted to rigorously characterize the class of detectable attacks. Finally, a case study is presented to illustrate the effectiveness of the developed backward-in-time attack detection methodology.

Detecting Stealthy Integrity Attacks in a Class of Nonlinear Cyber-Physical Systems: A Backward-in-Time Approach

M. Polycarpou
Membro del Collaboration Group
;
T. Parisini
Membro del Collaboration Group
2022-01-01

Abstract

This paper proposes a stealthy integrity attack detection methodology for a class of nonlinear cyber– physical systems subject to disturbances. An equivalent increment of the system at a time prior to the attack occurrence time is introduced, which is theoretically proved to be effective to detect stealthy integrity attacks. A backward-in-time estimator is developed via the fixed-point smoother design tool to exploit this equivalent increment and allow the detection of the attack. More specifically, an asymptotically stable incremental system is introduced to characterize stealthy integrity attacks, and its backward-in-time solution at a fixed time prior to the attack occurrence formulates the equivalent increment. When running reversely in time, the divergence property of such an asymptotically stable incremental system enables the equivalent increment to detect stealthy integrity attacks. A fixedpoint smoother is introduced to estimate the unknown equivalent increment for a class of Lipschitz nonlinear physical plants, such that the estimation error satisfies the H∞ performance objective. Based on the equivalent increment and its estimation provided by the smoother, suitable residual and threshold signals are generated, allowing the detection of the considered stealthy integrity attacks. A detectability analysis is conducted to rigorously characterize the class of detectable attacks. Finally, a case study is presented to illustrate the effectiveness of the developed backward-in-time attack detection methodology.
File in questo prodotto:
File Dimensione Formato  
Zhang_Keliris_Polycarpou_Parisini_Automatica_2022.pdf

Accesso chiuso

Tipologia: Documento in Versione Editoriale
Licenza: Copyright Editore
Dimensione 1.84 MB
Formato Adobe PDF
1.84 MB Adobe PDF   Visualizza/Apri   Richiedi una copia
Zhang_Keliris_Polycarpou_Parisini_Automatica_Accepted_5_Dec_2021.pdf

accesso aperto

Tipologia: Altro materiale allegato
Licenza: Digital Rights Management non definito
Dimensione 1.76 MB
Formato Adobe PDF
1.76 MB Adobe PDF Visualizza/Apri
Pubblicazioni consigliate

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11368/3028952
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 12
  • ???jsp.display-item.citation.isi??? 8
social impact