Skip to main content

Cyber-Physical Systems Security: A Control-Theoretic Approach

  • Living reference work entry
  • First Online:
Encyclopedia of Systems and Control
  • 464 Accesses

Abstract

This entry introduces security issues in cyber-physical systems mainly from two perspectives: one is to analyze the attack effectiveness from the malicious attacker’s perspective and the other is to design the attack detection mechanism and control scheme from the system designer’s perspective. For the first research aspect, existing works focused on the worst-case performance degradation analysis when the system is under a certain type of attack are introduced, among which DoS attack and integrity attack are of the most interest. For the second research aspect, existing works providing countermeasures to detect the existence of attacks and proposing resilient estimation and control methodologies against hostile attacks are introduced. The main framework of cyber-physical systems is provided, and solid results about security issues are reviewed from selected high-quality journal papers in this entry.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Bibliography

  • Andress J (2014) The basics of information security: understanding the fundamentals of InfoSec in theory and practice, 2nd edition. Syngress Media, Waltham, MA

    Google Scholar 

  • Bai C-Z, Pasqualetti F, Gupta V (2015) Security in stochastic control systems: fundamental limitations and performance bounds. In: Proceedings of the American control conference, pp 195–200

    Google Scholar 

  • Bai C-Z, Pasqualetti F, Gupta V (2017a) Data-injection attacks in stochastic control systems: detectability and performance tradeoffs. Automatica 82:251–260

    Article  MathSciNet  MATH  Google Scholar 

  • Bai C-Z, Gupta V, Pasqualetti F (2017b) On Kalman filtering with compromised sensors: attack stealthiness and performance bounds. IEEE Trans Autom Control 62(12):6641–6648

    Article  MathSciNet  MATH  Google Scholar 

  • Bertsekas DP (1995) Dynamic programming and optimal control, vol 1. Athena Scientific, Belmont

    MATH  Google Scholar 

  • Chen Y, Kar S, Moura JMF. Cyber-physical attacks with control objectives. IEEE Trans Autom Control 63(5):1418–1425

    Article  MathSciNet  MATH  Google Scholar 

  • Ding K, Li Y, Quevedo DE, Dey S, Shi L (2017) A multi-channel transmission schedule for remote state estimation under DoS attacks. Automatica 78:194–201

    Article  MathSciNet  MATH  Google Scholar 

  • Ding K, Ren X, Quevedo DE, Dey S, Shi L (2019) DoS attacks on remote state estimation with asymmetric information. IEEE Trans Control Netw Syst 6(2):653–666

    Article  MathSciNet  MATH  Google Scholar 

  • Farwell JP, Rohozinski R (2011) Stuxnet and the future of cyber war. Survival 53(1):23–40

    Article  Google Scholar 

  • Fawzi H, Tabuada P, Diggavi S (2014) Secure estimation and control for cyber-physical systems under adversarial attacks. IEEE Trans Autom Control 59(6): 1454–1467

    Article  MathSciNet  MATH  Google Scholar 

  • Frank R (2013) Understanding smart sensors. Artech House, Norwood, MA

    Google Scholar 

  • Gungor VC, Hancke GP (2009) Industrial wireless sensor networks: challenges, design principles, and technical approaches. IEEE Trans Ind Electron 56(10):4258–4265

    Article  Google Scholar 

  • Guo Z, Shi D, Johansson KH, Shi L (2017) Optimal linear cyber-attack on remote state estimation. IEEE Trans Control Netw Syst 4(1):4–13

    Article  MathSciNet  MATH  Google Scholar 

  • Guo Z, Shi D, Johansson KH, Shi L (2018) Worst-case stealthy innovation-based linear attack on remote state estimation. Automatica 89:117–124

    Article  MathSciNet  MATH  Google Scholar 

  • Guo Z, Shi D, Quevedo DE, Shi L (2019) Secure state estimation against integrity attacks: a Gaussian mixture model approach. IEEE Trans Signal Process 67(1):194–207

    Article  MathSciNet  MATH  Google Scholar 

  • Han D, Mo Y, Xie L (2016) Resilience and performance analysis for state estimation against integrity attacks. IFAC-PapersOnLine 49(22):55–60

    Article  Google Scholar 

  • Hovareshti P, Gupta V, Baras JS (2007) Sensor scheduling using smart sensors. In: Proceedings of IEEE conference on decision and control, pp 494–499

    Google Scholar 

  • Hu L, Wang Z, Han Q, Liu X (2018) State estimation under false data injection attacks: security analysis and system protection. Automatica 87:176–183

    Article  MathSciNet  MATH  Google Scholar 

  • Kim KD, Kumar PR (2012) Cyber-physical systems: a perspective at the centennial. Proc IEEE 100:1287–1308

    Article  Google Scholar 

  • Kung E, Dey S, Shi L (2017) The performance and limitations of 𝜖-stealthy attacks on higher order systems. IEEE Trans Autom Control 62(2):941–947

    Article  MathSciNet  MATH  Google Scholar 

  • Leong AS, Quevedo DE, Dolz D, Dey S (2019) Transmission scheduling for remote state estimation over packet dropping links in the presence of an eavesdropper. IEEE Trans Autom Control 64(9):3732–3739

    Article  MathSciNet  Google Scholar 

  • Lewis FL (2004) Wireless sensor networks. In: Smart environments: technologies, protocols, and applications, pp 11–46

    Chapter  Google Scholar 

  • Li Y, Quevedo DE, Dey S, Shi L (2015a) Fake-acknowledgment attack on ACK-based sensor power schedule for remote state estimation. In: Proceedings of IEEE conference on decision and control, pp 5795–5800

    Google Scholar 

  • Li Y, Shi L, Cheng P, Chen J, Quevedo DE (2015b) Jamming attacks on remote state estimation in cyber-physical systems: a game-theoretic approach. IEEE Trans Autom Control 60(10):2831–2836

    Article  MathSciNet  MATH  Google Scholar 

  • Li Y, Shi L, Chen T (2019) Detection against linear deception attacks on multi-sensor remote state estimation. IEEE Trans Control Netw Syst 5(3):846–856

    Article  MathSciNet  MATH  Google Scholar 

  • Mehra RK, Peschon J (1971) An innovations approach to fault detection and diagnosis in dynamic systems. Automatica 7(5):637–640

    Article  Google Scholar 

  • Miao F, Pajic M, Pappas GJ (2013) Stochastic game approach for replay attack detection. In: Proceedings of IEEE conference on decision and control, pp 1854–1859

    Google Scholar 

  • Mishra S, Shoukry Y, Karamchandani N, Diggavi SN, Tabuada P (2017) Secure state estimation against sensor attacks in the presence of noise. IEEE Trans Control Netw Syst 4(1):49–59

    Article  MathSciNet  MATH  Google Scholar 

  • Mo Y, Garone E (2016) Secure dynamic state estimation via local estimators. In: Proceedings of IEEE conference on decision and control, pp 5073–5078

    Google Scholar 

  • Mo Y, Murray RM (2017) Privacy preserving average consensus. IEEE Trans Autom Control 62(2):753–765

    Article  MathSciNet  MATH  Google Scholar 

  • Mo Y, Sinopoli B (2009) Secure control against replay attacks. In: Proceedings of annual Allerton conference on communication, control, and computing (Allerton), pp 911–918

    Google Scholar 

  • Mo Y, Sinopoli B (2010) False data injection attacks in control systems. In: Proceedings of 1st workshop on secure control systems, pp 1–6

    Google Scholar 

  • Mo Y, Sinopoli B (2016) On the performance degradation of cyber-physical systems under stealthy integrity attacks. IEEE Trans Autom Control 61(9):2618–2624

    Article  MathSciNet  MATH  Google Scholar 

  • Mo Y, Weerakkody S, Sinopoli B (2015) Physical authentication of control systems: designing watermarked control inputs to detect counterfeit sensor outputs. IEEE Control Syst Mag 35(1):93–109

    Article  MathSciNet  Google Scholar 

  • Pajic M, Weimer J, Bezzo N, Tabuada P, Sokolsky O, Lee I, Pappas GJ (2014) Robustness of attack-resilient state estimators. In: Proceedings of international conference on cyber-physical systems, pp 1163–1174

    Google Scholar 

  • Qin J, Li M, Shi L, Yu X (2018) Optimal denial-of-service attack scheduling with energy constraint over packet-dropping networks. IEEE Trans Autom Control 63(6):1648–1663

    Article  MathSciNet  MATH  Google Scholar 

  • Schenato L (2008) Optimal estimation in networked control systems subject to random delay and packet drop. IEEE Trans Autom Control 53(5):1311–1317

    Article  MathSciNet  MATH  Google Scholar 

  • Shi D, Elliott RJ, Chen T (2017) On finite-state stochastic modeling and secure estimation of cyber-physical systems. IEEE Trans Autom Control 62(1):65–80

    Article  MathSciNet  MATH  Google Scholar 

  • Shi D, Guo Z, Johansson KH, Shi L (2018) Causality countermeasures for anomaly detection in cyber-physical systems. IEEE Trans Autom Control 63(2):386–401

    Article  MathSciNet  MATH  Google Scholar 

  • Shoukry Y, Nuzzo P, Puggelli A, Sangiovanni-Vincentelli AL, Seshia SA, Tabuada P (2017) Secure state estimation for cyber-physical systems under sensor attacks: a satisfiability modulo theory approach. IEEE Trans Autom Control 62(10):4917–4932

    Article  MathSciNet  MATH  Google Scholar 

  • Slay J, Miller M (2007) Lessons learned from the Maroochy Water breach. In: Proceedings of the international conference on critical infrastructure protection, pp 73–82

    Google Scholar 

  • Teixeira A, Shames I, Sandberg H, Johansson KH (2015) A secure control framework for resource-limited adversaries. Automatica 51:135–148

    Article  MathSciNet  MATH  Google Scholar 

  • Xu W, Ma K, Trappe W, Zhang Y (2006) Jamming sensor networks: attack and defense strategies. IEEE Netw 20(3):41–47

    Article  Google Scholar 

  • Zhang H, Cheng P, Shi L, Chen J (2015) Optimal denial-of-service attack scheduling with energy constraint. IEEE Trans Autom Control 60(11):3023–3028

    Article  MathSciNet  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ling Shi .

Editor information

Editors and Affiliations

Section Editor information

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer-Verlag London Ltd., part of Springer Nature

About this entry

Check for updates. Verify currency and authenticity via CrossMark

Cite this entry

Ni, Y., Guo, Z., Shi, L. (2020). Cyber-Physical Systems Security: A Control-Theoretic Approach. In: Baillieul, J., Samad, T. (eds) Encyclopedia of Systems and Control. Springer, London. https://doi.org/10.1007/978-1-4471-5102-9_100138-1

Download citation

  • DOI: https://doi.org/10.1007/978-1-4471-5102-9_100138-1

  • Published:

  • Publisher Name: Springer, London

  • Print ISBN: 978-1-4471-5102-9

  • Online ISBN: 978-1-4471-5102-9

  • eBook Packages: Springer Reference EngineeringReference Module Computer Science and Engineering

Publish with us

Policies and ethics