Communities & Collections
Researchers & Labs
Titles
DGIST
LIBRARY
DGIST R&D
Detail View
Department of Electrical Engineering and Computer Science
Dynamic Systems and Control Laboratory
1. Journal Articles
Masking attack for sampled-data systems via input redundancy
Kim, Jihan
;
Park, Gyunghoon
;
Shim, Hyungbo
;
Eun, Yongsoon
Department of Electrical Engineering and Computer Science
Dynamic Systems and Control Laboratory
1. Journal Articles
Citations
WEB OF SCIENCE
Citations
SCOPUS
Metadata Downloads
XML
Excel
Title
Masking attack for sampled-data systems via input redundancy
DGIST Authors
Eun, Yongsoon
Issued Date
2019-09
Citation
Kim, Jihan. (2019-09). Masking attack for sampled-data systems via input redundancy. doi: 10.1049/iet-cta.2018.6075
Type
Article
Article Type
Article
Author Keywords
control system synthesis
;
sampled data systems
;
security of data
;
digital control
;
linear systems
;
discrete time systems
;
continuous time systems
;
masking attack
;
sampled-data system
;
input redundancy
;
cyber-physical systems
;
malicious attack
;
physical plant
;
continuous-time LTI system
;
digital controller
;
periodic sampling
;
discrete time instants
;
actuator attack
Keywords
SECURE CONTROL
;
MULTIRATE
;
DESIGN
ISSN
1751-8644
Abstract
This study discovers a new vulnerability of cyber-physical systems to malicious attack. It arises when the physical plant, that is modelled as a continuous-time LTI system, is controlled by a digital controller with periodic sampling and actuation. In the sampled-data framework, most anomaly detectors monitor the plant's output only at discrete time instants. Consequently, abnormal behaviour between sampling instants cannot be detected if output behaves normally at every sampling instant. This implies that if an actuator attack drives the plant's state to pass through the kernel of the output matrix at each sensing time, then the attack compromises the system while remaining stealthy. It is shown that this type of attack always exists when the sampled-data system has an input redundancy, i.e. the number of inputs being larger than that of outputs and/or the sampling rate of the actuators being higher than that of the sensors. Simulation results for the X-38 vehicle and other numerical examples illustrate this new attack strategy may result in disastrous consequences. © The Institution of Engineering and Technology 2019.
URI
http://hdl.handle.net/20.500.11750/10806
DOI
10.1049/iet-cta.2018.6075
Publisher
Institution of Engineering and Technology
Show Full Item Record
File Downloads
There are no files associated with this item.
공유
공유하기
Related Researcher
Eun, Yongsoon
은용순
Department of Electrical Engineering and Computer Science
read more
Total Views & Downloads