Revisiting a Watermark-based Detection Scheme to Handle Cyber-Physical Attacks

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

We address detection of attacks against cyber-physical systems. Cyber-physical systems are industrial control systems upgraded with novel computing, communication and interconnection capabilities. In this paper we reexamine the security of a detection scheme proposed by Mo and Sinopoli (2009) and Mo et al. (2015). The approach complements the use of Kalman filters and linear quadratic regulators, by adding an authentication watermark signal for the detection of integrity attacks. We show that the approach only detects cyber adversaries, i.e., attackers with the ability to eavesdrop information from the system, but that do not attempt to acquire any knowledge about the system model itself. The detector fails at covering cyber-physical adversaries, i.e., attackers that, in addition to the capabilities of the cyber adversary, are also able to infer the system model to evade the detection. We discuss an enhanced scheme, based on a multi-watermark authentication signal, that properly detects the two adversary models.

Original languageEnglish
Title of host publicationProceedings - 2016 11th International Conference on Availability, Reliability and Security, ARES 2016
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages21-28
Number of pages8
ISBN (Electronic)9781509009909
DOIs
Publication statusPublished - 14 Dec 2016
Externally publishedYes
Event11th International Conference on Availability, Reliability and Security, ARES 2016 - Salzburg, Austria
Duration: 31 Aug 20162 Sept 2016

Publication series

NameProceedings - 2016 11th International Conference on Availability, Reliability and Security, ARES 2016

Conference

Conference11th International Conference on Availability, Reliability and Security, ARES 2016
Country/TerritoryAustria
CitySalzburg
Period31/08/162/09/16

Keywords

  • Adversary model
  • Attack detection
  • Attack mitigation
  • Critical infrastructures
  • Cyber-physical security
  • Networked control system

Fingerprint

Dive into the research topics of 'Revisiting a Watermark-based Detection Scheme to Handle Cyber-Physical Attacks'. Together they form a unique fingerprint.

Cite this