Stealthy Attacks and Robust Detectors for Cyber-Physical Systems With Bounded Disturbances: A Zonotope Approach

This article investigates stealthy attacks on cyber-physical systems that are monitored by a parity-space-based detector and corrupted by bounded disturbances. Specifically, this work proposes a receding horizon attack strategy subject to strict and relaxed stealthiness constraints. Necessary and su...

Full description

Saved in:
Bibliographic Details
Published inIEEE transactions on control of network systems Vol. 12; no. 1; pp. 416 - 429
Main Authors Guo, Ziyi, Zhou, Jing, Chen, Tongwen
Format Journal Article
LanguageEnglish
Published Piscataway IEEE 01.03.2025
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Subjects
Online AccessGet full text
ISSN2325-5870
2372-2533
DOI10.1109/TCNS.2024.3487648

Cover

Loading…
More Information
Summary:This article investigates stealthy attacks on cyber-physical systems that are monitored by a parity-space-based detector and corrupted by bounded disturbances. Specifically, this work proposes a receding horizon attack strategy subject to strict and relaxed stealthiness constraints. Necessary and sufficient conditions for the existence of strictly stealthy attacks of arbitrary lengths are derived. On the defender's side, a robust detector is designed to detect malicious attacks utilizing zonotopes to handle bounded disturbances. A new recursive update method and a reduction operator are proposed to improve the accuracy and reduce the storage space of the detector. Unlike traditional parity-space-based detectors, it is proved that any attack that can completely bypass the robust detector must be bounded. Furthermore, two methods of determining the optimal gains of the proposed detector are provided. The effectiveness of the proposed methods is demonstrated through numerical examples.
Bibliography:ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ISSN:2325-5870
2372-2533
DOI:10.1109/TCNS.2024.3487648