Detection of Deception Attacks in Supervisory Control Systems Using Bond Graph

被引:2
|
作者
Zerdazi, I. [1 ,2 ]
Fezari, M. [1 ]
Ouziala, M. [2 ,3 ]
机构
[1] Badji Mokhtar Annaba Univ, Dept Elect, Lab Automat & Signals Annaba LASA, Annaba 23000, Algeria
[2] Lille Univ, Polytech Lille, Ctr Rech Informat Signal & Automat Lille CRIStAL, UMR CNRS 9189, F-59655 Villeneuve Dascq, France
[3] MHamed Bougara Boumerdes Univ, Fac Engn Sci, Lab Mech & Solid Syst LMSS, Boumerdes 30000, Algeria
关键词
SCADA; cyber-attacks; bond graph; deception attack; analytical redundancy relation;
D O I
10.3103/S0146411620020091
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Supervisory Control and Data Acquisition (SCADA) systems can be subject to cyber-attacks due to their extensive connectivity to information and communication technologies. Those communications are used to connect sensors, actuators, and programmable logic controllers (PLCs) to monitor and control the process. The use of communication networks enlarges the vulnerability of SCADA to cyber-attacks that can drive the system to unsafe states. A variety of approaches in the field of attack detection have been proposed, however they are characterized very expensive, low detection rate or are system specific. One of the powerful cyber-attacks targeting SCADA systems is deception attack, where the attacker can change sensor reading parameters. In this work, we propose a new defense strategy that detects parameter changes generated by deception attacks in the sensor and control part in supervisory control systems. To do so, we use the bond graph (BG) modeling tool.
引用
收藏
页码:156 / 167
页数:12
相关论文
共 50 条
  • [21] Formulating Attacks with Supervisory Control
    Lafortune, Stephane
    Schmuck, Anne-Kathrin
    IFAC PAPERSONLINE, 2024, 58 (01): : 1 - 6
  • [22] Security of networked control systems subject to deception attacks: a survey
    Pang, Zhong-Hua
    Fan, Lan-Zhi
    Guo, Haibin
    Shi, Yuntao
    Chai, Runqi
    Sun, Jian
    Liu, Guo-Ping
    INTERNATIONAL JOURNAL OF SYSTEMS SCIENCE, 2022, 53 (16) : 3577 - 3598
  • [23] Moving Target Defense based on Switched Supervisory Control: A New Technique for Mitigating Sensor Deception Attacks
    Meira-Goes, Romulo
    Lafortune, Stephane
    IFAC PAPERSONLINE, 2020, 53 (04): : 317 - 323
  • [24] Hybrid-Triggered H∞ Control for Networked Control Systems With Deception Attacks
    Li, Hengqian
    Yang, Qingsheng
    Zhan, Xisheng
    Wu, Jie
    Yan, Huaicheng
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-EXPRESS BRIEFS, 2023, 70 (09) : 3494 - 3498
  • [25] Attack detection and secure correction control for cyber-physical systems subject to actuator deception attacks
    He, Ke
    Long, Yue
    Li, Tieshan
    2023 35TH CHINESE CONTROL AND DECISION CONFERENCE, CCDC, 2023, : 3356 - 3361
  • [26] Supervisory control of discrete-event systems under external attacks
    Wang, Yi
    Li, Yuting
    Yu, Zhenhua
    Wu, Naiqi
    Li, Zhiwu
    Information Sciences, 2021, 562 : 398 - 413
  • [27] Supervisory Control of Discrete Event Systems in the Presence of Sensor and Actuator Attacks
    Wang, Yu
    Pajic, Miroslav
    2019 IEEE 58TH CONFERENCE ON DECISION AND CONTROL (CDC), 2019, : 5350 - 5355
  • [28] Supervisory control of discrete-event systems under external attacks
    Wang, Yi
    Li, Yuting
    Yu, Zhenhua
    Wu, Naiqi
    Li, Zhiwu
    INFORMATION SCIENCES, 2021, 562 : 398 - 413
  • [29] Using of Bond Graph for Mechatronics Systems
    Gmiterko, Alexander
    Vackova, Martina
    Virgala, Ivan
    2011 34TH INTERNATIONAL SPRING SEMINAR ON ELECTRONICS TECHNOLOGY (ISSE 2011) - NEW TRENDS IN MICRO/NANOTECHNOLOGY, 2011, : 369 - 373
  • [30] Quantized control for switched systems suffered by deception attacks and unknown disturbance
    Wu, Caizhang
    Yan, Jingjing
    Xia, Yuanqing
    INTERNATIONAL JOURNAL OF ROBUST AND NONLINEAR CONTROL, 2023, 33 (11) : 6392 - 6416