Modern Cyber-Physical Systems (CPSs) are often designed as networked, software-based controller implementations which have been found to be vulnerable to network-level and physical level attacks. A number of research works have proposed CPS-specific attack detection schemes as well as techniques for attack resilient controller design. However, such schemes also incur platform-level overheads. In this regard, some recent works have leveraged the use of skips in control execution to enhance the resilience of a CPS against false data injection (FDI) attacks. In this paper, we provide an analytical discussion on when and how skipping a control execution can improve the resilience of the system against FDI attacks while maintaining the control performance requirement. We also propose a methodology to synthesize such optimal control execution patterns. To the best of our knowledge, no previous work has provided any quantitative analysis about the trade-off between attack resilience and control performance for such aperiodic control execution. Finally, we evaluate the proposed method on several safety-critical CPS benchmarks.
翻译:现代网络物理系统(CPS)通常设计成网络化的、以软件为基础的控制器实施,发现这些操作在网络层面和物理层面上很容易受到攻击,一些研究工作提出了CPS特定攻击探测办法以及攻击弹性控制器设计技术,但是,这种计划也产生了平台一级的间接费用。在这方面,最近的一些工作利用了在控制执行中的跳板来提高CPS对虚假数据注入攻击的抗御能力。在本文件中,我们提供了一次分析性讨论,说明在保持控制性要求的同时,跳过控制执行可以何时和如何提高系统对外国直接投资攻击的抗御能力。我们还提出了一个综合这种最佳控制执行模式的方法。据我们所知,以前没有就攻击性攻击性应力与控制性能之间的权衡提供任何定量分析。最后,我们评估了几项安全临界的CPS基准的拟议方法。