76 research outputs found

    Vulnerability Analysis of Power System State Estimation

    Get PDF

    μƒ˜ν”Œ λ°μ΄ν„°λ‘œ ν‘œν˜„λ˜λŠ” 사이버-물리 μ‹œμŠ€ν…œμ˜ 취약점 뢄석 및 κ²€μΆœ λΆˆκ°€λŠ₯ν•œ 곡격에 λŒ€ν•œ λ°©μ–΄ 기법

    Get PDF
    ν•™μœ„λ…Όλ¬Έ (박사) -- μ„œμšΈλŒ€ν•™κ΅ λŒ€ν•™μ› : κ³΅κ³ΌλŒ€ν•™ 전기·정보곡학뢀, 2020. 8. μ‹¬ν˜•λ³΄.The rapid evolution of communication network and computation speed has led to the emergence of cyber-physical systems in which the traditional physical plants are controlled remotely using digital controllers. Unfortunately, however, the separation between the plant and controller with a network communication provides a new chance for external adversaries to intrude control systems, which are highly connected to human life and social infrastructures. For this reason, among various issues of the cyber-physical system, security problems have gained particular attention to control engineers these days. This dissertation presents new theoretical vulnerabilities undetectable from the conventional anomaly detector, which arise due to the mixture of continuous- and discrete-time components on cyber-physical systems, and addresses countermeasures against such vulnerabilities. Specific subjects dealt with in the dissertation are listed as follows: 1) Zero dynamics attacks can be lethal to cyber-physical systems because they can be harmful to physical plants and impossible to detect. Fortunately, if the given continuous-time physical system is minimum phase, the attack is not so effective even if it cannot be detected. However, the situation can become unfavorable if one uses digital control by sampling the sensor measurement and using a zero-order hold for actuation because of the `sampling zeros.' When the continuous-time system has a relative degree greater than two and the sampling period is small, the sampled-data system must have unstable zeros, so that the cyber-physical system becomes vulnerable to `sampling zero dynamics attack.' In this dissertation, we present an idea to neutralize the zero dynamics attack for single-input and single-output sampled-data systems by shifting the unstable discrete-time zeros into stable ones. This idea is realized by employing the so-called `generalized hold' which replaces a standard zero-order hold. It is shown that, under mild assumptions, a generalized hold exists which places the discrete-time zeros at desired positions. Furthermore, we formulate the design problem as an optimization problem whose performance index is related to the inter-sample behavior of the physical plant, and propose an optimal gain which alleviates the performance degradation caused by generalized hold as much as possible, and in order to verify the theoretical results, we apply the proposed strategy to a DC/DC converter with an electrical circuit. 2) The zero dynamics attack has usually been studied as a type of actuator attack, but it can harm the physical plant through the sensor network. Specifically, when the system monitors abnormal behavior of the plant using the anomaly detector (fault detector), one can generate zero dynamics attack on the sensor network deceiving the anomaly detector by regarding the output of the plant and residual of the anomaly detector as a new input and output of a target system. It is noticed that this sensor attack is not so effective when the plant is stable even if the attack is still undetectable. Noting this point, we propose to reexamine the generalized hold as a countermeasure against the undetectable sensor attack. That is, using the fact that the output feedback passing through the generalized hold can stabilize the unstable systems by selecting an appropriate hold function, we show that the plant can be safe from the undetectable sensor attack. Furthermore, to relieve the performance degradation of the use of generalized hold feedback, we employ a discrete-time linear quadratic regulator minimizing a continuous-time cost function. 3) In the sampled-data framework, most anomaly detectors monitor the plant's output only at discrete time instants. Consequently, abnormal behavior between sampling instants cannot be detected if output behaves normally at every sampling instant. This implies that if an actuator attack drives the plant's state to pass through the kernel of the output matrix at each sensing time, then the attack compromises the system while remaining stealthy. This type of attack is always constructible when the sampled-data system has an input redundancy, i.e., the number of inputs being larger than that of outputs and/or the sampling rate of the actuators being higher than that of the sensors. Simulation results for the X-38 vehicle and other numerical examples illustrate this new attack strategy may result in disastrous consequences.디지털 μž₯μΉ˜λ“€μ˜ μ—°μ‚° 속도와 λ„€νŠΈμ›Œν¬ 전솑 μ†λ„μ˜ 급진적인 λ°œμ „μœΌλ‘œ 고전적인 μ œμ–΄ μ‹œμŠ€ν…œμ΄ λ„€νŠΈμ›Œν¬λ₯Ό 톡해 μ›κ²©μœΌλ‘œ μ œμ–΄λ˜λŠ” 사이버-물리 μ‹œμŠ€ν…œ(cyber-physical systems)이 λ“±μž₯ν•˜κΈ° μ‹œμž‘ν–ˆλ‹€. μ΄λŸ¬ν•œ 사이버-물리 μ‹œμŠ€ν…œμ€ μ œμ–΄κΈ°μ™€ μ œμ–΄ λŒ€μƒμ˜ λΆ„λ¦¬λΌλŠ” νŠΉμ„±μƒ μ™ΈλΆ€μ˜ μ•…μ˜μ μΈ κ³΅κ²©μ‹ ν˜Έλ‘œ λΆ€ν„° 곡격당할 수 μžˆλŠ” 잠재적인 μœ„ν—˜μ— λ…ΈμΆœλ˜μ–΄ 있으며 νŒŒμ›Œν”ŒλžœνŠΈμ˜ μ›κ²©κ°μ‹œμ œμ–΄(SCADA, Supervisory Control And Data Acquisition)와 같은 μ‚¬νšŒ 기반 μ‹œμ„€κ³Όλ„ λ°€μ ‘ν•œ 연관이 μžˆμ–΄ κ·Έ λ³΄μ•ˆμ„±μ— κ΄€ν•œ μ—°κ΅¬μ˜ ν•„μš”μ„±μ΄ κ°•μ‘°λ˜κ³  μžˆλ‹€. λ³Έ 논문은 사이버-물리 μ‹œμŠ€ν…œμ΄ μ—°μ†μ‹œκ°„μœΌλ‘œ 이루어진 물리 ν”ŒλžœνŠΈ(physical plant)와 디지털 μ œμ–΄κΈ°λ‘œ 이루어져 μžˆλ‹€λŠ” μ‚¬μ‹€λ‘œλΆ€ν„° 이λ₯Ό μ˜μ°¨ν™€λ“œ(zero-order hold)와 μƒ˜ν”ŒλŸ¬(sampler)둜 이산화(discretize)λ˜λŠ” μƒ˜ν”Œ-데이터 μ‹œμŠ€ν…œμœΌλ‘œ ν‘œν˜„ν•˜κ³ , μ—°μ†μ‹œκ°„κ³Ό μ΄μ‚°μ‹œκ°„μ˜ κ²°ν•©μœΌλ‘œ λΆ€ν„° λ°œμƒν•  수 μžˆλŠ” 사이버 곡격에 λŒ€ν•œ 이둠적인 취약점을 λΆ„μ„ν•˜κ³  그에 λŒ€ν•œ 해결책을 μ œμ‹œν•œλ‹€. ꡬ체적으둜 λ³Έ λ…Όλ¬Έμ—μ„œλŠ” λ‹€μŒμ˜ μ„Έ 가지 μ£Όμ œλ“€μ„ 닀룬닀. 첫 번째둜, λ³Έ 논문은 μ‹œμŠ€ν…œμ˜ λΆˆμ•ˆμ •ν•œ(unstable) 영점(zero)의 정보λ₯Ό μ΄μš©ν•˜μ—¬ μž…λ ₯ λ„€νŠΈμ›Œν¬λ₯Ό 톡해 μ£Όμž…λ  경우 κ²€μΆœλΆˆκ°€λŠ₯(undetectable)ν•œ μ˜λ™μ—­ν•™ 곡격(zero dynamics attack)이 μƒ˜ν”Œ 데이터 μ‹œμŠ€ν…œμ—μ„œ λ°œμƒν•˜λŠ” μƒ˜ν”Œλ§ 영점(sampling zero)을 μ΄μš©ν•˜μ—¬λ„ κ°€λŠ₯ν•˜λ‹€λŠ” 점을 λ°νžŒλ‹€. 그리고 μ˜μ°¨ν™€λ“œ λŒ€μ‹  μΌλ°˜ν™”λœ ν™€λ“œ(generalized hold)λ₯Ό μ΄μš©ν•  경우 μ΄μ‚°μ‹œκ°„ μ‹œμŠ€ν…œμ˜ μ΄μ‚°μ‹œκ°„ μ˜μ μ„ λͺ¨λ‘ μ•ˆμ •ν•œ(stable)ν•œ μ˜μ—­μœΌλ‘œ ν• λ‹Ήν•  수 μžˆλ‹€λŠ” 사싀에 κ·Όκ±°ν•˜μ—¬ μ˜λ™μ—­ν•™ 곡격에 λŒ€ν•œ 근본적인 λŒ€μ‘μ±…μœΌλ‘œ μ˜μ°¨ν™€λ“œλ₯Ό μΌλ°˜ν™”λœ ν™€λ“œλ‘œ λŒ€μ²΄ν•˜λŠ” λ°©μ•ˆμ„ μ œμ•ˆν•œλ‹€. μΆ”κ°€μ μœΌλ‘œ, μΌλ°˜ν™”λœ ν™€λ“œλ₯Ό μ΄μš©ν•  경우 λ°œμƒν•˜λŠ” μ„±λŠ₯μ €ν•˜λ₯Ό μ΅œμ†Œν™” ν•˜κΈ° μœ„ν•΄ 볼둝(convex) μ΅œμ ν™” 문제둜 μΌλ°˜ν™”λœ ν™€λ“œλ₯Ό μ„€κ³„ν•˜λŠ” 방법을 μ œμ‹œν•œλ‹€. λ‹€λ₯Έ ν•œνŽΈ, μ΄μ‚°μ‹œκ°„ μ‹œμŠ€ν…œμ˜ 좜λ ₯ μ„Όμ„œ λ„€νŠΈμ›Œν¬λ₯Ό μž…λ ₯ 그리고 κ³ μž₯ κ²€μΆœκΈ°(fault detector)의 μž”μ—¬μ‹ ν˜Έ(residual)λ₯Ό 좜λ ₯으둜 ν•˜λŠ” μ‹œμŠ€ν…œμ˜ μ˜λ™μ—­ν•™μ„ μ΄μš©ν•˜μ—¬ κ²€μΆœ λΆˆκ°€λŠ₯ν•œ μ„Όμ„œ 곡격이 κ°€λŠ₯함을 보이고, 이에 λŒ€ν•œ ν•΄κ²°μ±…μœΌλ‘œ μ΄μ‚°μ‹œκ°„ 좜λ ₯ λΆ€ν„° μ—°μ†μ‹œκ°„ μž…λ ₯κΉŒμ§€ μΌλ°˜ν™”λœ ν™€λ“œλ₯Ό μ΄μš©ν•œ ν”Όλ“œλ°± 루프λ₯Ό μΆ”κ°€ν•˜μ—¬ 곡격의 효과λ₯Ό λ¬΄νš¨ν™”ν•˜λŠ” 방법을 μ œμ•ˆν•œλ‹€. λ˜ν•œ μ΄λŸ¬ν•œ ν”Όλ“œλ°± λ£¨ν”„λ‘œ μΈν•œ μ œμ–΄ μ„±λŠ₯ μ €ν•˜λ₯Ό μ΅œμ†Œν™”ν•˜κΈ° μœ„ν•΄ μ—°μ†μ‹œκ°„ λΉ„μš©ν•¨μˆ˜λ₯Ό μ΅œμ†Œν™”ν•˜λŠ” μ΄μ‚°μ‹œκ°„ 졜적 μ œμ–΄κΈ°λ²•μ˜ μ΄μš©μ„ μ œμ•ˆν•œλ‹€. λ§ˆμ§€λ§‰μœΌλ‘œ, μ˜μ°¨ν™€λ“œμ™€ μƒ˜ν”ŒλŸ¬μ˜ λ™μž‘μ£ΌκΈ°κ°€ 같지 μ•Šμ€ 닀쀑 μž…μΆœλ ₯(MIMO) μƒ˜ν”Œ-데이터 μ‹œμŠ€ν…œμ„ μŒ“μΈ μ‹œμŠ€ν…œ(lifted system)으둜 ν‘œν˜„μŒ“μ„ λ•Œ 좜λ ₯λŒ€λΉ„ μž…λ ₯ μ—¬μœ λΆ„μ΄ λ§Žμ„ 경우, μž…λ ₯ λ„€νŠΈμ›Œν¬λ₯Ό ν†΅ν•˜μ—¬ κ²€μΆœ λΆˆκ°€λŠ₯ν•œ 곡격을 κ°€λŠ₯ν•˜κ²Œ ν•˜λŠ” 좩뢄쑰건을 μ°Ύκ³ , 이λ₯Ό ν™œμš©ν•˜μ—¬ κ³΅κ²©μ‹ ν˜Έλ₯Ό μƒμ„±ν•˜λŠ” 섀계법을 μ œμ•ˆν•œλ‹€.1 Introduction 1 1.1 Overview of Security Issues on Cyber-Physical Systems 1 1.2 Contributions and Outline of Dissertation 4 1.3 Preliminary: Characterization of detectable and undetectable attacks 8 2 Use of Generalized Hold in Sampled-data Systems to Counteract Zero Dynamics Attack 13 2.1 Zero Dynamics Attack with Normal Form 13 2.1.1 Continuous-time Linear Systems 13 2.1.2 Sampled-data Linear Systems 16 2.1.3 Simulation Result: Zero Dynamics Attack on Sampling Zeros 18 2.1.4 Existing Countermeasures Against Zero Dynamics Attack 19 2.2 Optimal Generalized Hold Function to Neutralize Zero Dynamics Attack 22 2.2.1 Shifting discrete-time zeros by generalized hold 23 2.2.2 Design of optimal generalized hold function with security guaranteed 27 2.2.3 Simulation Results: Effect of Optimal Generalized Hold 34 2.3 Illustrative Example for Closed-loop System 36 2.4 Experiment: DC/DC Converter with Electrical Circuit 39 2.4.1 Simulation Results 43 2.4.2 Experiment Results 44 2.5 Study on the Effect of Generalized Hold on Intrinsic Zeros of Nonlinear Systems under Fast Sampling 47 3 Use of Generalized Hold Feedback in Sampled-data Systems to Counteract Zero-dynamics Sensor Attack 57 3.1 Undetectable Sensor Attack and its lethality 57 3.1.1 Construction of Zero Dynamics Sensor Attack 58 3.1.2 Simulation Results: Magnetic Levitation of a Steel Ball 61 3.2 Strategy to Neutralize Zero Dynamics Sensor Attack and Relieve Performance Degradation 63 3.2.1 Employing the generalized hold feedback to neutralize zero dynamics sensor attack 64 3.2.2 Simulation Results: Effectiveness of the Generalized Hold 69 3.2.3 DLQR under Consideration of Inter-sample Behavior 71 3.2.4 Simulation Results: Effectiveness of DLQR with Continuous-time Performance Index 77 4 Masking Attack for Sampled-data System via Input Redundancy 79 4.1 Problem Formulation 79 4.2 Design of Masking Attack with Zero-stealthy and Disruptive Properties 83 4.2.1 Clustering the Time Frame 86 4.2.2 Conditions for Masking Attack Design 90 4.2.3 Off-line Construction of Attack Signal 93 4.2.4 Practical Stealthiness of Masking Attack with R \in R 97 4.3 Simulation Results 99 4.3.1 Numerical Example: R = 1 with Ξ΄ = 0 99 4.3.2 X-38 Vehicle: R = 4 with Ξ΄ = 0 102 4.3.3 Numerical Example: R = 0.4 with Ξ΄ = 0.75 105 5 Conclusion of Dissertation 111 BIBLIOGRAPHY 113 ꡭ문초둝 121Docto

    Comprehensive Survey and Taxonomies of False Injection Attacks in Smart Grid: Attack Models, Targets, and Impacts

    Full text link
    Smart Grid has rapidly transformed the centrally controlled power system into a massively interconnected cyber-physical system that benefits from the revolutions happening in the communications (e.g. 5G) and the growing proliferation of the Internet of Things devices (such as smart metres and intelligent electronic devices). While the convergence of a significant number of cyber-physical elements has enabled the Smart Grid to be far more efficient and competitive in addressing the growing global energy challenges, it has also introduced a large number of vulnerabilities culminating in violations of data availability, integrity, and confidentiality. Recently, false data injection (FDI) has become one of the most critical cyberattacks, and appears to be a focal point of interest for both research and industry. To this end, this paper presents a comprehensive review in the recent advances of the FDI attacks, with particular emphasis on 1) adversarial models, 2) attack targets, and 3) impacts in the Smart Grid infrastructure. This review paper aims to provide a thorough understanding of the incumbent threats affecting the entire spectrum of the Smart Grid. Related literature are analysed and compared in terms of their theoretical and practical implications to the Smart Grid cybersecurity. In conclusion, a range of technical limitations of existing false data attack research is identified, and a number of future research directions is recommended.Comment: Double-column of 24 pages, prepared based on IEEE Transaction articl

    State of the art of cyber-physical systems security: An automatic control perspective

    Get PDF
    Cyber-physical systems are integrations of computation, networking, and physical processes. Due to the tight cyber-physical coupling and to the potentially disrupting consequences of failures, security here is one of the primary concerns. Our systematic mapping study sheds light on how security is actually addressed when dealing with cyber-physical systems from an automatic control perspective. The provided map of 138 selected studies is defined empirically and is based on, for instance, application fields, various system components, related algorithms and models, attacks characteristics and defense strategies. It presents a powerful comparison framework for existing and future research on this hot topic, important for both industry and academia
    • …
    corecore