Cyber Security of Water SCADA Systems-Part II: Attack Detection Using Enhanced Hydrodynamic Models

被引:124
作者
Amin, Saurabh [1 ]
Litrico, Xavier [2 ]
Sastry, S. Shankar [3 ]
Bayen, Alexandre M. [3 ,4 ]
机构
[1] MIT, Dept Civil & Environm Engn, Cambridge, MA 02139 USA
[2] Lyonnaise Eaux, Ctr Res & Dev, F-33300 Bordeaux, France
[3] Univ Calif Berkeley, Dept Elect Engn & Comp Sci, Berkeley, CA 94720 USA
[4] Univ Calif Berkeley, Dept Civil & Environm Engn, Berkeley, CA 94720 USA
关键词
Delay systems; fault diagnosis; intrusion detection; supervisory control and data acquisition (SCADA) systems; supervisory control; UNKNOWN INPUT OBSERVERS; TIME-DELAY SYSTEMS; IRRIGATION; LOCALIZATION; LEAK;
D O I
10.1109/TCST.2012.2211874
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper investigates the problem of detection and isolation of attacks on a water distribution network comprised of cascaded canal pools. The proposed approach employs a bank of delay-differential observer systems. The observers are based on an analytically approximate model of canal hydrodynamics. Each observer is insensitive to one fault/attack mode and sensitive to other modes. The design of the observers is achieved by using a delay-dependent linear matrix inequality method. The performance of our model-based diagnostic scheme is tested on a class of adversarial scenarios based on a generalized fault/attack model. This model represents both classical sensor-actuator faults and communication network-induced deception attacks. Our particular focus is on stealthy deception attacks in which the attacker's goal is to pilfer water through canal offtakes. Our analysis reveals the benefits of accurate hydrodynamic models in detecting physical faults and cyber attacks to automated canal systems. We also comment on the criticality of sensor measurements for the purpose of detection. Finally, we discuss the knowledge and effort required for a successful deception attack.
引用
收藏
页码:1679 / 1693
页数:15
相关论文
共 28 条
[1]  
Aamo O.M., 2006, International Symposium on Advanced Control of Chemical Processes, P53
[2]  
Amin S., 2012, IEEE T CONT IN PRESS
[3]   Stealthy Deception Attacks on Water SCADA Systems [J].
Amin, Saurabh ;
Litrico, Xavier ;
Sastry, S. Shankar ;
Bayen, Alexandre M. .
HSSC 10: PROCEEDINGS OF THE 13TH ACM INTERNATIONAL CONFERENCE ON HYBRID SYSTEMS: COMPUTATION AND CONTROL, 2010, :161-170
[4]  
[Anonymous], HACKERS PENETRATE WA
[5]  
[Anonymous], 2011, P 6 ACM S INF COMP C, DOI DOI 10.1145/1966913.1966959
[6]  
[Anonymous], 1993, INTRO FUNCTIONAL DIF, DOI 10.1007/978-1-4612-4342-7
[7]  
Attorney U., 2007, Willows man arrested for hacking into Tehama Colusa Canal Authority computer system
[8]  
Basseville M, 1993, DETECTION ABRUPT CHA
[9]   Static and Dynamic Data Reconciliation for an Irrigation Canal [J].
Bedjaoui, N. ;
Litrico, X. ;
Koenig, D. ;
Ribot-Bruno, J. ;
Malaterre, P. -O. .
JOURNAL OF IRRIGATION AND DRAINAGE ENGINEERING, 2008, 134 (06) :778-787
[10]   H∞ observer for time-delay systems -: Application to FDI for irrigation canals [J].
Bedjaoui, N. ;
Litrico, X. ;
Koenig, D. ;
Malaterre, P. O. .
PROCEEDINGS OF THE 45TH IEEE CONFERENCE ON DECISION AND CONTROL, VOLS 1-14, 2006, :532-+