期刊论文详细信息
CAAI Transactions on Intelligence Technology
Abusive adversarial agents and attack strategies in cyber-physical systems
article
Viraj Singh Gaur1  Vishal Sharma1  John McAllister1 
[1] School of Electronics, Electrical Engineering and Computer Science, Queen's University Belfast
关键词: intelligent systems;    security;    security evaluation;   
DOI  :  10.1049/cit2.12171
学科分类:数学(综合)
来源: Wiley
PDF
【 摘 要 】

The exponential increase in IoT device usage has spawned numerous cyberspace innovations. IoT devices, sensors, and actuators bridge the gap between physical processes and the cyber network in a cyber-physical system (CPS). Cyber-physical system is a complex system from a security perspective due to the heterogeneous nature of its components and the fact that IoT devices can serve as an entry point for cyberattacks. Most adversaries design their attack strategies on systems to gain an advantage at a relatively lower cost, whereas abusive adversaries initiate an attack to inflict maximum damage without regard to cost or reward. In this paper, a sensor spoofing attack is modelled as a malicious adversary attempting to cause system failure by interfering with the feedback control mechanism. It is accomplished by feeding spoofed sensor values to the controller and issuing erroneous commands to the actuator. Experiments on a Simulink-simulated linear CPS support the proof of concept for the proposed abusive ideology, demonstrating three attack strategies. The impact of the evaluations stresses the importance of testing the CPS security against adversaries with abusive settings for preventing cyber-vandalism. Finally, the research concludes by highlighting the limitations of the proposed work, followed by recommendations for the future.

【 授权许可】

CC BY|CC BY-ND|CC BY-NC|CC BY-NC-ND   

【 预 览 】
附件列表
Files Size Format View
RO202307080005185ZK.pdf 1515KB PDF download
  文献评价指标  
  下载次数:4次 浏览次数:2次