Abstract
Introduction
Problem Formulation
Main Results
Numerical Example
Conclusion
Abstract
Cyber-physical systems (CPSs) are a class of systems integrating cyber and physical components, and their security issues have gained a lot of attention in recent years. CPSs are modeled as hybrid systems in this letter since the logical and physical behaviors of CPS can be mapped to the discrete-state and continuous-state dynamics of the hybrid system, respectively. Motivated by the importance of situation awareness in an adversarial environment, we consider the mode distinguishability problem for a class of hybrid systems that can describe compromised CPSs. It is found that even though some modes of the hybrid system may not be distinguishable without knowing the attack inputs, the modes could be controlled distinguishable, which means their behaviors can be differentiated under certain control inputs. In this letter, the characterization of controlled distinguishability is studied, and the problem of finding control inputs for mode identification is proposed. Index Terms—Hybrid systems, switched systems.
Introduction
NOWADAYS, critical systems are increasingly interwoven with cyber components for high-level automation and intelligence. However, the close interaction between the physical process and the cyber components makes cyber-physical systems (CPSs) vulnerable to cyber-attacks, which has been brought to the attention of researchers [1], [2], [3]. A CPS commonly has multiple modes of operation such that internal and/or external variations can be accommodated [4], and thus the behavior of a CPS is not only governed by its physical dynamics but also the logic command that decides the mode of operation. Therefore, a hybrid systems approach is a powerful tool for modeling and analyzing a CPS [5] as the cyber-physical coupling of CPS can be represented by the interaction between the discrete-state and continuous-state dynamics of the hybrid system. In the hybrid system framework, both the switching attack that maliciously alters the operational mode and the data injection attack that falsifies the control signal can be considered simultaneously for cybersecurity.