Committee members: Grover, Pulkit; Rowe, Anthony; Sandberg, Henrik
یادداشتهای مربوط به نشر، بخش و غیره
متن يادداشت
Place of publication: United States, Ann Arbor; ISBN=978-1-321-50259-6
یادداشتهای مربوط به پایان نامه ها
جزئيات پايان نامه و نوع درجه آن
Ph.D.
نظم درجات
Electrical and Computer Engineering
کسي که مدرک را اعطا کرده
Carnegie Mellon University
امتياز متن
2014
یادداشتهای مربوط به خلاصه یا چکیده
متن يادداشت
A SCADA system employing the distributed networks of sensors and actuators that interact with the physical environment is vulnerable to attacks that target the interface between the cyber and physical subsystems. An attack that hijacks the sensors in an attempt to provide false readings to the controller (for example, the Stuxnet worm that targeted Iran's nuclear centrifuges) can be used to feign normal system operation for the control system, while the attacker can hijack the actuators to send the system beyond its safety range. This thesis extends the results of a previously proposed method. The original method proposed addition of a randomized "watermarking" signal and checking for the presence of this signal and its effects in the received sensor measurements. Since the control inputs traverse the cyberphysical boundary and make their effects apparent in the sensor measurements, they are employed to carry this watermarking signal through to the system and back to the SCADA controller. The sensor measurements are compared to the expected measurements (calculated using a suitably delayed model of the system within the controller). This methodology is based on using the statistics of the linear system and its controller. The inclusion of a randomized signal on the control inputs induces an increase in the performance cost of the physical system. This thesis proposes a method of optimization of the watermarking signal based on the trade-off between this performance cost and the attack detection rate, by leveraging the distribution the watermarking signal over multiple inputs and multiple outputs. It is further proved that regardless of the number of inputs and outputs in the system, only one watermarking signal needs to be generated. This optimization, and its necessity in improving the effectiveness of the detector without detriment to the performance cost, are demonstrated on a simulated chemical plant. The thesis also proposes another methodology that does not rely on these statistics, but is instead based on calculating the correlation between the received sensor measurements and the expected measurements accrued from the model inside the controller.
موضوع (اسم عام یاعبارت اسمی عام)
موضوع مستند نشده
Computer Engineering; Electrical engineering
اصطلاحهای موضوعی کنترل نشده
اصطلاح موضوعی
Applied sciences;Control inputs;Cyberphysical systems;Secure control;Watermarking signal
نام شخص به منزله سر شناسه - (مسئولیت معنوی درجه اول )