Modeling and Analyzing Periodic Sensor-Reading Modification Attacks in Cyber-Physical Systems

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Wireless networks in a cyber-physical system can be vulnerable to periodic attacks that are commonly employed by energy-constrained intruders to compromise a system. In this work, we investigate a class of periodic attacks, termed periodic sensor-reading modification attacks, where events transmitted over sensor channels can be maliciously altered. First, we construct models for such attacks and analyze the system behavior under attacks. Then, we specifically study periodic sensor-reading modification attacks in a fault diagnosis scenario. A case study involving an unmanned aerial vehicle system illustrates how such attacks interfere with fault diagnosis accuracy. Furthermore, we design an algorithm to derive stealthy and successful strategies to prevent operators from identifying a fault in finite observations.

Original languageEnglish (US)
Title of host publication2025 IEEE 34th Wireless and Optical Communications Conference, WOCC 2025
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages203-208
Number of pages6
ISBN (Electronic)9798331539283
DOIs
StatePublished - 2025
Event34th IEEE Wireless and Optical Communications Conference, WOCC 2025 - Macao, China
Duration: May 20 2025May 22 2025

Publication series

Name2025 IEEE 34th Wireless and Optical Communications Conference, WOCC 2025

Conference

Conference34th IEEE Wireless and Optical Communications Conference, WOCC 2025
Country/TerritoryChina
CityMacao
Period5/20/255/22/25

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications
  • Instrumentation
  • Atomic and Molecular Physics, and Optics

Keywords

  • Cyber-physical systems
  • cyber security
  • discrete event systems
  • fault diagnosis
  • periodic attacks

Fingerprint

Dive into the research topics of 'Modeling and Analyzing Periodic Sensor-Reading Modification Attacks in Cyber-Physical Systems'. Together they form a unique fingerprint.

Cite this