Detection of Perfect Stealthy Attacks on Cyber-Physical Systems Subject to Measurement Quantizations: A Watermark-Based Strategy

被引:0
|
作者
YuAng Wang [1 ,2 ]
Zidong Wang [3 ,4 ,5 ]
Lei Zou [3 ,1 ,2 ]
Bo Shen [3 ,1 ,2 ]
Hongli Dong [3 ,6 ,7 ,8 ]
机构
[1] the College of Information Science and Technology, Donghua University
[2] the Engineering Research Center of Digitalized Textile and Fashion Technology, Ministry of Education
[3] IEEE
[4] the College of Electrical Engineering and Automation,Shandong University of Science and Technology
[5] the Department of Computer Science, Brunel University London, Uxbridge
[6] the Sanya Offshore Oil and Gas Research Institute,Northeast Petroleum University
[7] the Artificial Intelligence Energy Research Institute, Northeast Petroleum University
[8] Heilongjiang Provincial Key Laboratory of Networking and Intelligent Control, Northeast Petroleum
关键词
D O I
暂无
中图分类号
TP393.08 [];
学科分类号
0839 ; 1402 ;
摘要
In this paper, the attack detection problem is investigated for a class of closed-loop systems subjected to unknownbutbounded noises in the presence of stealthy attacks. The measurement outputs from the sensors are quantized before transmission.A specific type of perfect stealthy attack, which meets certain rather stringent conditions, is taken into account. Such attacks could be injected by adversaries into both the sensor-toestimator and controller-to-actuator channels, with the aim of disrupting the normal data flow. For the purpose of defending against these perfect stealthy attacks, a novel scheme based on watermarks is developed. This scheme includes the injection of watermarks(applied to data prior to quantization) and the recovery of data(implemented before the data reaches the estimator).The watermark-based scheme is designed to be both timevarying and hidden from adversaries through incorporating a time-varying and bounded watermark signal. Subsequently, a watermark-based attack detection strategy is proposed which thoroughly considers the characteristics of perfect stealthy attacks,thereby ensuring that an alarm is activated upon the occurrence of such attacks. An example is provided to demonstrate the efficacy of the proposed mechanism for detecting attacks.
引用
收藏
页码:114 / 125
页数:12
相关论文
共 50 条
  • [1] Detection of Perfect Stealthy Attacks on Cyber-Physical Systems Subject to Measurement Quantizations: A Watermark-Based Strategy
    Wang, Yu-Ang
    Wang, Zidong
    Zou, Lei
    Shen, Bo
    Dong, Hongli
    IEEE-CAA JOURNAL OF AUTOMATICA SINICA, 2025, 12 (01) : 114 - 125
  • [2] Revisiting a Watermark-based Detection Scheme to Handle Cyber-Physical Attacks
    Rubio-Hernan, Jose
    De Cicco, Luca
    Garcia-Alfaro, Joaquin
    PROCEEDINGS OF 2016 11TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, (ARES 2016), 2016, : 21 - 28
  • [3] On the use of watermark-based schemes to detect cyber-physical attacks
    Rubio-Hernan J.
    De Cicco L.
    Garcia-Alfaro J.
    EURASIP Journal on Information Security, 2017 (1)
  • [4] Stealthy Deception Attacks for Cyber-Physical Systems
    Goes, Romulo Meira
    Kang, Eunsuk
    Kwong, Raymond
    Lafortune, Stephane
    2017 IEEE 56TH ANNUAL CONFERENCE ON DECISION AND CONTROL (CDC), 2017,
  • [5] Watermark-Based Proactive Defense Strategy Design for Cyber-Physical Systems With Unknown-but-Bounded Noises
    Liu, Hao
    Li, Yuzhe
    Han, Qing-Long
    Raissi, Tarek
    IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2023, 68 (06) : 3300 - 3315
  • [6] Detection and Performance Compensation for Linear ?-Stealthy Attacks in Cyber-Physical Systems
    Li, Pengyu
    Ye, Dan
    IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, 2023, 10 (03): : 1338 - 1349
  • [7] A Defensive Strategy for Integrity Detection in Cyber-Physical Systems Subject to Deception Attacks
    Ren, Xinwei
    Liang, Jinling
    Liu, Qingshan
    2020 10TH INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND TECHNOLOGY (ICIST), 2020, : 241 - 246
  • [8] Robust Stealthy Covert Attacks on Cyber-Physical Systems
    Li, Xuerong
    Zhang, Ping
    Dong, Hongli
    IFAC PAPERSONLINE, 2022, 55 (06): : 520 - 525
  • [9] Stealthy Local Covert Attacks on Cyber-Physical Systems
    Mikhaylenko, Dina
    Zhang, Ping
    IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2022, 67 (12) : 6778 - 6785
  • [10] Stealthy Local Covert Attacks on Cyber-Physical Systems
    Mikhaylenko, Dina
    Zhang, Ping
    2020 AMERICAN CONTROL CONFERENCE (ACC), 2020, : 2568 - 2573