Detection of Perfect Stealthy Attacks on Cyber-Physical Systems Subject to Measurement Quantizations: A Watermark-Based Strategy

被引:0
|
作者
YuAng Wang [1 ,2 ]
Zidong Wang [3 ,4 ,5 ]
Lei Zou [3 ,1 ,2 ]
Bo Shen [3 ,1 ,2 ]
Hongli Dong [3 ,6 ,7 ,8 ]
机构
[1] the College of Information Science and Technology, Donghua University
[2] the Engineering Research Center of Digitalized Textile and Fashion Technology, Ministry of Education
[3] IEEE
[4] the College of Electrical Engineering and Automation,Shandong University of Science and Technology
[5] the Department of Computer Science, Brunel University London, Uxbridge
[6] the Sanya Offshore Oil and Gas Research Institute,Northeast Petroleum University
[7] the Artificial Intelligence Energy Research Institute, Northeast Petroleum University
[8] Heilongjiang Provincial Key Laboratory of Networking and Intelligent Control, Northeast Petroleum
关键词
D O I
暂无
中图分类号
TP393.08 [];
学科分类号
0839 ; 1402 ;
摘要
In this paper, the attack detection problem is investigated for a class of closed-loop systems subjected to unknownbutbounded noises in the presence of stealthy attacks. The measurement outputs from the sensors are quantized before transmission.A specific type of perfect stealthy attack, which meets certain rather stringent conditions, is taken into account. Such attacks could be injected by adversaries into both the sensor-toestimator and controller-to-actuator channels, with the aim of disrupting the normal data flow. For the purpose of defending against these perfect stealthy attacks, a novel scheme based on watermarks is developed. This scheme includes the injection of watermarks(applied to data prior to quantization) and the recovery of data(implemented before the data reaches the estimator).The watermark-based scheme is designed to be both timevarying and hidden from adversaries through incorporating a time-varying and bounded watermark signal. Subsequently, a watermark-based attack detection strategy is proposed which thoroughly considers the characteristics of perfect stealthy attacks,thereby ensuring that an alarm is activated upon the occurrence of such attacks. An example is provided to demonstrate the efficacy of the proposed mechanism for detecting attacks.
引用
收藏
页码:114 / 125
页数:12
相关论文
共 50 条
  • [21] Detection of Stealthy Cyber-Physical Line Disconnection Attacks in Smart Grid
    James Ranjith Kumar, R.
    Sikdar, Biplab
    IEEE TRANSACTIONS ON SMART GRID, 2021, 12 (05) : 4484 - 4493
  • [22] A Moving Target Defense to Detect Stealthy Attacks in Cyber-Physical Systems
    Giraldo, J.
    Cardenas, A.
    Sanfelice, R. G.
    2019 AMERICAN CONTROL CONFERENCE (ACC), 2019, : 391 - 396
  • [23] Security Analysis for Cyber-Physical Systems against Stealthy Deception Attacks
    Kwon, Cheolhyeon
    Liu, Weiyi
    Hwang, Inseok
    2013 AMERICAN CONTROL CONFERENCE (ACC), 2013, : 3344 - 3349
  • [24] Optimal stealthy false data injection attacks in cyber-physical systems
    Li, Yi-Gang
    Yang, Guang-Hong
    INFORMATION SCIENCES, 2019, 481 : 474 - 490
  • [25] Design of Stealthy Attacks Against Interval Estimation for Cyber-Physical Systems
    Li, Zhi-Hui
    Yang, Guang-Hong
    IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2024, 11 (02): : 2215 - 2222
  • [26] On the Performance Degradation of Cyber-Physical Systems Under Stealthy Integrity Attacks
    Mo, Yilin
    Sinopoli, Bruno
    IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2016, 61 (09) : 2618 - 2624
  • [27] Optimal Stealthy Innovation-Based Attacks With Historical Data in Cyber-Physical Systems
    Li, Yi-Gang
    Yang, Guang-Hong
    IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2021, 51 (06): : 3401 - 3411
  • [28] Comparison of Corrupted Sensor Data Detection Methods in Detecting Stealthy Attacks on Cyber-Physical Systems
    Sabaliauskaite, Giedre
    Ng, Geok See
    Ruths, Justin
    Mathur, Aditya
    2017 IEEE 22ND PACIFIC RIM INTERNATIONAL SYMPOSIUM ON DEPENDABLE COMPUTING (PRDC 2017), 2017, : 235 - 244
  • [29] Cost-Effective Watermark Based Detector for Replay Attacks on Cyber-Physical Systems
    Fang, Chongrong
    Qi, Yifei
    Cheng, Peng
    Zheng, Wei Xing
    2017 11TH ASIAN CONTROL CONFERENCE (ASCC), 2017, : 940 - 945
  • [30] Detection of Replay Attacks in Cyber-Physical Systems
    Hoehn, Andreas
    Zhang, Ping
    2016 AMERICAN CONTROL CONFERENCE (ACC), 2016, : 290 - 295