Detection of Perfect Stealthy Attacks on Cyber-Physical Systems Subject to Measurement Quantizations: A Watermark-Based Strategy

被引:0
|
作者
YuAng Wang [1 ,2 ]
Zidong Wang [3 ,4 ,5 ]
Lei Zou [3 ,1 ,2 ]
Bo Shen [3 ,1 ,2 ]
Hongli Dong [3 ,6 ,7 ,8 ]
机构
[1] the College of Information Science and Technology, Donghua University
[2] the Engineering Research Center of Digitalized Textile and Fashion Technology, Ministry of Education
[3] IEEE
[4] the College of Electrical Engineering and Automation,Shandong University of Science and Technology
[5] the Department of Computer Science, Brunel University London, Uxbridge
[6] the Sanya Offshore Oil and Gas Research Institute,Northeast Petroleum University
[7] the Artificial Intelligence Energy Research Institute, Northeast Petroleum University
[8] Heilongjiang Provincial Key Laboratory of Networking and Intelligent Control, Northeast Petroleum
关键词
D O I
暂无
中图分类号
TP393.08 [];
学科分类号
0839 ; 1402 ;
摘要
In this paper, the attack detection problem is investigated for a class of closed-loop systems subjected to unknownbutbounded noises in the presence of stealthy attacks. The measurement outputs from the sensors are quantized before transmission.A specific type of perfect stealthy attack, which meets certain rather stringent conditions, is taken into account. Such attacks could be injected by adversaries into both the sensor-toestimator and controller-to-actuator channels, with the aim of disrupting the normal data flow. For the purpose of defending against these perfect stealthy attacks, a novel scheme based on watermarks is developed. This scheme includes the injection of watermarks(applied to data prior to quantization) and the recovery of data(implemented before the data reaches the estimator).The watermark-based scheme is designed to be both timevarying and hidden from adversaries through incorporating a time-varying and bounded watermark signal. Subsequently, a watermark-based attack detection strategy is proposed which thoroughly considers the characteristics of perfect stealthy attacks,thereby ensuring that an alarm is activated upon the occurrence of such attacks. An example is provided to demonstrate the efficacy of the proposed mechanism for detecting attacks.
引用
收藏
页码:114 / 125
页数:12
相关论文
共 50 条
  • [41] Resilient Control for Cyber-Physical Systems Subject to Replay Attacks
    Franze, Giuseppe
    Tedesco, Francesco
    Lucia, Walter
    IEEE CONTROL SYSTEMS LETTERS, 2019, 3 (04): : 984 - 989
  • [42] Detection of Stealthy False Data Injection Attacks Against Cyber-Physical Systems: A Stochastic Coding Scheme
    GUO Haibin
    PANG Zhonghua
    SUN Jian
    LI Jun
    Journal of Systems Science & Complexity, 2022, 35 (05) : 1668 - 1684
  • [43] Detection of Stealthy False Data Injection Attacks Against Cyber-Physical Systems: A Stochastic Coding Scheme
    Haibin Guo
    Zhonghua Pang
    Jian Sun
    Jun Li
    Journal of Systems Science and Complexity, 2022, 35 : 1668 - 1684
  • [44] Optimal encryption strategy for cyber-physical systems against stealthy attacks with energy constraints: A Stackelberg game approach
    Liu, Xuan
    Yang, Guang-Hong
    INFORMATION SCIENCES, 2022, 610 : 674 - 693
  • [45] Completely stealthy attacks on cyber-physical system with parity space based monitoring
    Martynova, Dina
    Zhang, Ping
    2019 AMERICAN CONTROL CONFERENCE (ACC), 2019, : 4424 - 4429
  • [46] Resilient Control of Stochastic Cyber-Physical Systems Against Stealthy Attacks: Complex Dynamical Networks Encryption Strategy
    Wang, Jun-Lan
    Li, Xiao-Jian
    IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2025, 55 (02): : 1078 - 1091
  • [47] Coordinated Cyber Physical Attacks and Defense Strategy in Cyber-Physical Power Systems Based on Game Theory
    Yang, Jun
    Zhao, Yulong
    Dong, Chenchen
    JOURNAL OF ELECTRICAL ENGINEERING & TECHNOLOGY, 2025,
  • [48] Anomaly-Based Detection and Classification of Attacks in Cyber-Physical Systems
    Kreimel, Philipp
    Eigner, Oliver
    Tavolato, Paul
    PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2017), 2017,
  • [49] Detection and Localization of Stealthy Cyberattacks in Cyber-Physical Discrete Event Systems
    Fritz, Raphael
    Zhang, Ping
    IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2023, 68 (12) : 7895 - 7902
  • [50] Enhanced Anomaly Detector for Nonlinear Cyber-Physical Systems against Stealthy Integrity Attacks
    Zhang, Kangkang
    Polycarpou, Marios M.
    Parisini, Thomas
    IFAC PAPERSONLINE, 2020, 53 (02): : 13682 - 13687