Replay Attack Detection Method Based on Auxiliary Information Compensation and Control Signal Coding

被引:0
|
作者
Zhang Z.-D. [1 ,2 ]
Yang J.-J. [1 ]
Xie L.-B. [1 ,2 ]
机构
[1] College of Internet of Things Engineering, Jiangnan University, Wuxi
[2] Engineering Research Center of Internet of Things Applied Technology, Ministry of Education, Jiangnan University, Wuxi
来源
关键词
attack detection; control signal coding; Cyber physical system (CPS); replay attack;
D O I
10.16383/j.aas.c210092
中图分类号
学科分类号
摘要
Adding coding signal to the optimal control signal is an effective method to detect the replay attack in cyber physical systems (CPSs), which always causes loss of system control performance. How to reduce the sacrifice of system control performance and guarantee the detection rate of replay attack is a valuable problem to be studied. In this paper, a control signal coding detection scheme has been proposed based on auxiliary information compensation. By adding auxiliary signal to the system measurements, the influence of the coding signal on the optimal state estimation has been compensated. Firstly, the detectability of replay attack under the proposed scheme is proved, and the quantitative relationship between the upper bound of the detection rate and the threshold of the detection function is derived. Secondly, it is demonstrated that the control signal generated by the controller after adding auxiliary signal is the same as the control signal without coding signal. Therefore, the historical coding signal does not effect the system cumulatively. The loss of system control performance at current moment is only related to the size of the current coding signal. Finally, the relationship between the covariance matrix of the coding signal, the detection rate and the detection threshold is expressed as an optimization problem, through which the variance of the coding signal can be derived. Simulation results show that the attack can be effectively detected throught the proposed scheme, while the loss in the corresponding system control performance is relatively smaller. © 2023 Science Press. All rights reserved.
引用
收藏
页码:1508 / 1518
页数:10
相关论文
共 21 条
  • [1] Liu Ting, Tian Jue, Wang Jia-Zhou, Wu Hong-Yu, Sun Li-Min, Zhou Ya-Dong, Et al., Integrated security threats and defense of cyber-physical systems, Acta Automatica Sinica, 45, 1, pp. 5-24, (2019)
  • [2] Li Hong-Yang, Wei Mu-Heng, Huang Jie, Qiu Bo-Hua, Zhao Ye, Luo Wen-Cheng, Et al., Survey on cyber-physical systems, Acta Automatica Sinica, 45, 1, (2019)
  • [3] Kumar C, Marston S, Sen R., Cyber-physical systems security: State of the art and research opportunities for information systems academics, Communications of the Association for Information Systems, 47, pp. 678-696, (2020)
  • [4] Dibaji S M, Pirani M, Flamholz D B, Annaswamy A M, Johansson K H, Chakrabortty A., A systems and control perspective of CPS security, Annual Reviews in Control, 47, pp. 394-411, (2019)
  • [5] Humayed A, Lin J Q, Li F J, Luo B., Cyber-physical systems security —— A survey, IEEE Internet of Things Journal, 4, 6, pp. 1802-1831, (2017)
  • [6] Ding D R, Han Q L, Xiang Y, Ge X H, Zhang X M., A survey on security control and attack detection for industrial cyber-physical systems, Neurocomputing, 275, pp. 1674-1683, (2018)
  • [7] Mousavinejad E, Yang F W, Han Q L, Vlacic L., A novel cyber attack detection method in networked control systems, IEEE Transactions on Cybernetics, 48, 11, pp. 3254-3264, (2018)
  • [8] Teixeira A, Shames I, Sandberg H, Johansson K H., A secure control framework for resource-limited adversaries, Automatica, 51, pp. 135-148, (2015)
  • [9] Zhang H, Cheng P, Shi L, Chen J M., Optimal DoS attack scheduling in wireless networked control system, IEEE Transactions on Control Systems Technology, 24, 3, pp. 843-852, (2016)
  • [10] Peng Da-Tian, Dong Jian-Min, Cai Zhong-Min, Zhang Chang-Qing, Peng Qin-Ke, On the stability of cyber-physical systems under false data injection attacks, Acta Automatica Sinica, 45, 1, pp. 196-205, (2019)