Analysis of Stealthy False Data Injection Attacks Against Networked Control Systems: Three Case Studies

被引:17
|
作者
Pang, Zhonghua [1 ]
Fu, Yuan [1 ]
Guo, Haibin [2 ,3 ]
Sun, Jian [2 ,3 ]
机构
[1] North China Univ Technol, Natl Key Lab Autonomous Intelligent Unmanned Syst, Beijing 100144, Peoples R China
[2] Beijing Inst Technol, Sch Automation, Natl Key Lab Autonomous Intelligent Unmanned Syst, Beijing 100081, Peoples R China
[3] Beijing Inst Technol, Chongqing Innovat Ctr, Chongqing 401120, Peoples R China
基金
中国国家自然科学基金; 北京市自然科学基金;
关键词
False data injection attack; networked control systems (NCSs); stability; stealthiness; INTEGRITY ATTACKS; STATE ESTIMATION;
D O I
10.1007/s11424-022-2120-6
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
This paper mainly investigates the security problem of a networked control system based on a Kalman filter. A false data injection attack scheme is proposed to only tamper the measurement output, and its stealthiness and effects on system performance are analyzed under three cases of system knowledge held by an attacker and a defender. Firstly, it is derived that the proposed attack scheme is stealthy for a residual-based detector when the attacker and the defender hold the same accurate system knowledge. Secondly, it is proven that the proposed attack scheme is still stealthy even if the defender actively modifies the Kalman filter gain so as to make it different from that of the attacker. Thirdly, the stealthiness condition of the proposed attack scheme based on an inaccurate model is given. Furthermore, for each case, the instability conditions of the closed-loop system under attack are derived. Finally, simulation results are provided to test the proposed attack scheme.
引用
下载
收藏
页码:1407 / 1422
页数:16
相关论文
共 50 条
  • [11] Security Analysis of Stochastic Networked Control Systems under False Data Injection Attacks
    Hu, Liang
    Wang, Zidong
    Naeem, Wasif
    2016 UKACC 11TH INTERNATIONAL CONFERENCE ON CONTROL (CONTROL), 2016,
  • [12] Detection and Mitigation of False Data Injection Attacks in Networked Control Systems
    Sargolzaei, Arman
    Yazdani, Kasra
    Abbaspour, Alireza
    Crane, Carl D., III
    Dixon, Warren E.
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2020, 16 (06) : 4281 - 4292
  • [13] A Blockchain-Based Approach to Secure Networked Control Systems Against False Data Injection Attacks
    Mohamed, Mohamed Vall Ould
    JOURNAL OF ELECTRICAL ENGINEERING & TECHNOLOGY, 2023, 18 (03) : 2335 - 2342
  • [14] A Blockchain-Based Approach to Secure Networked Control Systems Against False Data Injection Attacks
    Mohamed vall Ould Mohamed
    Journal of Electrical Engineering & Technology, 2023, 18 : 2335 - 2342
  • [15] Two-Channel False Data Injection Attacks Against Output Tracking Control of Networked Systems
    Pang, Zhong-Hua
    Liu, Guo-Ping
    Zhou, Donghua
    Hou, Fangyuan
    Sun, Dehui
    IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2016, 63 (05) : 3242 - 3251
  • [16] A Novel Control Architecture for the Detection of False Data Injection Attacks in Networked Control Systems
    Ghaderi, Mohsen
    Gheitasi, Kian
    Lucia, Walter
    2019 AMERICAN CONTROL CONFERENCE (ACC), 2019, : 139 - 144
  • [17] Worst-case ε-stealthy false data injection attacks in cyber-physical systems
    Li, Yi-Gang
    Yang, Guang-Hong
    INFORMATION SCIENCES, 2020, 515 : 352 - 364
  • [18] Stealthy False Data Injection Attacks against State Estimation in Power Systems: Switching Network Topologies
    Wang, Shaocheng
    Ren, Wei
    2014 AMERICAN CONTROL CONFERENCE (ACC), 2014,
  • [19] Stealthy false data injection attacks with resource constraints against multi-sensor estimation systems
    Guo, Haibin
    Sun, Jian
    Pang, Zhong-Hua
    ISA TRANSACTIONS, 2022, 127 : 32 - 40
  • [20] False data injection attacks for networked control systems with sensor fault and actuator saturation
    Geng, Qing
    Liu, Fucai
    Li, Yafeng
    IFAC PAPERSONLINE, 2020, 53 (02): : 2556 - 2561