Analysis of Stealthy False Data Injection Attacks Against Networked Control Systems: Three Case Studies

被引:17
|
作者
Pang, Zhonghua [1 ]
Fu, Yuan [1 ]
Guo, Haibin [2 ,3 ]
Sun, Jian [2 ,3 ]
机构
[1] North China Univ Technol, Natl Key Lab Autonomous Intelligent Unmanned Syst, Beijing 100144, Peoples R China
[2] Beijing Inst Technol, Sch Automation, Natl Key Lab Autonomous Intelligent Unmanned Syst, Beijing 100081, Peoples R China
[3] Beijing Inst Technol, Chongqing Innovat Ctr, Chongqing 401120, Peoples R China
基金
中国国家自然科学基金; 北京市自然科学基金;
关键词
False data injection attack; networked control systems (NCSs); stability; stealthiness; INTEGRITY ATTACKS; STATE ESTIMATION;
D O I
10.1007/s11424-022-2120-6
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
This paper mainly investigates the security problem of a networked control system based on a Kalman filter. A false data injection attack scheme is proposed to only tamper the measurement output, and its stealthiness and effects on system performance are analyzed under three cases of system knowledge held by an attacker and a defender. Firstly, it is derived that the proposed attack scheme is stealthy for a residual-based detector when the attacker and the defender hold the same accurate system knowledge. Secondly, it is proven that the proposed attack scheme is still stealthy even if the defender actively modifies the Kalman filter gain so as to make it different from that of the attacker. Thirdly, the stealthiness condition of the proposed attack scheme based on an inaccurate model is given. Furthermore, for each case, the instability conditions of the closed-loop system under attack are derived. Finally, simulation results are provided to test the proposed attack scheme.
引用
下载
收藏
页码:1407 / 1422
页数:16
相关论文
共 50 条
  • [21] Detection and Mitigation of False Data Injection Attacks for Secure Interactive Networked Control Systems
    Kubo, Ryogo
    2018 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SAFETY FOR ROBOTICS (ISR), 2018, : 7 - 12
  • [22] Optimal stealthy false data injection attacks in cyber-physical systems
    Li, Yi-Gang
    Yang, Guang-Hong
    INFORMATION SCIENCES, 2019, 481 : 474 - 490
  • [23] Elliptic Envelope Based Detection of Stealthy False Data Injection Attacks in Smart Grid Control Systems
    Ashrafuzzaman, Mohammad
    Das, Saikat
    Jillepalli, Ananth A.
    Chakhchoukh, Yacine
    Sheldon, Frederick T.
    2020 IEEE SYMPOSIUM SERIES ON COMPUTATIONAL INTELLIGENCE (SSCI), 2020, : 1131 - 1137
  • [24] Mitigating Stealthy False Data Injection Attacks Against State Estimation in Smart Grid
    Fan, Jingyao
    Khazbak, Youssef
    Tian, Jue
    Liu, Ting
    Cao, Guohong
    2018 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2018,
  • [25] Detection of Stealthy False Data Injection Attacks Against Cyber-Physical Systems: A Stochastic Coding Scheme
    Guo, Haibin
    Pang, Zhonghua
    Sun, Jian
    Li, Jun
    JOURNAL OF SYSTEMS SCIENCE & COMPLEXITY, 2022, 35 (05) : 1668 - 1684
  • [26] Detection of Stealthy False Data Injection Attacks Against Cyber-Physical Systems: A Stochastic Coding Scheme
    GUO Haibin
    PANG Zhonghua
    SUN Jian
    LI Jun
    Journal of Systems Science & Complexity, 2022, 35 (05) : 1668 - 1684
  • [27] Detection of Stealthy False Data Injection Attacks Against Cyber-Physical Systems: A Stochastic Coding Scheme
    Haibin Guo
    Zhonghua Pang
    Jian Sun
    Jun Li
    Journal of Systems Science and Complexity, 2022, 35 : 1668 - 1684
  • [28] Security Framework for Cloud Control Systems Against False Data Injection Attacks
    Zhao, Bing
    Zhang, Kexin
    Ogorzalek, Maciej
    Gao, Qing
    Lu, Jinhu
    2023 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS, ISCAS, 2023,
  • [29] Adaptive sliding-mode tracking control of networked control systems with false data injection attacks
    Li, Meng
    Chen, Yong
    Zhang, Yueyuan
    Liu, Yuezhi
    INFORMATION SCIENCES, 2022, 585 : 194 - 208
  • [30] Optimal Allocation of False Data Injection Attacks for Networked Control Systems With Two Communication Channels
    Guo, Li
    Yu, Hao
    Hao, Fei
    IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, 2021, 8 (01): : 2 - 14