Completely Stealthy FDI Attack Against State Estimation in Networked Control Systems

被引:11
|
作者
Liu, Yifa [1 ,2 ]
Cheng, Long [1 ,2 ,3 ]
机构
[1] Chinese Acad Sci, Inst Automat, State Key Lab Management & Control Complex Syst, Beijing, Peoples R China
[2] Univ Chinese Acad Sci, Sch Artificial Intelligence, Beijing 100049, Peoples R China
[3] Peng Cheng Lab, Dept Math & Theories, Shenzhen 518055, Peoples R China
基金
中国国家自然科学基金; 北京市自然科学基金;
关键词
False data injection attack; estimation; complete stealthiness; detection; networked control systems; DATA INJECTION ATTACKS; SECURITY;
D O I
10.1109/TCSII.2022.3217132
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
An effective false data injection attack should cause enough damage to the system while avoiding being spotted by detection methods. This brief proposes an extremely stealthy attack strategy, which can make the residual almost always unchanged to invalidate both the widely used ?(2) detector and the advanced summation detector and can eventually cause unbound state deviations. Compared with the existing attack methods, the proposed attack strategy can reduce the sum of cumulative residual increments by 85.39% while causing 9817001 times of the state deviations in the numerical simulations.
引用
收藏
页码:1114 / 1118
页数:5
相关论文
共 50 条
  • [41] State estimation and control for networked control systems in the presence of correlated packet drops
    Rajagopal, Ayyappadas
    Chitraganti, Shaikshavali
    INTERNATIONAL JOURNAL OF SYSTEMS SCIENCE, 2023, 54 (11) : 2352 - 2365
  • [42] Attack-Resilient Control Against FDI Attacks in Cyber-Physical Systems
    Bo Chen
    Yawen Tan
    Zhe Sun
    Li Yu
    IEEE/CAA Journal of Automatica Sinica, 2022, 9 (06) : 1099 - 1102
  • [43] Attack Models and Scenarios for Networked Control Systems
    Teixeira, Andre
    Perez, Daniel
    Sandberg, Henrik
    Johansson, Karl H.
    HICONS 12: PROCEEDINGS OF THE 1ST ACM INTERNATIONAL CONFERENCE ON HIGH CONFIDENCE NETWORKED SYSTEMS, 2012, : 55 - 64
  • [44] Detection of stealthy false data injection attacks against networked control systems via active data modification
    Pang, Zhong-Hua
    Fan, Lan-Zhi
    Sun, Jian
    Liu, Kun
    Liu, Guo-Ping
    INFORMATION SCIENCES, 2021, 546 : 192 - 205
  • [45] Attack Frequency Estimation of Networked Control Systems under Denial of Service with Energy Constraints
    Sun, Hongtao
    Peng, Chen
    He, Wangli
    Wang, Zhiwen
    IECON 2017 - 43RD ANNUAL CONFERENCE OF THE IEEE INDUSTRIAL ELECTRONICS SOCIETY, 2017, : 4301 - 4306
  • [46] Optimal Stealthy Attack on Cyber-Physical Systems and Its Application to a Networked PMSM System
    Zhang, Xiao-Guang
    Yang, Guang-Hong
    Ren, Xiu-Xiu
    IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2023, 70 (06) : 6295 - 6304
  • [47] Data Security Transmission Mechanism in Industrial Networked Control Systems against Deception Attack
    Deng, Zulan
    Xie, Lun
    Rong, Yu
    Li, Weize
    Jin, Liangchen
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (04): : 391 - 403
  • [48] Optimal Stealthy Joint Attacks Against Distributed State Estimation in Cyber-Physical Systems
    Su, Guangzhen
    Liu, Kun
    Wang, Haojun
    Zhang, Qirui
    Xia, Yuanqing
    IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, 2024, 11 (03): : 1597 - 1609
  • [49] Networked State Estimation of MIMO Systems
    Rong, Baoyue
    Shi, Ling
    Qiu, Li
    2012 12TH INTERNATIONAL CONFERENCE ON CONTROL, AUTOMATION, ROBOTICS & VISION (ICARCV), 2012, : 424 - 429
  • [50] Optimal Attack Strategy Against Wireless Networked Control Systems With Proactive Channel Hopping
    Gan, Ruimeng
    Xiao, Yue
    Shao, Jinliang
    Zhang, Heng
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2020, 16 (04) : 2436 - 2446