Quickest physical watermarking-based detection of measurement replacement attacks in networked control systems

被引:0
|
作者
Naha, Arunava [1 ]
Teixeira, Andre [2 ]
Ahlen, Anders [1 ]
Dey, Subhrakanti [1 ]
机构
[1] Uppsala Univ, Elect Engn, Uppsala, Sweden
[2] Uppsala Univ, Dept Informat Technol, Uppsala, Sweden
基金
瑞典研究理事会;
关键词
CUSUM test; Cyber-physical system; Deception attack; Linear quadratic gaussian control; Networked control system; Physical watermarking; DATA INJECTION ATTACKS; COMPLETE STEALTHINESS; INTEGRITY ATTACKS;
D O I
10.1016/j.ejcon.2023.100804
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we propose and analyze an attack detection scheme for securing the physical layer of a net-worked control system (NCS) with a wireless sensor network against attacks where the adversary replaces the true observations with stationary false data. An independent and identically distributed watermark-ing signal is added to the optimal linear quadratic Gaussian (LQG) control inputs, and a cumulative sum (CUSUM) test is carried out using the joint distribution of the innovation signal and the watermarking signal for quickest attack detection. We derive the expressions of the supremum of the average detec-tion delay (SADD) for a multi-input and multi-output (MIMO) system under the optimal and sub-optimal CUSUM tests. The SADD is asymptotically inversely proportional to the expected Kullback-Leibler diver-gence (KLD) under certain conditions. The expressions for the MIMO case are simplified for multi-input and single-output systems and explored further to distil design insights. We provide insights into the design of an optimal watermarking signal to maximize KLD for a given fixed increase in LQG control cost when there is no attack. Furthermore, we investigate how the attacker and the control system de-signer can accomplish their respective objectives by changing the relative power of the attack signal and the watermarking signal. Simulations and numerical studies are carried out to validate the theoretical results.(c) 2023 The Author(s). Published by Elsevier Ltd on behalf of European Control Association. This is an open access article under the CC BY-NC-ND license ( http://creativecommons.org/licenses/by-nc-nd/4.0/ )
引用
收藏
页数:18
相关论文
共 50 条
  • [1] A Novel Dynamic Watermarking-Based Attack Detection Method for Uncertain Networked Control Systems
    Zhang, Changda
    Du, Dajun
    Zhang, Jingfan
    Fei, Minrui
    Rakic, Aleksandar
    [J]. IEEE INTERNATIONAL CONFERENCE ON RECENT ADVANCES IN SYSTEMS SCIENCE AND ENGINEERING (IEEE RASSE 2021), 2021,
  • [2] Sequential Detection of Deception Attacks in Networked Control Systems with Watermarking
    Salimi, Somayeh
    Dey, Subhrakanti
    Ahlen, Anders
    [J]. 2019 18TH EUROPEAN CONTROL CONFERENCE (ECC), 2019, : 883 - 890
  • [3] Quickest detection of deception attacks on cyber-physical systems with a parsimonious watermarking policy
    Naha, Arunava
    Teixeira, Andre M. H.
    Ahlen, Anders
    Dey, Subhrakanti
    [J]. AUTOMATICA, 2023, 155
  • [4] Switching Watermarking-based Detection Scheme Against Replay Attacks
    Zhai, Lijing
    Vamvoudakis, Kyriakos G.
    Hugues, Jerome
    [J]. 2021 60TH IEEE CONFERENCE ON DECISION AND CONTROL (CDC), 2021, : 4200 - 4205
  • [5] Security weakness of dynamic watermarking-based detection for generalised replay attacks
    Zhang, Changda
    Du, Dajun
    Sun, Qing
    Li, Xue
    Rakic, Aleksandar
    Fei, Minrui
    [J]. INTERNATIONAL JOURNAL OF SYSTEMS SCIENCE, 2022, 53 (05) : 948 - 966
  • [6] Dynamic Watermarking-based Defense of Transportation Cyber-physical Systems
    Ko, Woo-Hyun
    Satchidanandan, Bharadwaj
    Kumar, P. R.
    [J]. ACM TRANSACTIONS ON CYBER-PHYSICAL SYSTEMS, 2020, 4 (01)
  • [7] Joint Watermarking-Based Replay Attack Detection for Industrial Process Operation Optimization Cyber-Physical Systems
    Yang, Chunyu
    Chu, Zhong
    Ma, Lei
    Wang, Guoqing
    Dai, Wei
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2023, 19 (08) : 8910 - 8922
  • [8] A Watermarking-based Host Correlation Detection Scheme
    Pan, Zheng
    Peng, Hong
    Long, Xianzhong
    Zhang, Changle
    Wu, Ying
    [J]. ICMECG: 2009 INTERNATIONAL CONFERENCE ON MANAGEMENT OF E-COMMERCE AND E-GOVERNMENT, PROCEEDINGS, 2009, : 493 - 497
  • [9] Cyber-Physical Attacks Detection in Networked Control Systems with Limited Communication Bandwidth
    Mousavinejad, Eman
    Yang, Fuwen
    Han, Qing-Long
    Vlacic, Ljubo
    [J]. 2017 AUSTRALIAN AND NEW ZEALAND CONTROL CONFERENCE (ANZCC), 2017, : 53 - 58
  • [10] Resilient Control for Networked Control Systems Subject to Cyber/Physical Attacks
    Taouba Rhouma
    Karim Chabir
    Mohamed Naceur Abdelkrim
    [J]. International Journal of Automation and Computing, 2018, 15 (03) : 345 - 354