Detection of Stealthy False Data Injection Attacks Against Cyber-Physical Systems: A Stochastic Coding Scheme

被引:9
|
作者
Guo, Haibin [1 ,2 ]
Pang, Zhonghua [3 ]
Sun, Jian [1 ,2 ]
Li, Jun [4 ]
机构
[1] Beijing Inst Technol, Sch Automat, State Key Lab Intelligent Control & Decis Complex, Beijing 100081, Peoples R China
[2] Beijing Inst Technol, Chongqing Innovat Ctr, Chongqing 401120, Peoples R China
[3] North China Univ Technol, Key Lab Fieldbus Technol & Automat Beijing, Beijing 100144, Peoples R China
[4] China Ind Control Syst Cyber Emergency Response T, Beijing 100040, Peoples R China
基金
国家重点研发计划; 北京市自然科学基金; 中国国家自然科学基金;
关键词
Attack detection; cyber-physical systems (CPSs); stealthy FDI attacks; stochastic coding; INTEGRITY ATTACKS; PREDICTIVE CONTROL; STATE ESTIMATION;
D O I
10.1007/s11424-022-1005-z
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
This paper, from the view of a defender, addresses the security problem of cyber-physical systems (CPSs) subject to stealthy false data injection (FDI) attacks that cannot be detected by a residual-based anomaly detector without other defensive measures. To detect such a class of FDI attacks, a stochastic coding scheme, which codes the sensor measurement with a Gaussian stochastic signal at the sensor side, is proposed to assist an anomaly detector to expose the FDI attack. In order to ensure the system performance in the normal operational context, a decoder is adopted to decode the coded sensor measurement when received at the controller side. With this detection scheme, the residual under the attack can be significantly different from that in the normal situation, and thus trigger an alarm. The design condition of the coding signal covariance is derived to meet the constraints of false alarm rate and attack detection rate. To minimize the trace of the coding signal covariance, the design problem of the coding signal is converted into a constraint non-convex optimization problem, and an estimation-optimization iteration algorithm is presented to obtain a numerical solution of the coding signal covariance. A numerical example is given to verify the effectiveness of the proposed scheme.
引用
收藏
页码:1668 / 1684
页数:17
相关论文
共 50 条
  • [1] Detection of Stealthy False Data Injection Attacks Against Cyber-Physical Systems: A Stochastic Coding Scheme
    GUO Haibin
    PANG Zhonghua
    SUN Jian
    LI Jun
    Journal of Systems Science & Complexity, 2022, 35 (05) : 1668 - 1684
  • [2] Detection of Stealthy False Data Injection Attacks Against Cyber-Physical Systems: A Stochastic Coding Scheme
    Haibin Guo
    Zhonghua Pang
    Jian Sun
    Jun Li
    Journal of Systems Science and Complexity, 2022, 35 : 1668 - 1684
  • [3] Stochastic Stealthy False Data Injection Attacks Against Cyber-Physical Systems
    Liu, Ruirui
    Yu, Hao
    Hao, Fei
    IEEE SYSTEMS JOURNAL, 2022, 16 (04): : 6009 - 6020
  • [4] Optimal stealthy false data injection attacks in cyber-physical systems
    Li, Yi-Gang
    Yang, Guang-Hong
    INFORMATION SCIENCES, 2019, 481 : 474 - 490
  • [5] Coding Schemes for Securing Cyber-Physical Systems Against Stealthy Data Injection Attacks
    Miao, Fei
    Zhu, Quanyan
    Pajic, Miroslav
    Pappas, George J.
    IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, 2017, 4 (01): : 106 - 117
  • [6] Worst-case ε-stealthy false data injection attacks in cyber-physical systems
    Li, Yi-Gang
    Yang, Guang-Hong
    INFORMATION SCIENCES, 2020, 515 : 352 - 364
  • [7] Stealthy False Data Injection Attacks Detection and Classification in Cyber-Physical Systems Using Deep Reinforcement Learning
    Xin, Liang
    He, Guang
    Long, Zhiqiang
    IEEE TRANSACTIONS ON AUTOMATION SCIENCE AND ENGINEERING, 2025, 22 : 141 - 153
  • [8] Collaborative Detection Method against False Data Injection Attacks in Microgrid Cyber-Physical Systems
    Xia, Zhuoqun
    Lin, Kai
    Tan, Jingjing
    Hui, Zhenzhen
    PROCEEDINGS OF THE 2024 27 TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN, CSCWD 2024, 2024, : 2406 - 2411
  • [9] Datadriven false data injection attacks against cyber-physical power systems
    Tian, Jiwei
    Wang, Buhong
    Li, Jing
    Konstantinou, Charalambos
    COMPUTERS & SECURITY, 2022, 121
  • [10] Design of False Data Injection Attacks in Cyber-Physical Systems
    Padhan, Sushree
    Turuk, Ashok Kumar
    INFORMATION SCIENCES, 2022, 608 : 825 - 843