Detection of Stealthy False Data Injection Attacks Against Cyber-Physical Systems: A Stochastic Coding Scheme

被引:9
|
作者
Guo, Haibin [1 ,2 ]
Pang, Zhonghua [3 ]
Sun, Jian [1 ,2 ]
Li, Jun [4 ]
机构
[1] Beijing Inst Technol, Sch Automat, State Key Lab Intelligent Control & Decis Complex, Beijing 100081, Peoples R China
[2] Beijing Inst Technol, Chongqing Innovat Ctr, Chongqing 401120, Peoples R China
[3] North China Univ Technol, Key Lab Fieldbus Technol & Automat Beijing, Beijing 100144, Peoples R China
[4] China Ind Control Syst Cyber Emergency Response T, Beijing 100040, Peoples R China
基金
国家重点研发计划; 北京市自然科学基金; 中国国家自然科学基金;
关键词
Attack detection; cyber-physical systems (CPSs); stealthy FDI attacks; stochastic coding; INTEGRITY ATTACKS; PREDICTIVE CONTROL; STATE ESTIMATION;
D O I
10.1007/s11424-022-1005-z
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
This paper, from the view of a defender, addresses the security problem of cyber-physical systems (CPSs) subject to stealthy false data injection (FDI) attacks that cannot be detected by a residual-based anomaly detector without other defensive measures. To detect such a class of FDI attacks, a stochastic coding scheme, which codes the sensor measurement with a Gaussian stochastic signal at the sensor side, is proposed to assist an anomaly detector to expose the FDI attack. In order to ensure the system performance in the normal operational context, a decoder is adopted to decode the coded sensor measurement when received at the controller side. With this detection scheme, the residual under the attack can be significantly different from that in the normal situation, and thus trigger an alarm. The design condition of the coding signal covariance is derived to meet the constraints of false alarm rate and attack detection rate. To minimize the trace of the coding signal covariance, the design problem of the coding signal is converted into a constraint non-convex optimization problem, and an estimation-optimization iteration algorithm is presented to obtain a numerical solution of the coding signal covariance. A numerical example is given to verify the effectiveness of the proposed scheme.
引用
收藏
页码:1668 / 1684
页数:17
相关论文
共 50 条
  • [21] A Novel En-route Filtering Scheme against False Data Injection Attacks in Cyber-Physical Networked Systems
    Yang, Xinyu
    Lin, Jie
    Moulema, Paul
    Yu, Wei
    Fu, Xinwen
    Zhao, Wei
    2012 IEEE 32ND INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS), 2012, : 92 - 101
  • [22] Distributed Attack Detection and Secure Estimation of Networked Cyber-Physical Systems Against False Data Injection Attacks and Jamming Attacks
    Guan, Yanpeng
    Ge, Xiaohua
    IEEE TRANSACTIONS ON SIGNAL AND INFORMATION PROCESSING OVER NETWORKS, 2018, 4 (01): : 48 - 59
  • [23] On Applying Fault Detectors against False Data Injection Attacks in Cyber-Physical Control Systems
    Quyen Dinh Vu
    Tan, Rui
    Yau, David K. Y.
    IEEE INFOCOM 2016 - THE 35TH ANNUAL IEEE INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS, 2016,
  • [24] Probability-Based Stochastic Stealthy Attacks in Cyber-Physical Systems
    Ye, Dan
    Liu, Xiaoke
    Li, Pengyu
    IEEE SYSTEMS JOURNAL, 2024, 18 (02): : 1288 - 1295
  • [25] False data injection attacks detection based on Laguerre function in nonlinear Cyber-Physical systems
    Li, Hongran
    Xia, Yu
    Ke, Jiacheng
    Lv, Tieli
    Zhang, Heng
    Zhong, Zhaoman
    Zhang, Jian
    INTERNET TECHNOLOGY LETTERS, 2023, 6 (03)
  • [26] Detection of false data injection attacks in cyber-physical systems using graph convolutional network
    Vincent, Edeh
    Korki, Mehdi
    Seyedmahmoudian, Mehdi
    Stojcevski, Alex
    Mekhilef, Saad
    ELECTRIC POWER SYSTEMS RESEARCH, 2023, 217
  • [27] Real-Time Detection of Cyber-Physical False Data Injection Attacks on Power Systems
    Zhou, Tailin
    Xiahou, Kaishun
    Zhang, L. L.
    Wu, Q. H.
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2021, 17 (10) : 6810 - 6819
  • [28] An Output-Coding-Based Detection Scheme Against Replay Attacks in Cyber-Physical Systems
    Guo, Haibin
    Pang, Zhong-Hua
    Sun, Jian
    Li, Jun
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-EXPRESS BRIEFS, 2021, 68 (10) : 3306 - 3310
  • [29] Stealthy Deception Attacks for Cyber-Physical Systems
    Goes, Romulo Meira
    Kang, Eunsuk
    Kwong, Raymond
    Lafortune, Stephane
    2017 IEEE 56TH ANNUAL CONFERENCE ON DECISION AND CONTROL (CDC), 2017,
  • [30] DDAF: Deceptive Data Acquisition Framework against Stealthy Attacks in Cyber-Physical Systems
    Shahriar, Md Hasan
    Rahman, Mohammad Ashiqur
    Haque, Nur Imtiazul
    Chowdhury, Badrul
    2021 IEEE 45TH ANNUAL COMPUTERS, SOFTWARE, AND APPLICATIONS CONFERENCE (COMPSAC 2021), 2021, : 725 - 734