Detection of Stealthy False Data Injection Attacks Against Cyber-Physical Systems: A Stochastic Coding Scheme

被引:9
|
作者
Guo, Haibin [1 ,2 ]
Pang, Zhonghua [3 ]
Sun, Jian [1 ,2 ]
Li, Jun [4 ]
机构
[1] Beijing Inst Technol, Sch Automat, State Key Lab Intelligent Control & Decis Complex, Beijing 100081, Peoples R China
[2] Beijing Inst Technol, Chongqing Innovat Ctr, Chongqing 401120, Peoples R China
[3] North China Univ Technol, Key Lab Fieldbus Technol & Automat Beijing, Beijing 100144, Peoples R China
[4] China Ind Control Syst Cyber Emergency Response T, Beijing 100040, Peoples R China
基金
国家重点研发计划; 北京市自然科学基金; 中国国家自然科学基金;
关键词
Attack detection; cyber-physical systems (CPSs); stealthy FDI attacks; stochastic coding; INTEGRITY ATTACKS; PREDICTIVE CONTROL; STATE ESTIMATION;
D O I
10.1007/s11424-022-1005-z
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
This paper, from the view of a defender, addresses the security problem of cyber-physical systems (CPSs) subject to stealthy false data injection (FDI) attacks that cannot be detected by a residual-based anomaly detector without other defensive measures. To detect such a class of FDI attacks, a stochastic coding scheme, which codes the sensor measurement with a Gaussian stochastic signal at the sensor side, is proposed to assist an anomaly detector to expose the FDI attack. In order to ensure the system performance in the normal operational context, a decoder is adopted to decode the coded sensor measurement when received at the controller side. With this detection scheme, the residual under the attack can be significantly different from that in the normal situation, and thus trigger an alarm. The design condition of the coding signal covariance is derived to meet the constraints of false alarm rate and attack detection rate. To minimize the trace of the coding signal covariance, the design problem of the coding signal is converted into a constraint non-convex optimization problem, and an estimation-optimization iteration algorithm is presented to obtain a numerical solution of the coding signal covariance. A numerical example is given to verify the effectiveness of the proposed scheme.
引用
收藏
页码:1668 / 1684
页数:17
相关论文
共 50 条
  • [31] Detection of False-Data Injection Attacks in Cyber-Physical DC Microgrids
    Beg, Omar Ali
    Johnson, Taylor T.
    Davoudi, Ali
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2017, 13 (05) : 2693 - 2703
  • [32] iAttackGen: Generative Synthesis of False Data Injection Attacks in Cyber-physical Systems
    Shahriar, Md Hasan
    Khalil, Alvi Ataur
    Rahman, Mohammad Ashiqur
    Manshaei, Mohammad Hossein
    Chen, Dong
    2021 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2021, : 200 - 208
  • [33] A technique to detect and mitigate false data injection attacks in Cyber-Physical Systems
    Padhan, Sushree
    Turuk, Ashok Kumar
    COMPUTERS & SECURITY, 2025, 150
  • [34] Security Analysis for Cyber-Physical Systems against Stealthy Deception Attacks
    Kwon, Cheolhyeon
    Liu, Weiyi
    Hwang, Inseok
    2013 AMERICAN CONTROL CONFERENCE (ACC), 2013, : 3344 - 3349
  • [35] Reachable Set Control for Cyber-Physical Systems with False Data Injection Attacks
    Fan, Xiu-Yang
    Lin, Wen-Juan
    2023 IEEE 6TH INTERNATIONAL CONFERENCE ON INDUSTRIAL CYBER-PHYSICAL SYSTEMS, ICPS, 2023,
  • [36] Security control scheme for cyber-physical sstem with a complex network in physical layer against false data injection attacks
    Zhao, Younan
    Gu, Peng
    Zhu, Fanglai
    Liu, Tianyi
    Shen, Runjie
    APPLIED MATHEMATICS AND COMPUTATION, 2023, 447
  • [37] Design of Stealthy Attacks Against Interval Estimation for Cyber-Physical Systems
    Li, Zhi-Hui
    Yang, Guang-Hong
    IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2024, 11 (02): : 2215 - 2222
  • [38] Event-based secure control for cyber-physical systems against false data injection attacks
    Li, Jinyan
    Li, Xiao-Meng
    Cheng, Zhijian
    Ren, Hongru
    Li, Hongyi
    INFORMATION SCIENCES, 2024, 679
  • [39] Complete stealthiness false data injection attacks against dynamic state estimation in cyber-physical systems
    Yang, Guang-Yuan
    Li, Xiao-Jian
    Information Sciences, 2022, 586 : 408 - 423
  • [40] Complete stealthiness false data injection attacks against dynamic state estimation in cyber-physical systems
    Yang, Guang-Yuan
    Li, Xiao-Jian
    INFORMATION SCIENCES, 2022, 586 : 408 - 423