Detection of Stealthy False Data Injection Attacks Against Cyber-Physical Systems: A Stochastic Coding Scheme

被引:9
|
作者
Guo, Haibin [1 ,2 ]
Pang, Zhonghua [3 ]
Sun, Jian [1 ,2 ]
Li, Jun [4 ]
机构
[1] Beijing Inst Technol, Sch Automat, State Key Lab Intelligent Control & Decis Complex, Beijing 100081, Peoples R China
[2] Beijing Inst Technol, Chongqing Innovat Ctr, Chongqing 401120, Peoples R China
[3] North China Univ Technol, Key Lab Fieldbus Technol & Automat Beijing, Beijing 100144, Peoples R China
[4] China Ind Control Syst Cyber Emergency Response T, Beijing 100040, Peoples R China
基金
国家重点研发计划; 北京市自然科学基金; 中国国家自然科学基金;
关键词
Attack detection; cyber-physical systems (CPSs); stealthy FDI attacks; stochastic coding; INTEGRITY ATTACKS; PREDICTIVE CONTROL; STATE ESTIMATION;
D O I
10.1007/s11424-022-1005-z
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
This paper, from the view of a defender, addresses the security problem of cyber-physical systems (CPSs) subject to stealthy false data injection (FDI) attacks that cannot be detected by a residual-based anomaly detector without other defensive measures. To detect such a class of FDI attacks, a stochastic coding scheme, which codes the sensor measurement with a Gaussian stochastic signal at the sensor side, is proposed to assist an anomaly detector to expose the FDI attack. In order to ensure the system performance in the normal operational context, a decoder is adopted to decode the coded sensor measurement when received at the controller side. With this detection scheme, the residual under the attack can be significantly different from that in the normal situation, and thus trigger an alarm. The design condition of the coding signal covariance is derived to meet the constraints of false alarm rate and attack detection rate. To minimize the trace of the coding signal covariance, the design problem of the coding signal is converted into a constraint non-convex optimization problem, and an estimation-optimization iteration algorithm is presented to obtain a numerical solution of the coding signal covariance. A numerical example is given to verify the effectiveness of the proposed scheme.
引用
收藏
页码:1668 / 1684
页数:17
相关论文
共 50 条
  • [41] Window-type detector for stealthy false data injection attack in cyber-physical systems
    Ning, Chuanyi
    Xi, Zhiyu
    INTERNATIONAL JOURNAL OF SYSTEMS SCIENCE, 2023, 54 (07) : 1602 - 1615
  • [42] Detection and Performance Compensation for Linear ?-Stealthy Attacks in Cyber-Physical Systems
    Li, Pengyu
    Ye, Dan
    IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, 2023, 10 (03): : 1338 - 1349
  • [43] An Active Detection Strategy Based on Dimensionality Reduction for False Data Injection Attacks in Cyber-Physical Systems
    Attar, Mehran
    Lucia, Walter
    IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, 2023, 10 (04): : 1844 - 1854
  • [44] Security correction control of stochastic cyber-physical systems subject to false data injection attacks with heterogeneous effects
    Dong, Lewei
    Xu, Huiling
    Wei, Xinjiang
    Hu, Xin
    ISA TRANSACTIONS, 2022, 123 : 1 - 13
  • [45] False Data Injection Detection in Cyber-Physical System
    Sousa, Alan E.
    Messai, Nadhir
    Manamanni, Noureddine
    IFAC PAPERSONLINE, 2022, 55 (06): : 420 - 426
  • [46] Detection-based resilient control for cyber-physical systems against two-channel false data injection attacks
    Li, Jinyan
    Li, Xiaomeng
    Ren, Hongru
    Li, Hongyi
    INTERNATIONAL JOURNAL OF ROBUST AND NONLINEAR CONTROL, 2024, 34 (17) : 11604 - 11622
  • [47] Robust Stealthy Covert Attacks on Cyber-Physical Systems
    Li, Xuerong
    Zhang, Ping
    Dong, Hongli
    IFAC PAPERSONLINE, 2022, 55 (06): : 520 - 525
  • [48] Stealthy Local Covert Attacks on Cyber-Physical Systems
    Mikhaylenko, Dina
    Zhang, Ping
    IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2022, 67 (12) : 6778 - 6785
  • [49] Detecting False Data Injection Attacks in Linear Parameter Varying Cyber-Physical Systems
    Golabi, Arash
    Erradi, Abdelkarim
    Tantawy, Ashraf
    Shaban, Khaled
    2019 INTERNATIONAL CONFERENCE ON CYBER SECURITY FOR EMERGING TECHNOLOGIES (CSET), 2019,
  • [50] Multi-Objective False Data Injection Attacks of Cyber-Physical Power Systems
    Lu, Kang-Di
    Wu, Zheng-Guang
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-EXPRESS BRIEFS, 2022, 69 (09) : 3924 - 3928