A Probing Signal-based Replay Attack Detection Method Avoiding Control Performance Degradation

被引:0
|
作者
Gyujin Na
Yongsoon Eun
机构
[1] Agency for Defense Development,Department of Electrical Engineering and Computer Science
[2] DGIST,undefined
关键词
Anomaly detector; disturbance observer; probing signal; replay attack; unmanned ground vehicle; vehicle platooning;
D O I
暂无
中图分类号
学科分类号
摘要
This paper proposes a probing signal-based replay attack detection method that avoids control performance degradation. Employing probing signals in actuators to detect replay attacks is a well-known and effective strategy: the replay attack replaces the sensor reading with stored sensor data, and thus, no response to the probing signal is present at the sensor. Applying the probing signal, however, introduces a perturbation to the actual system output, which is either regulated to a reference value or controlled to track a desired trajectory. Therefore, the probing signal enables attack detection but simultaneously yields control performance degradation. Clearly, a trade-off exists upon determining the probing signal: a larger amplitude increases the detection probability, especially in the presence of measurement noise, but degrades the control performance; a smaller amplitude of probing signal affects the control performance less but lowers the attack detectability. To address this problem, a disturbance observer (DOB) approach is proposed in this work, where the effect of the probing signal is compensated at the output and the anomaly is detected by looking at the output of the DOB instead of the system. In this way, probing is still effective for replay attack detection, but the regulation and/or tracking performance of the system is compromised much less. An optimization of DOB parameters is presented to satisfy specifications for both attack detection probability and control performance. Simulation results on vehicle platooning and experiment results using unmanned ground vehicle system are presented that validate the efficacy of the proposed method.
引用
收藏
页码:3637 / 3649
页数:12
相关论文
共 50 条
  • [41] A Survey on Linear Prediction Residual based Replay Attack Detection Systems
    Singh, Madhusudan
    2020 IEEE INTERNATIONAL CONFERENCE ON INTERNET OF THINGS AND INTELLIGENCE SYSTEM (IOTAIS), 2021, : 14 - 17
  • [42] Subband Analysis for Performance Improvement of Replay Attack Detection in Speaker Verification Systems
    Garg, Sachin
    Bhilare, Shruti
    Kanhangad, Vivek
    2019 5TH IEEE INTERNATIONAL CONFERENCE ON IDENTITY, SECURITY, AND BEHAVIOR ANALYSIS (ISBA 2019), 2019,
  • [43] A Model Inversion Based Watermark for Replay Attack Detection with Output Tracking
    Romagnoli, Raffaele
    Weerakkody, Sean
    Sinopoli, Bruno
    2019 AMERICAN CONTROL CONFERENCE (ACC), 2019, : 384 - 390
  • [44] Speech Demodulation-based Techniques for Replay and Presentation Attack Detection
    Kamble, Madhu R.
    Sai, Pulikonda Aditya Krishna
    Krishna, Maddala V. Siva
    Patil, Ankur T.
    Acharya, Rajul
    Patil, Hemant A.
    2019 ASIA-PACIFIC SIGNAL AND INFORMATION PROCESSING ASSOCIATION ANNUAL SUMMIT AND CONFERENCE (APSIPA ASC), 2019, : 1545 - 1550
  • [45] Detection of Replay Attack Based on Normalized Constant Q Cepstral Feature
    Ye, Yongchao
    Lao, Lingjie
    Yan, Diqun
    Lin, Lang
    2019 IEEE 4TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND BIG DATA ANALYSIS (ICCCBDA), 2019, : 407 - 411
  • [46] Replay Attack Detection in a Platoon of Connected Vehicles with Cooperative Adaptive Cruise Control
    Merco, Roberto
    Biron, Zoleikha Abdollahi
    Pisu, Pierluigi
    2018 ANNUAL AMERICAN CONTROL CONFERENCE (ACC), 2018, : 5582 - 5587
  • [47] A Low-Cost Masquerade and Replay Attack Detection Method for CAN in Automobiles
    Ansari, Mohammad Raashid
    Miller, W. Thomas
    She, Chenghua
    Yu, Qiaoyan
    2017 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2017, : 2178 - 2181
  • [48] Parametric roll resonance monitoring using signal-based detection
    Galeazzi, Roberto
    Blanke, Mogens
    Falkenberg, Thomas
    Poulsen, Niels K.
    Violaris, Nikos
    Storhaug, Gaute
    Huss, Mikael
    OCEAN ENGINEERING, 2015, 109 : 355 - 371
  • [49] Detection, differentiation and localization of replay attack and false data injection attack based on random matrix
    Shen, Yuehao
    Qin, Zhijun
    SCIENTIFIC REPORTS, 2024, 14 (01)
  • [50] Detection, differentiation and localization of replay attack and false data injection attack based on random matrix
    Yuehao Shen
    Zhijun Qin
    Scientific Reports, 14