ICPS false injection attack defense strategy based on multi-channel game

被引:0
|
作者
Sun Z.-W. [1 ,2 ]
Hong T. [1 ]
机构
[1] School of Internet of Things Engineering, Jiangnan University, Wuxi
[2] Engineering Research Center of Internet of Things Technology Applications of Ministry of Education, Wuxi
来源
Kongzhi yu Juece/Control and Decision | 2022年 / 37卷 / 05期
关键词
Data injection attacks; ICPS; Minimax controller; Multi-channel transmission; Zero-sum game;
D O I
10.13195/j.kzyjc.2020.1738
中图分类号
学科分类号
摘要
The industrial cyber-physical system (ICPS) is increasingly connected to the infrastructure, meanwhile its communication network is vulnerable to environmental interference and false data injection attacks. Therefore, this paper studies a multi-channel transmission framework and a minimax controller to improve the elasticity of the ICPS under attack, environment interference and noise interference. The minimax controller is designed to enhance the elasticity of the ICPS under noise and interference. Furthermore, based on the multi-channel transmission framework, an attack-defense game model between the transmitter and the attacker is established, which uses the attack-defense game strategy to realize the elastic defense strategy of the whole ICPS. Through the joint debugging simulation of OPNET and Matlab, the performance of the ICPS control system based on the multi-channel transmission framework under data injection attacks is simulated. The simulation results show that the elastic defense strategy composed of the minimax controller and the multi-channel transmission framework can not only improve the stability of the system under environmental interference, but also reduce the impact of data injection attacks on the ICPS effectively. Copyright ©2022 Control and Decision.
引用
收藏
页码:1357 / 1366
页数:9
相关论文
共 30 条
  • [1] Giraldo J, Sarkar E, Cardenas A A, Et al., Security and privacy in cyber-physical systems: A survey of surveys, IEEE Design & Test, 34, 4, pp. 7-17, (2017)
  • [2] Hu F, Lu Y, Vasilakos A V, Et al., Robust cyber-physical systems: Concept, models, and implementation, Future Generation Computer Systems, 56, pp. 449-475, (2016)
  • [3] Mahmoud M S, Hamdan M M, Baroudi U A., Modeling and control of cyber-physical systems subject to cyber attacks: A survey of recent advances and challenges, Neurocomputing, 338, pp. 101-115, (2019)
  • [4] Khan R, Maynard P, McLaughlin K, Et al., Threat analysis of BlackEnergy malware for synchrophasor based real-time control and monitoring in smart grid, BCS Learning & Development, 23, 7, pp. 53-63, (2016)
  • [5] Li Y Z, Quevedo D E, Dey S, Et al., SINR-based DoS attack on remote state estimation: A game-theoretic approach, IEEE Transactions on Control of Network Systems, 4, 3, pp. 632-642, (2017)
  • [6] Langner R., Stuxnet: Dissecting a cyberwarfare weapon, IEEE Security & Privacy, 9, 3, pp. 49-51, (2011)
  • [7] Sun Z W, Zhang Y Q., Research on attack modeling of industrial cyber physical systems, Control and Decision, 34, 11, pp. 2323-2329, (2019)
  • [8] Wu G Y, Sun J, Chen J., Optimal data injection attacks in cyber-physical systems, IEEE Transactions on Cybernetics, 48, 12, pp. 3302-3312, (2018)
  • [9] Zhang R C, Venkitasubramaniam P., Stealthy control signal attacks in linear quadratic Gaussian control systems: Detectability reward tradeoff, IEEE Transactions on Information Forensics and Security, 12, 7, pp. 1555-1570, (2017)
  • [10] Sou K C, Sandberg H, Johansson K H., Computing critical k-tuples in power networks, IEEE Transactions on Power Systems, 27, 3, pp. 1511-1520, (2012)