Stochastic Event-Based Physical Watermarks Against Replay Attacks in Cyber-Physical Systems

被引:4
作者
Zhao, Xudong [1 ]
Liu, Le [1 ]
Xing, Wei [1 ]
Xu, Ning [2 ]
机构
[1] Dalian Univ Technol, Minist Educ, Key Lab Intelligent Control & Optimizat Ind Equipm, Dalian 116024, Peoples R China
[2] Bohai Univ, Coll Informat Sci & Technol, Jinzhou 121013, Peoples R China
来源
IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS | 2024年 / 11卷 / 02期
基金
中国国家自然科学基金;
关键词
Watermarking; Detectors; Kalman filters; Costs; Control systems; Real-time systems; Network systems; Cyber-physical system (CPS); detection; event-based control; physical watermark; replay attack; STATE ESTIMATION;
D O I
10.1109/TCNS.2023.3331161
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this article, an event-based physical watermark is proposed and analyzed. It is well known that adding physical watermarks into cyber-physical systems (CPSs) is an effective way to combat malicious attacks. However, the classical ways to adding physical watermarks are based on time, which leads to great decreases in linear-quadratic Gaussian (LQG) performances while increasing detection rates. To deal with the performance loss after adding physical watermarks, an event-based physical watermark is designed to detect replay attacks. A stochastic event scheduler based on the innovation sequence is constructed to indicate adding physical watermarks or not. It is shown that the probability of adding physical watermarks will rise if the system is under attacks. Based on the frequency of adding watermarks, a count detector is proposed, which provides lower memory and computational cost. LQG performance and detection rates of a chi(2) detector are further characterized. Herein, it is formally proved that the event-based independent identically distributed (i.i.d.) watermark is more efficient than the time-based i.i.d. watermark. Furthermore, we investigate the optimal parameters to enlarge detection performance in certain conditions. Finally, some simulations are given to show the superiority of our proposed event-based physical watermark.
引用
收藏
页码:1035 / 1045
页数:11
相关论文
共 30 条
[1]  
Anderson BD., 2012, OPTIMAL FILTERING
[2]   Centralized Versus Decentralized Detection of Attacks in Stochastic Interconnected Systems [J].
Anguluri, Rajasekhar ;
Katewa, Vaibhav ;
Pasqualetti, Fabio .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2020, 65 (09) :3903-3910
[3]   Data-injection attacks in stochastic control systems: Detectability and performance tradeoffs [J].
Bai, Cheng-Zong ;
Pasqualetti, Fabio ;
Gupta, Vijay .
AUTOMATICA, 2017, 82 :251-260
[4]  
Berstekas D.P., 1995, DYNAMIC PROGRAMMING
[5]   Adaptive neural self-triggered bipartite secure control for nonlinear MASs subject to DoS attacks [J].
Cheng, Fabin ;
Liang, Hongjing ;
Niu, Ben ;
Zhao, Ning ;
Zhao, Xudong .
INFORMATION SCIENCES, 2023, 631 :256-270
[6]   Input-to-State Stabilizing Control Under Denial-of-Service [J].
De Persis, Claudio ;
Tesi, Pietro .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2015, 60 (11) :2930-2944
[7]  
Durrett R, 2005, Probability: Theory and Examples. Probability: Theory & Examples, Vthird
[8]   Optimal periodic watermarking schedule for replay attack detection in cyber-physical systems [J].
Fang, Chongrong ;
Qi, Yifei ;
Cheng, Peng ;
Zheng, Wei Xing .
AUTOMATICA, 2020, 112
[9]   Distributed consensus of heterogeneous switched nonlinear multiagent systems with input quantization and DoS attacks [J].
Guo, Shiyu ;
Zhao, Xudong ;
Wang, Huanqing ;
Xu, Ning .
APPLIED MATHEMATICS AND COMPUTATION, 2023, 456
[10]   Stochastic Event-Triggered Sensor Schedule for Remote State Estimation [J].
Han, Duo ;
Mo, Yilin ;
Wu, Junfeng ;
Weerakkody, Sean ;
Sinopoli, Bruno ;
Shi, Ling .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2015, 60 (10) :2661-2675