Detection of Perfect Stealthy Attacks on Cyber-Physical Systems Subject to Measurement Quantizations: A Watermark-Based Strategy

被引:0
作者
YuAng Wang [1 ,2 ]
Zidong Wang [3 ,4 ,5 ]
Lei Zou [3 ,1 ,2 ]
Bo Shen [3 ,1 ,2 ]
Hongli Dong [3 ,6 ,7 ,8 ]
机构
[1] the College of Information Science and Technology, Donghua University
[2] the Engineering Research Center of Digitalized Textile and Fashion Technology, Ministry of Education
[3] IEEE
[4] the College of Electrical Engineering and Automation,Shandong University of Science and Technology
[5] the Department of Computer Science, Brunel University London, Uxbridge
[6] the Sanya Offshore Oil and Gas Research Institute,Northeast Petroleum University
[7] the Artificial Intelligence Energy Research Institute, Northeast Petroleum University
[8] Heilongjiang Provincial Key Laboratory of Networking and Intelligent Control, Northeast Petroleum
关键词
D O I
暂无
中图分类号
TP393.08 [];
学科分类号
0839 ; 1402 ;
摘要
In this paper, the attack detection problem is investigated for a class of closed-loop systems subjected to unknownbutbounded noises in the presence of stealthy attacks. The measurement outputs from the sensors are quantized before transmission.A specific type of perfect stealthy attack, which meets certain rather stringent conditions, is taken into account. Such attacks could be injected by adversaries into both the sensor-toestimator and controller-to-actuator channels, with the aim of disrupting the normal data flow. For the purpose of defending against these perfect stealthy attacks, a novel scheme based on watermarks is developed. This scheme includes the injection of watermarks(applied to data prior to quantization) and the recovery of data(implemented before the data reaches the estimator).The watermark-based scheme is designed to be both timevarying and hidden from adversaries through incorporating a time-varying and bounded watermark signal. Subsequently, a watermark-based attack detection strategy is proposed which thoroughly considers the characteristics of perfect stealthy attacks,thereby ensuring that an alarm is activated upon the occurrence of such attacks. An example is provided to demonstrate the efficacy of the proposed mechanism for detecting attacks.
引用
收藏
页码:114 / 125
页数:12
相关论文
共 50 条
  • [31] Vulnerability analysis for a class of nonlinear cyber-physical systems under stealthy attacks
    Zhang, Qirui
    Dai, Wei
    Yang, Chunyu
    Chen, Xinkai
    [J]. AUTOMATICA, 2024, 167
  • [32] Optimal filter design for cyber-physical systems under stealthy hybrid attacks
    Li, Yuman
    Lin, Hong
    Lam, James
    [J]. INTERNATIONAL JOURNAL OF ROBUST AND NONLINEAR CONTROL, 2021, 31 (04) : 1340 - 1357
  • [33] Distributionally Robust Tuning of Anomaly Detectors in Cyber-Physical Systems with Stealthy Attacks
    Renganathan, Venkatraman
    Hashemi, Navid
    Ruths, Justin
    Summers, Tyler H.
    [J]. 2020 AMERICAN CONTROL CONFERENCE (ACC), 2020, : 1247 - 1252
  • [34] Stochastic Stealthy False Data Injection Attacks Against Cyber-Physical Systems
    Liu, Ruirui
    Yu, Hao
    Hao, Fei
    [J]. IEEE SYSTEMS JOURNAL, 2022, 16 (04): : 6009 - 6020
  • [35] Finite-Horizon Strictly Stealthy Deterministic Attacks on Cyber-Physical Systems
    Cheng, Donny
    Shang, Jun
    Chen, Tongwen
    [J]. IEEE CONTROL SYSTEMS LETTERS, 2022, 6 : 1640 - 1645
  • [36] Stealthy switching attacks on sensors against state estimation in cyber-physical systems
    Huo, Jian-Ru
    Li, Xiao-Jian
    [J]. INTERNATIONAL JOURNAL OF ROBUST AND NONLINEAR CONTROL, 2023, 33 (02) : 1169 - 1183
  • [37] Detection of Stealthy False Data Injection Attacks Against Cyber-Physical Systems: A Stochastic Coding Scheme
    Guo, Haibin
    Pang, Zhonghua
    Sun, Jian
    Li, Jun
    [J]. JOURNAL OF SYSTEMS SCIENCE & COMPLEXITY, 2022, 35 (05) : 1668 - 1684
  • [38] Stealthy multiplicative attacks against cyber-physical systems: A gap metric approach
    Zhao, Zhengen
    Xu, Yunsong
    Li, Yuzhe
    Cui, Lei
    Huang, Yimin
    Zhen, Ziyang
    [J]. INTERNATIONAL JOURNAL OF ROBUST AND NONLINEAR CONTROL, 2022, 32 (13) : 7336 - 7347
  • [39] Optimal completely stealthy attacks against remote estimation in cyber-physical systems
    Li, Yi-Gang
    Yang, Guang-Hong
    [J]. INFORMATION SCIENCES, 2022, 590 : 15 - 28
  • [40] Security Control for Cyber-Physical Systems With Optimal Dynamic Stealthy Actuator Attacks
    Sun, Kangkang
    Zhang, Xiaochun
    [J]. IEEE TRANSACTIONS ON AUTOMATION SCIENCE AND ENGINEERING, 2024,