On the Stability of Cyber-physical Systems Under False Data Injection Attacks

被引:0
|
作者
Peng D.-T. [1 ,2 ]
Dong J.-M. [1 ,2 ]
Cai Z.-M. [1 ,2 ]
Zhang C.-Q. [3 ]
Peng Q.-K. [1 ,2 ]
机构
[1] Ministry of Education Key Laboratory for Intelligent Networks and Network Security, Xi'an Jiaotong University, Xi'an
[2] System Engineering Institute, School of Electronic and Information Engineering, Xi'an Jiaotong University, Xi'an
[3] Department of Computer Science and Technology, School of Electronic and Information Engineering, Xi'an Jiaotong University, Xi'an
来源
基金
中国国家自然科学基金;
关键词
Cyber-physical systems (CPS); Cyberspace security; False data injection (FDI) attacks; Kalman filter;
D O I
10.16383/j.aas.2018.c180331
中图分类号
学科分类号
摘要
Due to the stealthiness behavior, false data injection (FDI) attacks severely threaten the security of cyber-physical systems (CPS). From the attackers' perspective, this paper mainly studies how FDI attacks impact the stability of CPS. First, we give the FDI attack model where the false control and measurement data are injected into the forward and feedback channels, respectively. Then, we propose an FDI effectiveness model to quantify the attack impact on the state estimation and measurement residue of CPS. On this basis, we design a coordination strategy associated with attack vector and further derive the theoretical attack conditions to manipulate the stability of CPS, which are related to the stability of attack matrix H and system matrix A and the selected moment of time parameter ka. Finally, numerical simulations indicate that FDI attacks can effectively manipulate the stability of CPS including two classes of controlled plants: stable and unstable. This study further reveals the coordination behavior of FDI attacks, which provides important reference for securing the CPS and defending cyber attacks. Copyright © 2019 Acta Automatica Sinica. All rights reserved.
引用
收藏
页码:196 / 205
页数:9
相关论文
共 29 条
  • [1] Lee J., Bagheri B., Kao H.A., A cyber-physical systems architecture for industry 4.0-based manufacturing systems, Manufacturing Letters, 3, pp. 18-23, (2015)
  • [2] Mosterman P.J., Zander J., Industry 4.0 as a cyber-physical system study, Software and Systems Modeling, 15, 1, pp. 17-29, (2016)
  • [3] Deng J.-L., Wang F.-Y., Chen Y.-B., Zhao X.-Y., From Industries 4.0 to Energy 5.0: concept and framework of intelligent energy systems, Acta Automatica Sinica, 41, 12, pp. 2003-2016, (2015)
  • [4] Wang F.-Y., Zhang J., Internet of minds: the concept, issues and platforms, Acta Automatica Sinica, 43, 12, pp. 2061-2070, (2017)
  • [5] Bai T.-X., Wang S., Shen Z., Cao D.-P., Zheng N.-N., Wang F.-Y., Parallel robotics and parallel unmanned systems: framework, structure, process, platform and applications, Acta Automatica Sinica, 43, 2, pp. 161-175, (2017)
  • [6] Wang F.-Y., Sun Q., Jiang G.-J., Tan K., Zhang J., Hou J.-C., Et al., Nuclear energy 5.0: new formation and system architecture of nuclear power industry in the new IT era, Acta Automatica Sinica, 44, 5, pp. 922-934, (2018)
  • [7] Alguliyev R., Imamverdiyev Y., Sukhostat L., Cyber-physical systems and their security issues, Computers in Industry, 100, pp. 212-223, (2018)
  • [8] Sandberg H., Amin S., Johansson K.H., Cyberphysical security in networked control systems: an introduction to the issue, IEEE Control Systems, 35, 1, pp. 20-23, (2015)
  • [9] Zargar S.T., Joshi J., Tipper D., A survey of defense mechanisms against distributed denial of service (DDoS) flooding attacks, IEEE Communications Surveys and Tutorials, 15, 4, pp. 2046-2069, (2013)
  • [10] Molsa J., Mitigating denial of service attacks: a tutorial, Journal of Computer Security, 13, 6, pp. 807-837, (2005)