An Intrusion Detection Method Based on Self-Generated Coding Technology for Stealthy False Data Injection Attacks in Train-Ground Communication Systems

被引:18
作者
Kong, Xiang-Yu [1 ]
Yang, Guang-Hong [1 ,2 ]
机构
[1] Northeastern Univ, Coll Informat Sci & Engn, Shenyang 110819, Peoples R China
[2] Northeastern Univ, State Key Lab Synthet Automat Proc Ind, Shenyang 110819, Peoples R China
基金
中国国家自然科学基金;
关键词
Dead reckoning (DR); intrusion detection; self-generated coding; stealthy false data injection (FDI) attacks; train-ground communication systems (TGCSs);
D O I
10.1109/TIE.2022.3213899
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This article investigates the problem of intrusion detection of stealthy false data injection (FDI) attacks in train-ground communication systems. An intrusion detection method is proposed based on the self-generated coding technology. Different from the existing pseudorandom coding generators-based detection methods, the proposed method designs a self-generated multiplicative coding scheme by employing the authentication mechanism, where the coding sequences to encrypt and decrypt the original measurement data of trains are dynamically updated by parsing the latest timestamp online, such that the attacker is not able to obtain the prior knowledge of the coding sequences, which improves the security of the data transmission in the train-ground communication network. Under stealthy FDI attacks, the proposed method increases the output residuals of the remote state estimator, which ensures that the residual-based detector continuously outputs alarm. Furthermore, in order to mitigate the impact of the attack on the system, a dead reckoning algorithm-based defence model is established to reconstruct the position information of trains compromised by the attacker. Finally, the effectiveness and superiority of the proposed method are verified through semiphysical simulation experiments.
引用
收藏
页码:8468 / 8476
页数:9
相关论文
共 28 条
[1]   Supervisory Nonlinear State Observers for Adversarial Sparse Attacks [J].
An, Liwei ;
Yang, Guang-Hong .
IEEE TRANSACTIONS ON CYBERNETICS, 2022, 52 (03) :1575-1587
[2]   Distributed Resilient Secondary Control for DC Microgrids Against Heterogeneous Communication Delays and DoS Attacks [J].
Deng, Chao ;
Guo, Fanghong ;
Wen, Changyun ;
Yue, Dong ;
Wang, Yu .
IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2022, 69 (11) :11560-11568
[3]  
Erni Guo, 2021, 2021 7th Annual International Conference on Network and Information Systems for Computers (ICNISC), P451, DOI 10.1109/ICNISC54316.2021.00087
[4]   An Intrusion Detection Method Based on Machine Learning and State Observer for Train-Ground Communication Systems [J].
Gao, Bing ;
Bu, Bing ;
Zhang, Wei ;
Li, Xiang .
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2022, 23 (07) :6608-6620
[5]   A Blended Active Detection Strategy for False Data Injection Attacks in Cyber-Physical Systems [J].
Ghaderi, Mohsen ;
Gheitasi, Kian ;
Lucia, Walter .
IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, 2021, 8 (01) :168-176
[6]  
Hongli Zhao, 2021, 2021 7th Annual International Conference on Network and Information Systems for Computers (ICNISC), P917, DOI 10.1109/ICNISC54316.2021.00172
[7]   Anomaly Detection and Identification for Multiagent Systems Subjected to Physical Faults and Cyberattacks [J].
Li, Yan ;
Fang, Hao ;
Chen, Jie .
IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2020, 67 (11) :9724-9733
[8]   A Cross-Layer Defense Scheme for Edge Intelligence-Enabled CBTC Systems Against MitM Attacks [J].
Li, Yang ;
Zhu, Li ;
Wang, Hongwei ;
Yu, F. Richard ;
Liu, Shichao .
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2021, 22 (04) :2286-2298
[9]   Optimal Stealthy Innovation-Based Attacks With Historical Data in Cyber-Physical Systems [J].
Li, Yi-Gang ;
Yang, Guang-Hong .
IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2021, 51 (06) :3401-3411
[10]   Stability Analysis for Cyber-Physical Systems Under Denial-of-Service Attacks [J].
Lu, An-Yang ;
Yang, Guang-Hong .
IEEE TRANSACTIONS ON CYBERNETICS, 2021, 51 (11) :5304-5313