A Residual-Driven Secure Transmission and Detection Approach Against Stealthy Cyber-Physical Attacks for Accident Prevention

被引:12
作者
Wu, Shimeng [1 ]
Luo, Hao [1 ]
Yin, Shen [2 ]
Li, Kuan [3 ]
Jiang, Yuchen [1 ]
机构
[1] Harbin Inst Technol HIT, Dept Control Sci & Engn, Harbin 150001, Peoples R China
[2] Norwegian Univ Sci & Technol, Fac Engn, Dept Mech & Ind Engn, N-7491 Trondheim, Norway
[3] Shanghai Aerosp Control Technol Inst, Shanghai 201109, Peoples R China
基金
中国国家自然科学基金;
关键词
Detectors; Security; Eavesdropping; Data integrity; Threat modeling; Sensor systems; Monitoring; Residual-driven; secure transmission; CPS attack detection; coprime factorization; accident prevention; MARKOVIAN JUMP SYSTEMS;
D O I
10.1109/TIFS.2023.3314194
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
With the development of Cyber-Physical Systems (CPSs), many industrial facilities have realized remote control and monitoring. However, the widespread of CPSs has brought new issues and challenges in terms of security. Attackers can exploit vulnerabilities induced by network communication, tamper with transmitted data, and cause serious accidents through carefully designed covert attacks. This paper proposes a residual-driven comprehensive defense scheme based on the coprime factorization technique to address the threat posed by concealed CPS attacks. The novel scheme protects CPS from stealth cyber-physical attacks through secure transmission and attack detection. In particular, a secure transmission method is first introduced to prevent information leakage from the source. The pivotal idea is to convert confidential transmission control and measurement signals into non-essential filtered residual signals. It contributes to the reduction of information leakage and helps reduce the risks of stealth attacks. Then, under the same residual-driven framework, a stealth attack detection approach is put forward. It can eliminate false alarms caused by system faults, and therefore, achieve superior efficacy in detection accuracy under stealth attacks. Finally, simulation research is conducted on the F-404 engine to verify the effectiveness and performance of the proposed scheme and approach.
引用
收藏
页码:5762 / 5771
页数:10
相关论文
共 39 条
[1]   Cyber-physical systems and their security issues [J].
Alguliyev, Rasim ;
Imamverdiyev, Yadigar ;
Sukhostat, Lyudmila .
COMPUTERS IN INDUSTRY, 2018, 100 :212-223
[2]   Distributed Mixed H2/H∞ Fusion Estimation With Limited Communication Capacity [J].
Chen, Bo ;
Hu, Guoqiang ;
Zhang, Wen-An ;
Yu, Li .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2016, 61 (03) :805-810
[3]   Dynamic Attack Detection in Cyber-Physical Systems With Side Initial State Information [J].
Chen, Yuan ;
Kar, Soummya ;
Moura, Jose M. F. .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2017, 62 (09) :4618-4624
[4]   Application TRIKE Methodology When Modeling Threats to APCs Information Security [J].
Chernov, D. .
ADVANCES IN AUTOMATION III, 2022, 857 :452-461
[5]  
Dan Li, 2020, 2020 19th IEEE International Conference on Machine Learning and Applications (ICMLA), P438, DOI 10.1109/ICMLA51294.2020.00075
[6]   A systems and control perspective of CPS security [J].
Dibaji, Seyed Mehran ;
Pirani, Mohammad ;
Flamholz, David Bezalel ;
Annaswamy, Anuradha M. ;
Johansson, Karl Henrik ;
Chakrabortty, Aranya .
ANNUAL REVIEWS IN CONTROL, 2019, 47 :394-411
[7]   A survey on security control and attack detection for industrial cyber-physical systems [J].
Ding, Derui ;
Han, Qing-Long ;
Xiang, Yang ;
Ge, Xiaohua ;
Zhang, Xian-Ming .
NEUROCOMPUTING, 2018, 275 :1674-1683
[8]  
Ding SX, 2013, ADV IND CONTROL, P3, DOI 10.1007/978-1-4471-4799-2_1
[9]  
Falliere Nicolas., 2011, W32. stuxnet dossier
[10]   Time Series Anomaly Detection for Cyber-physical Systems via Neural System Identification and Bayesian Filtering [J].
Feng, Cheng ;
Tian, Pengwei .
KDD '21: PROCEEDINGS OF THE 27TH ACM SIGKDD CONFERENCE ON KNOWLEDGE DISCOVERY & DATA MINING, 2021, :2858-2867