Analysis of Stealthy False Data Injection Attacks Against Networked Control Systems: Three Case Studies

被引:25
|
作者
Pang, Zhonghua [1 ]
Fu, Yuan [1 ]
Guo, Haibin [2 ,3 ]
Sun, Jian [2 ,3 ]
机构
[1] North China Univ Technol, Natl Key Lab Autonomous Intelligent Unmanned Syst, Beijing 100144, Peoples R China
[2] Beijing Inst Technol, Sch Automation, Natl Key Lab Autonomous Intelligent Unmanned Syst, Beijing 100081, Peoples R China
[3] Beijing Inst Technol, Chongqing Innovat Ctr, Chongqing 401120, Peoples R China
基金
中国国家自然科学基金; 北京市自然科学基金;
关键词
False data injection attack; networked control systems (NCSs); stability; stealthiness; INTEGRITY ATTACKS; STATE ESTIMATION;
D O I
10.1007/s11424-022-2120-6
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
This paper mainly investigates the security problem of a networked control system based on a Kalman filter. A false data injection attack scheme is proposed to only tamper the measurement output, and its stealthiness and effects on system performance are analyzed under three cases of system knowledge held by an attacker and a defender. Firstly, it is derived that the proposed attack scheme is stealthy for a residual-based detector when the attacker and the defender hold the same accurate system knowledge. Secondly, it is proven that the proposed attack scheme is still stealthy even if the defender actively modifies the Kalman filter gain so as to make it different from that of the attacker. Thirdly, the stealthiness condition of the proposed attack scheme based on an inaccurate model is given. Furthermore, for each case, the instability conditions of the closed-loop system under attack are derived. Finally, simulation results are provided to test the proposed attack scheme.
引用
收藏
页码:1407 / 1422
页数:16
相关论文
共 50 条
  • [1] Analysis of Stealthy False Data Injection Attacks Against Networked Control Systems: Three Case Studies
    Zhonghua Pang
    Yuan Fu
    Haibin Guo
    Jian Sun
    Journal of Systems Science and Complexity, 2023, 36 : 1407 - 1422
  • [2] False Data Injection Attacks Against Partial Sensor Measurements of Networked Control Systems
    Pang, Zhong-Hua
    Fan, Lan-Zhi
    Dong, Zhe
    Han, Qing-Long
    Liu, Guo-Ping
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-EXPRESS BRIEFS, 2022, 69 (01) : 149 - 153
  • [3] Stochastic Stealthy False Data Injection Attacks Against Cyber-Physical Systems
    Liu, Ruirui
    Yu, Hao
    Hao, Fei
    IEEE SYSTEMS JOURNAL, 2022, 16 (04): : 6009 - 6020
  • [4] Detection of Stealthy False Data Injection Attacks Against Cyber-Physical Systems: A Stochastic Coding Scheme
    Guo, Haibin
    Pang, Zhonghua
    Sun, Jian
    Li, Jun
    JOURNAL OF SYSTEMS SCIENCE & COMPLEXITY, 2022, 35 (05) : 1668 - 1684
  • [5] Worst-case ε-stealthy false data injection attacks in cyber-physical systems
    Li, Yi-Gang
    Yang, Guang-Hong
    INFORMATION SCIENCES, 2020, 515 : 352 - 364
  • [6] Stealthy false data injection attacks with resource constraints against multi-sensor estimation systems
    Guo, Haibin
    Sun, Jian
    Pang, Zhong-Hua
    ISA TRANSACTIONS, 2022, 127 : 32 - 40
  • [7] Event-Based Optimal Stealthy False Data-Injection Attacks Against Remote State Estimation Systems
    Guo, Haibin
    Sun, Jian
    Pang, Zhong-Hua
    Liu, Guo-Ping
    IEEE TRANSACTIONS ON CYBERNETICS, 2023, 53 (10) : 6714 - 6724
  • [8] Optimal stealthy false data injection attacks in cyber-physical systems
    Li, Yi-Gang
    Yang, Guang-Hong
    INFORMATION SCIENCES, 2019, 481 : 474 - 490
  • [9] Elliptic Envelope Based Detection of Stealthy False Data Injection Attacks in Smart Grid Control Systems
    Ashrafuzzaman, Mohammad
    Das, Saikat
    Jillepalli, Ananth A.
    Chakhchoukh, Yacine
    Sheldon, Frederick T.
    2020 IEEE SYMPOSIUM SERIES ON COMPUTATIONAL INTELLIGENCE (SSCI), 2020, : 1131 - 1137
  • [10] A Lyapunov-based control design for centralised networked control systems under false-data-injection attacks
    Sargolzaei, Arman
    INTERNATIONAL JOURNAL OF SYSTEMS SCIENCE, 2024, 55 (13) : 2759 - 2770