Analysis of Stealthy False Data Injection Attacks Against Networked Control Systems: Three Case Studies

被引:25
|
作者
Pang, Zhonghua [1 ]
Fu, Yuan [1 ]
Guo, Haibin [2 ,3 ]
Sun, Jian [2 ,3 ]
机构
[1] North China Univ Technol, Natl Key Lab Autonomous Intelligent Unmanned Syst, Beijing 100144, Peoples R China
[2] Beijing Inst Technol, Sch Automation, Natl Key Lab Autonomous Intelligent Unmanned Syst, Beijing 100081, Peoples R China
[3] Beijing Inst Technol, Chongqing Innovat Ctr, Chongqing 401120, Peoples R China
基金
中国国家自然科学基金; 北京市自然科学基金;
关键词
False data injection attack; networked control systems (NCSs); stability; stealthiness; INTEGRITY ATTACKS; STATE ESTIMATION;
D O I
10.1007/s11424-022-2120-6
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
This paper mainly investigates the security problem of a networked control system based on a Kalman filter. A false data injection attack scheme is proposed to only tamper the measurement output, and its stealthiness and effects on system performance are analyzed under three cases of system knowledge held by an attacker and a defender. Firstly, it is derived that the proposed attack scheme is stealthy for a residual-based detector when the attacker and the defender hold the same accurate system knowledge. Secondly, it is proven that the proposed attack scheme is still stealthy even if the defender actively modifies the Kalman filter gain so as to make it different from that of the attacker. Thirdly, the stealthiness condition of the proposed attack scheme based on an inaccurate model is given. Furthermore, for each case, the instability conditions of the closed-loop system under attack are derived. Finally, simulation results are provided to test the proposed attack scheme.
引用
收藏
页码:1407 / 1422
页数:16
相关论文
共 50 条
  • [11] Secure Control for Switched Positive Systems Against False Data Injection Attacks
    Xu, Jincan
    Ma, Mu
    Wang, Peng
    Sun, Yaowei
    39TH YOUTH ACADEMIC ANNUAL CONFERENCE OF CHINESE ASSOCIATION OF AUTOMATION, YAC 2024, 2024, : 945 - 949
  • [12] Detecting Stealthy False Data Injection Attacks in Power Grids Using Deep Learning
    Ashrafuzzaman, Mohammad
    Chakhchoukh, Yacine
    Jillepalli, Ananth A.
    Tosic, Predrag T.
    de Leon, Daniel Conte
    Sheldon, Frederick T.
    Johnson, Brian K.
    2018 14TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE (IWCMC), 2018, : 219 - 225
  • [13] Deep Latent Space Clustering for Detection of Stealthy False Data Injection Attacks Against AC State Estimation in Power Systems
    Bhattacharjee, Arnab
    Mondal, Arnab Kumar
    Verma, Ashu
    Mishra, Sukumar
    Saha, Tapan K.
    IEEE TRANSACTIONS ON SMART GRID, 2023, 14 (03) : 2338 - 2351
  • [14] A Novel Data Fusion Algorithm to Combat False Data Injection Attacks in Networked Radar Systems
    Yang, Chaoqun
    Feng, Li
    Zhang, Heng
    He, Shibo
    Shi, Zhiguo
    IEEE TRANSACTIONS ON SIGNAL AND INFORMATION PROCESSING OVER NETWORKS, 2018, 4 (01): : 125 - 136
  • [15] Defense Optimization in Power Systems against False Data Injection Attacks
    Hong, Feiyang
    Bao, Zhejing
    You, Miao
    PROCEEDINGS OF THE 33RD CHINESE CONTROL AND DECISION CONFERENCE (CCDC 2021), 2021, : 2551 - 2556
  • [16] A Review of False Data Injection Attacks Against Modern Power Systems
    Liang, Gaoqi
    Zhao, Junhua
    Luo, Fengji
    Weller, Steven R.
    Dong, Zhao Yang
    IEEE TRANSACTIONS ON SMART GRID, 2017, 8 (04) : 1630 - 1638
  • [17] Distributed Attack Detection and Secure Estimation of Networked Cyber-Physical Systems Against False Data Injection Attacks and Jamming Attacks
    Guan, Yanpeng
    Ge, Xiaohua
    IEEE TRANSACTIONS ON SIGNAL AND INFORMATION PROCESSING OVER NETWORKS, 2018, 4 (01): : 48 - 59
  • [18] Stealthy output injection attacks on control systems with bounded variables
    Dutta, Abhishek
    Langbort, Cedric
    INTERNATIONAL JOURNAL OF CONTROL, 2017, 90 (07) : 1389 - 1402
  • [19] Analysis of Moving Target Defense Against False Data Injection Attacks on Power Grid
    Zhang, Zhenyong
    Deng, Ruilong
    Yau, David K. Y.
    Cheng, Peng
    Chen, Jiming
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2020, 15 : 2320 - 2335
  • [20] Stealthy Noise Injection Attacks Against State Estimation in Interconnected Systems
    Huo, Jian-Ru
    Li, Xiao-Jian
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-EXPRESS BRIEFS, 2023, 70 (06) : 2042 - 2046