Detecting deception attacks in cyber-physical linear parameter varying systems with packet loss

被引:3
作者
Golabi, Arash [1 ]
Erradi, Abdelkarim [1 ]
Tantawy, Ashraf [2 ]
Shaban, Khaled [1 ]
机构
[1] Qatar Univ, Dept Comp Sci & Engn, Doha, Qatar
[2] De Montfort Univ, Sch Comp Sci & Informat, Leicester, England
关键词
attack detector; CPS security; deception attack; linear parameter-varying systems; median filter; multi-objective optimization; packet loss; DATA INJECTION ATTACKS; NETWORKED CONTROL; LPV SYSTEMS; INTRUSION DETECTION; FAULT-DETECTION; SECURITY; DESIGN;
D O I
10.1002/acs.3543
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The increased connectivity of cyber-physical systems (CPS) to enterprise networks raises challenging security concerns. Detecting attacks on CPS is a vital step to improving their security. Most of the existing attack detectors are for CPS with linear dynamics. In this study, an investigation is made for designing a detector of deception attacks in a cyber-physical linear parameter varying (LPV) system in the presence of packet loss. A model-based attack detector is designed to detect deception attacks on output measurements, actuators, or schedule variables. With an unreliable network, the LPV attack detector enhances detection capacity and attenuates disturbances on the detector module to improve detection accuracy. During communication, packet loss results in network unreliability, which is modeled by the Bernoulli process. Stochastic stability is used to determine LPV attack detector parameters. A residual signal is built by comparing the detector's output and the actual sensor measurement and provides the deception attack's essential data. However, the packet loss causes some impulse signals in the residual signal, resulting in false alarms. Therefore, the detector module is equipped with a median filter to suppress packet loss's effect on evaluating the residual signal. Tests and validations of the proposed approach are performed on a two-tank system and a continuous stirred tank reactor. According to evaluation results conducted on two testbeds, the proposed method accurately detects deception attacks even when there is packet loss.
引用
收藏
页码:726 / 749
页数:24
相关论文
共 48 条
  • [1] Inexact induced L2 observer-based control of polytopic LPV systems: application to clutchless automated manual transmission of pure electric vehicles
    Abbasghorbani, Motahare
    Asemani, Mohammad Hassan
    Vafamand, Navid
    Mobayen, Saleh
    [J]. IET CONTROL THEORY AND APPLICATIONS, 2020, 14 (20) : 3652 - 3662
  • [2] Security of interdependent and identical networked control systems
    Amin, Saurabh
    Schwartz, Galina A.
    Sastry, S. Shankar
    [J]. AUTOMATICA, 2013, 49 (01) : 186 - 192
  • [3] Amin S, 2009, LECT NOTES COMPUT SC, V5469, P31, DOI 10.1007/978-3-642-00602-9_3
  • [4] Boyd S., 1994, LINEAR MATRIX INEQUA, DOI DOI 10.1137/1.9781611970777
  • [5] Denial-of-service attack-detection techniques
    Carl, G
    Kesidis, G
    Brooks, RR
    Rai, S
    [J]. IEEE INTERNET COMPUTING, 2006, 10 (01) : 82 - 89
  • [6] An Overview on Denial-of-Service Attacks in Control Systems: Attack Models and Security Analyses
    Cetinkaya, Ahmet
    Ishii, Hideaki
    Hayakawa, Tomohisa
    [J]. ENTROPY, 2019, 21 (02)
  • [7] Networked Control Under Random and Malicious Packet Losses
    Cetinkaya, Ahmet
    Ishii, Hideaki
    Hayakawa, Tomohisa
    [J]. IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2017, 62 (05) : 2434 - 2449
  • [8] Fuzzy Peak-to-Peak Filtering for Networked Nonlinear Systems With Multipath Data Packet Dropouts
    Chang, Xiao-Heng
    Liu, Qi
    Wang, Yi-Ming
    Xiong, Jun
    [J]. IEEE TRANSACTIONS ON FUZZY SYSTEMS, 2019, 27 (03) : 436 - 446
  • [9] Detection of False Data Injection Attacks in Smart-Grid Systems
    Chen, Po-Yu
    Yang, Shusen
    McCann, Julie A.
    Lin, Jie
    Yang, Xinyu
    [J]. IEEE COMMUNICATIONS MAGAZINE, 2015, 53 (02) : 206 - 213
  • [10] A Model-Based Validated Autonomic Approach to Self-Protect Computing Systems
    Chen, Qian
    Abdelwahed, Sherif
    Erradi, Abdelkarim
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2014, 1 (05): : 446 - 460