Detection and Analysis Against Linear Deception Attacks via Watermarking Strategy

被引:0
作者
Yu, Lianchi [1 ]
Song, Yunbo [1 ]
Ye, Dan [1 ]
机构
[1] Northeastern Univ, Coll Informat Sci & Engn, Shenyang, Peoples R China
来源
2023 IEEE 2ND INDUSTRIAL ELECTRONICS SOCIETY ANNUAL ON-LINE CONFERENCE, ONCON | 2023年
基金
中国国家自然科学基金;
关键词
Cyber-physical systems; watermarking; K-L divergence detector;
D O I
10.1109/ONCON60463.2023.10430852
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
The detection concerns associated with linear deception attacks in cyber-physical systems are addressed in this paper. We consider a general linear attack strategy that is based on arbitrary Gaussian distributions with varying means, with the cumulative error covariance serving as a performance metric for remote state estimation. A proposed detection method utilizes Kullback-Leibler (K-L) divergence, employing a watermark to protect the sensor measurements transmitted via the wireless network. This approach enables the recovery of transmitted data during normal operation, thereby ensuring the effectiveness of remote estimation. The detection performance of the scenarios with no watermarking information and limited watermarking information is analyzed. Furthermore, the optimal linear attack is reconstructed in the information disclosure scenario, and the impact on remote state estimation performance is analyzed. Finally, numerical simulations are conducted to further illustrate theoretical results.
引用
收藏
页数:6
相关论文
共 18 条
[1]   On Kalman Filtering with Compromised Sensors: Attack Stealthiness and Performance Bounds [J].
Bai, Cheng-Zong ;
Gupta, Vijay ;
Pasqualetti, Fabio .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2017, 62 (12) :6641-6648
[2]   A systems and control perspective of CPS security [J].
Dibaji, Seyed Mehran ;
Pirani, Mohammad ;
Flamholz, David Bezalel ;
Annaswamy, Anuradha M. ;
Johansson, Karl Henrik ;
Chakrabortty, Aranya .
ANNUAL REVIEWS IN CONTROL, 2019, 47 :394-411
[3]   Secure State Estimation and Control of Cyber-Physical Systems: A Survey [J].
Ding, Derui ;
Han, Qing-Long ;
Ge, Xiaohua ;
Wang, Jun .
IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2021, 51 (01) :176-190
[4]   Attack Detection for Networked Control Systems Using Event-Triggered Dynamic Watermarking [J].
Du, Dajun ;
Zhang, Changda ;
Li, Xue ;
Fei, Minrui ;
Zhou, Huiyu .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2023, 19 (01) :351-361
[5]   Worst-case stealthy innovation-based linear attack on remote state estimation [J].
Guo, Ziyang ;
Shi, Dawei ;
Johansson, Karl Henrik ;
Shi, Ling .
AUTOMATICA, 2018, 89 :117-124
[6]   Optimal Linear Cyber-Attack on Remote State Estimation [J].
Guo, Ziyang ;
Shi, Dawei ;
Johansson, Karl Henrik ;
Shi, Ling .
IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, 2017, 4 (01) :4-13
[7]   Secure remote state estimation against linear man-in-the-middle attacks using watermarking [J].
Huang, Jiahao ;
Ho, Daniel W. C. ;
Li, Fangfei ;
Yang, Wen ;
Tang, Yang .
AUTOMATICA, 2020, 121
[8]   EEFED: Personalized Federated Learning of Execution&Evaluation Dual Network for CPS Intrusion Detection [J].
Huang, Xianting ;
Liu, Jing ;
Lai, Yingxu ;
Mao, Beifeng ;
Lyu, Hongshuo .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 :41-56
[9]   Optimal stealthy false data injection attacks in cyber-physical systems [J].
Li, Yi-Gang ;
Yang, Guang-Hong .
INFORMATION SCIENCES, 2019, 481 :474-490
[10]  
Li YZ, 2016, IEEE DECIS CONTR P, P6291, DOI 10.1109/CDC.2016.7799237