Multilevel Fine Fingerprint Authentication Method for Key Operating Equipment Identification in Cyber-Physical Systems

被引:9
作者
Yang, Li [1 ]
Wen, Chenglin [2 ,3 ]
Wen, Tao [4 ]
机构
[1] Hangzhou Dianzi Univ, Sch Cyberspace, Hangzhou 310018, Peoples R China
[2] Guangdong Univ Petrochem Technol, Sch Automat, Maoming 525000, Peoples R China
[3] Hangzhou Dianzi Univ, Sch Automat, Hangzhou 310018, Peoples R China
[4] Beijing Jiaotong Univ, Sch Elect & Informat Engn, Beijing 100044, Peoples R China
基金
中国国家自然科学基金;
关键词
Cyber-physical systems; Informatics; Cyber-physical system (CPS); multigranular feature extraction; multilevel mathematical representation; multiscale matching; STATE ESTIMATION; INTERNET; STRATEGY; ATTACKS; NETWORK;
D O I
10.1109/TII.2022.3193955
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The key equipment in a cyber-physical system (CPS) can be changed or replaced by untrusted equipment, which causes the system to make incorrect decisions, which threatens people's lives and property security. Inspired by the identification of human genes, this research establishes a data fingerprint identification method for equipment. This method provides a security guarantee for the operation of a CPS. Thus, this research makes three contributions. First, it is the first attempt to represent device data information with a mathematical representation model based on multiorder terms. Second, we originally attempt to establish a multigranularity feature extraction method. Then, for the first time, we try to propose different scale matching methods for different granularity features. In addition, an F-404 aircraft example is used to verify the new method. The experimental results show that stealthy false data attacks can bypass the ${\chi <^>{2}}$ detector and destroy the operation of key equipment. However, the method proposed in this article can detect stealthy false data attacks and alert managers so that they can deal with the attacks in time; hence, the method proposed in this article is better than the ${\chi <^>{2}}$ detector. Similarly, we contrast the proposed method with recent competitor schemes and provide tangible evidence of the effectiveness of the proposed solution.
引用
收藏
页码:1217 / 1226
页数:10
相关论文
共 31 条
[1]  
Ahmed Chuadhry Mujeeb, 2020, WiSec '20: Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, P219, DOI 10.1145/3395351.3399364
[2]  
Belenko V., 2019, 2019 IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL CYBER PHYSICAL SYSTEMS (ICPS 2019), P1
[3]   On the Security and Privacy Challenges of Virtual Assistants [J].
Bolton, Tom ;
Dargahi, Tooska ;
Belguith, Sana ;
Al-Rakhami, Mabrook S. ;
Sodhro, Ali Hassan .
SENSORS, 2021, 21 (07)
[4]   Checking is Believing: Event-Aware Program Anomaly Detection in Cyber-Physical Systems [J].
Cheng, Long ;
Tian, Ke ;
Yao, Danfeng ;
Sha, Lui ;
Beyah, Raheem A. .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (02) :825-842
[5]   A Survey on Model-Based Distributed Control and Filtering for Industrial Cyber-Physical Systems [J].
Ding, Derui ;
Han, Qing-Long ;
Wang, Zidong ;
Ge, Xiaohua .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2019, 15 (05) :2483-2499
[6]  
Furey E., 2019, 2019 INT S NETWORKS, P1, DOI [10.1109/ISNCC.2019.8909098, DOI 10.1109/ISNCC.2019.8909098]
[7]   R-Print: A System Residuals-Based Fingerprinting for Attack Detection in Industrial Cyber-Physical Systems [J].
Hong, Zhen ;
Yang, Chaofeng ;
Yu, Li .
IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2021, 68 (11) :11458-11469
[8]  
Jain Vinod, 2021, Proceedings of the 2021 International Conference on Artificial Intelligence and Smart Systems (ICAIS), P1122, DOI 10.1109/ICAIS50930.2021.9396045
[9]   Real-Time Rejection and Mitigation of Time Synchronization Attacks on the Global Positioning System [J].
Khalajmehrabadi, Ali ;
Gatsis, Nikolaos ;
Akopian, David ;
Taha, Ahmad F. .
IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2018, 65 (08) :6425-6435
[10]   A comprehensive survey of authentication methods in Internet-of-Things and its [J].
Kumar, Ashish ;
Saha, Rahul ;
Conti, Mauro ;
Kumar, Gulshan ;
Buchanan, William J. ;
Kim, Tai Hoon .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2022, 204