False data injection attacks with complete stealthiness in cyber-physical systems: A self-generated approach

被引:219
|
作者
Zhang, Tian-Yu [1 ]
Ye, Dan [1 ,2 ]
机构
[1] Northeastern Univ, Coll Informat Sci & Engn, Shenyang 110819, Liaoning, Peoples R China
[2] Northeastern Univ, State Key Lab Synthet Automat Proc Ind, Shenyang 110819, Peoples R China
基金
中国国家自然科学基金;
关键词
Cyber-physical system security; False data injection attacks; State estimation; Complete stealthiness; STATE ESTIMATION; SECURE CONTROL;
D O I
10.1016/j.automatica.2020.109117
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we consider the security problem of dynamic state estimations in cyber-physical systems (CPSs) when the sensors are compromised by false data injection (FDI) attacks with complete stealthiness. The FDI attacks with complete stealthiness can completely remove its influences on monitored residuals, which have better stealthy performance against residual-based detectors than existing FDI attacks. Based on self-generated FDI attacks that are independent of real-time data of CPSs, we propose the necessary and sufficient condition of attack parameters such that FDI attacks can achieve complete stealthiness. Furthermore, we introduce the energy stealthiness of FDI attacks, which is a special case of complete stealthiness and makes the accumulated attack energy on residuals is bounded. Then, the existence and design conditions of FDI attacks with energy stealthiness are given. Finally, the superiority of the FDI attacks with complete stealthiness is demonstrated by the IEEE 6 bus power system. (C) 2020 Elsevier Ltd. All rights reserved.
引用
收藏
页数:12
相关论文
共 50 条
  • [1] Complete stealthiness false data injection attacks against dynamic state estimation in cyber-physical systems
    Yang, Guang-Yuan
    Li, Xiao-Jian
    INFORMATION SCIENCES, 2022, 586 : 408 - 423
  • [2] Complete stealthiness false data injection attacks against dynamic state estimation in cyber-physical systems
    Yang, Guang-Yuan
    Li, Xiao-Jian
    Information Sciences, 2022, 586 : 408 - 423
  • [3] Design of False Data Injection Attacks in Cyber-Physical Systems
    Padhan, Sushree
    Turuk, Ashok Kumar
    INFORMATION SCIENCES, 2022, 608 : 825 - 843
  • [4] On the Stability of Cyber-physical Systems Under False Data Injection Attacks
    Peng D.-T.
    Dong J.-M.
    Cai Z.-M.
    Zhang C.-Q.
    Peng Q.-K.
    Zidonghua Xuebao/Acta Automatica Sinica, 2019, 45 (01): : 196 - 205
  • [5] Optimal stealthy false data injection attacks in cyber-physical systems
    Li, Yi-Gang
    Yang, Guang-Hong
    INFORMATION SCIENCES, 2019, 481 : 474 - 490
  • [6] Datadriven false data injection attacks against cyber-physical power systems
    Tian, Jiwei
    Wang, Buhong
    Li, Jing
    Konstantinou, Charalambos
    COMPUTERS & SECURITY, 2022, 121
  • [7] iAttackGen: Generative Synthesis of False Data Injection Attacks in Cyber-physical Systems
    Shahriar, Md Hasan
    Khalil, Alvi Ataur
    Rahman, Mohammad Ashiqur
    Manshaei, Mohammad Hossein
    Chen, Dong
    2021 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2021, : 200 - 208
  • [8] Stochastic Stealthy False Data Injection Attacks Against Cyber-Physical Systems
    Liu, Ruirui
    Yu, Hao
    Hao, Fei
    IEEE SYSTEMS JOURNAL, 2022, 16 (04): : 6009 - 6020
  • [9] A technique to detect and mitigate false data injection attacks in Cyber-Physical Systems
    Padhan, Sushree
    Turuk, Ashok Kumar
    COMPUTERS & SECURITY, 2025, 150
  • [10] Reachable Set Control for Cyber-Physical Systems with False Data Injection Attacks
    Fan, Xiu-Yang
    Lin, Wen-Juan
    2023 IEEE 6TH INTERNATIONAL CONFERENCE ON INDUSTRIAL CYBER-PHYSICAL SYSTEMS, ICPS, 2023,