False data injection attacks with complete stealthiness in cyber-physical systems: A self-generated approach

被引:219
|
作者
Zhang, Tian-Yu [1 ]
Ye, Dan [1 ,2 ]
机构
[1] Northeastern Univ, Coll Informat Sci & Engn, Shenyang 110819, Liaoning, Peoples R China
[2] Northeastern Univ, State Key Lab Synthet Automat Proc Ind, Shenyang 110819, Peoples R China
基金
中国国家自然科学基金;
关键词
Cyber-physical system security; False data injection attacks; State estimation; Complete stealthiness; STATE ESTIMATION; SECURE CONTROL;
D O I
10.1016/j.automatica.2020.109117
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we consider the security problem of dynamic state estimations in cyber-physical systems (CPSs) when the sensors are compromised by false data injection (FDI) attacks with complete stealthiness. The FDI attacks with complete stealthiness can completely remove its influences on monitored residuals, which have better stealthy performance against residual-based detectors than existing FDI attacks. Based on self-generated FDI attacks that are independent of real-time data of CPSs, we propose the necessary and sufficient condition of attack parameters such that FDI attacks can achieve complete stealthiness. Furthermore, we introduce the energy stealthiness of FDI attacks, which is a special case of complete stealthiness and makes the accumulated attack energy on residuals is bounded. Then, the existence and design conditions of FDI attacks with energy stealthiness are given. Finally, the superiority of the FDI attacks with complete stealthiness is demonstrated by the IEEE 6 bus power system. (C) 2020 Elsevier Ltd. All rights reserved.
引用
收藏
页数:12
相关论文
共 50 条
  • [21] Analysis of cascading failures of power cyber-physical systems considering false data injection attacks
    Li, Jian
    Sun, Chaowei
    Su, Qingyu
    GLOBAL ENERGY INTERCONNECTION-CHINA, 2021, 4 (02): : 204 - 213
  • [22] Learning Secure Control Design for Cyber-Physical Systems under False Data Injection Attacks
    Fei, Cheng
    Shen, Jun
    Qiu, Hongling
    Zhang, Zhipeng
    Xing, Wei
    IEEE Transactions on Industrial Cyber-Physical Systems, 2024, 2 : 60 - 68
  • [23] On Applying Fault Detectors against False Data Injection Attacks in Cyber-Physical Control Systems
    Quyen Dinh Vu
    Tan, Rui
    Yau, David K. Y.
    IEEE INFOCOM 2016 - THE 35TH ANNUAL IEEE INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS, 2016,
  • [24] Detection of false data injection attacks in cyber-physical systems using graph convolutional network
    Vincent, Edeh
    Korki, Mehdi
    Seyedmahmoudian, Mehdi
    Stojcevski, Alex
    Mekhilef, Saad
    ELECTRIC POWER SYSTEMS RESEARCH, 2023, 217
  • [25] Collaborative Detection Method against False Data Injection Attacks in Microgrid Cyber-Physical Systems
    Xia, Zhuoqun
    Lin, Kai
    Tan, Jingjing
    Hui, Zhenzhen
    PROCEEDINGS OF THE 2024 27 TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN, CSCWD 2024, 2024, : 2406 - 2411
  • [26] Analysis of cascading failures of power cyber-physical systems considering false data injection attacks
    Jian Li
    Chaowei Sun
    Qingyu Su
    GlobalEnergyInterconnection, 2021, 4 (02) : 204 - 213
  • [27] Real-Time Detection of Cyber-Physical False Data Injection Attacks on Power Systems
    Zhou, Tailin
    Xiahou, Kaishun
    Zhang, L. L.
    Wu, Q. H.
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2021, 17 (10) : 6810 - 6819
  • [28] On Feasibility of Coordinated Time-Delay and False Data Injection Attacks on Cyber-Physical Systems
    Zhang, Zhenyong
    Deng, Ruilong
    Cheng, Peng
    Wei, Qiang
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (11) : 8720 - 8736
  • [29] Distributed Secure State Estimation for Cyber-Physical Systems Under False Data Injection Attacks
    Zhang, Xin-Yu
    Yang, Guang-Hong
    IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2024, 11 (05): : 4443 - 4455
  • [30] Detection of False-Data Injection Attacks in Cyber-Physical DC Microgrids
    Beg, Omar Ali
    Johnson, Taylor T.
    Davoudi, Ali
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2017, 13 (05) : 2693 - 2703