False data injection attacks with complete stealthiness in cyber-physical systems: A self-generated approach

被引:219
|
作者
Zhang, Tian-Yu [1 ]
Ye, Dan [1 ,2 ]
机构
[1] Northeastern Univ, Coll Informat Sci & Engn, Shenyang 110819, Liaoning, Peoples R China
[2] Northeastern Univ, State Key Lab Synthet Automat Proc Ind, Shenyang 110819, Peoples R China
基金
中国国家自然科学基金;
关键词
Cyber-physical system security; False data injection attacks; State estimation; Complete stealthiness; STATE ESTIMATION; SECURE CONTROL;
D O I
10.1016/j.automatica.2020.109117
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we consider the security problem of dynamic state estimations in cyber-physical systems (CPSs) when the sensors are compromised by false data injection (FDI) attacks with complete stealthiness. The FDI attacks with complete stealthiness can completely remove its influences on monitored residuals, which have better stealthy performance against residual-based detectors than existing FDI attacks. Based on self-generated FDI attacks that are independent of real-time data of CPSs, we propose the necessary and sufficient condition of attack parameters such that FDI attacks can achieve complete stealthiness. Furthermore, we introduce the energy stealthiness of FDI attacks, which is a special case of complete stealthiness and makes the accumulated attack energy on residuals is bounded. Then, the existence and design conditions of FDI attacks with energy stealthiness are given. Finally, the superiority of the FDI attacks with complete stealthiness is demonstrated by the IEEE 6 bus power system. (C) 2020 Elsevier Ltd. All rights reserved.
引用
收藏
页数:12
相关论文
共 50 条
  • [41] Reachable set control for nonlinear Markov jump cyber-physical systems with false data injection attacks
    Fan, Xiu-Yang
    Lin, Wen-Juan
    Liu, Zhen
    Zhao, Liang
    JOURNAL OF THE FRANKLIN INSTITUTE-ENGINEERING AND APPLIED MATHEMATICS, 2024, 361 (01): : 224 - 233
  • [42] Detection of Stealthy False Data Injection Attacks Against Cyber-Physical Systems: A Stochastic Coding Scheme
    GUO Haibin
    PANG Zhonghua
    SUN Jian
    LI Jun
    Journal of Systems Science & Complexity, 2022, 35 (05) : 1668 - 1684
  • [43] False Data Injection Attack for Cyber-Physical Systems With Resource Constraint
    Li, Fangfei
    Tang, Yang
    IEEE TRANSACTIONS ON CYBERNETICS, 2020, 50 (02) : 729 - 738
  • [44] Estimation Performance of Cyber-Physical Systems Attacked by False Data Injection
    Du, Yanan
    Li, Ning
    Zhang, Yonggang
    2021 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2021,
  • [45] Cyber-physical system defense strategy considering loaded false data injection attacks
    Wang D.
    Huang L.
    Liu J.
    Lü L.
    Ruan Z.
    Lü L.
    Dianli Xitong Baohu yu Kongzhi/Power System Protection and Control, 2019, 47 (01): : 28 - 34
  • [46] Multiplicative Attacks with Essential Stealthiness in Sensor and Actuator Loops against Cyber-Physical Systems
    Chen, Jingzhao
    Liu, Bin
    Li, Tengfei
    Hu, Yong
    SENSORS, 2023, 23 (04)
  • [47] False Data Injection Detection in Cyber-Physical System
    Sousa, Alan E.
    Messai, Nadhir
    Manamanni, Noureddine
    IFAC PAPERSONLINE, 2022, 55 (06): : 420 - 426
  • [48] Online Generative Adversary Network Based Measurement Recovery in False Data Injection Attacks: A Cyber-Physical Approach
    Li, Yuancheng
    Wang, Yuanyuan
    Hu, Shiyan
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2020, 16 (03) : 2031 - 2043
  • [49] Distributed Attack Detection and Secure Estimation of Networked Cyber-Physical Systems Against False Data Injection Attacks and Jamming Attacks
    Guan, Yanpeng
    Ge, Xiaohua
    IEEE TRANSACTIONS ON SIGNAL AND INFORMATION PROCESSING OVER NETWORKS, 2018, 4 (01): : 48 - 59
  • [50] Security correction control of stochastic cyber-physical systems subject to false data injection attacks with heterogeneous effects
    Dong, Lewei
    Xu, Huiling
    Wei, Xinjiang
    Hu, Xin
    ISA TRANSACTIONS, 2022, 123 : 1 - 13