Security Against False Data-Injection Attack in Cyber-Physical Systems

被引:79
作者
Chattopadhyay, Arpan [1 ]
Mitra, Urbashi [2 ]
机构
[1] Indian Inst Technol, Dept Elect Engn, New Delhi 110016, India
[2] Univ Southern Calif, Dept Elect Engn, Los Angeles, CA 90089 USA
来源
IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS | 2020年 / 7卷 / 02期
关键词
Cyber-physical system (CPS) security; false data-injection (FDI) attack; Kalman filter; secure remote estimation; stochastic approximation;
D O I
10.1109/TCNS.2019.2927594
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, secure, remote estimation of a linear Gaussian process via observations at multiple sensors is considered. Such a framework is relevant to many cyber-physical systems and Internet-of-things applications. Sensors make sequential measurements that are shared with a fusion center; the fusion center applies a filtering algorithm to make its estimates. The challenge is the presence of a few unknown malicious sensors which can inject anomalous observations to skew the estimates at the fusion center. The set of malicious sensors may be time varying. The problems of malicious sensor detection and secure estimation are considered. First, an algorithm for secure estimation is proposed. The proposed estimation scheme uses a novel filtering and learning algorithm, where an optimal filter is learned over time by using the sensor observations in order to filter out malicious sensor observations while retaining other sensor measurements. Next, a novel detector to detect injection attacks on an unknown sensor subset is developed. Numerical results demonstrate up to 3-dB gain in the mean-squared error and up to 75% higher attack detection probability under a small false alarm rate constraint, against a competing algorithm that requires additional side information.
引用
收藏
页码:1015 / 1027
页数:13
相关论文
共 25 条
[1]  
Anderson Brian D. O., 2012, OPTIMAL FILTERING SE
[2]  
[Anonymous], 2007, DYNAMIC PROGRAMMING
[3]  
Borkar V. S., 2009, Stochastic Approximation: A Dynamical Systems Viewpoint, V48
[4]  
Chattopadhyay A., 2017, ARXIV170708074
[5]   Sequential Decision Algorithms for Measurement-Based Impromptu Deployment of a Wireless Relay Network Along a Line [J].
Chattopadhyay, Arpan ;
Coupechoux, Marceau ;
Kumar, Anurag .
IEEE-ACM TRANSACTIONS ON NETWORKING, 2016, 24 (05) :2663-2677
[6]  
Chatzipetrou P., 2018, 2018 5 INT C EM APPL, P1, DOI DOI 10.1109/CISS.2018.8362307
[7]   Optimal Attack Strategies Subject to Detection Constraints Against Cyber-Physical Systems [J].
Chen, Yuan ;
Kar, Soummya ;
Moura, Jose M. F. .
IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, 2018, 5 (03) :1157-1168
[8]  
Chen Y, 2016, IEEE DECIS CONTR P, P1125, DOI 10.1109/CDC.2016.7798418
[9]   Secure Estimation and Control for Cyber-Physical Systems Under Adversarial Attacks [J].
Fawzi, Hamza ;
Tabuada, Paulo ;
Diggavi, Suhas .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2014, 59 (06) :1454-1467
[10]   Distributed Attack Detection and Secure Estimation of Networked Cyber-Physical Systems Against False Data Injection Attacks and Jamming Attacks [J].
Guan, Yanpeng ;
Ge, Xiaohua .
IEEE TRANSACTIONS ON SIGNAL AND INFORMATION PROCESSING OVER NETWORKS, 2018, 4 (01) :48-59