Secure remote state estimation against linear man-in-the-middle attacks using watermarking

被引:73
|
作者
Huang, Jiahao [1 ]
Ho, Daniel W. C. [2 ]
Li, Fangfei [1 ,3 ]
Yang, Wen [1 ]
Tang, Yang [1 ]
机构
[1] East China Univ Sci & Technol, Key Lab Adv Control & Optimizat Chem Proc, Minist Educ, Shanghai 200237, Peoples R China
[2] City Univ Hong Kong, Dept Math, Kowloon, Hong Kong, Peoples R China
[3] East China Univ Sci & Technol, Dept Math, Shanghai 200237, Peoples R China
基金
中国国家自然科学基金;
关键词
Cyber-physical systems; Cyber security; Man-in-the-middle attack; Remote state estimation; Watermarking; CONTROL-SYSTEMS; CYBER;
D O I
10.1016/j.automatica.2020.109182
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, an attack defense method is proposed to address the secure remote state estimation problem caused by linear man-in-the-middle attacks in cyber-physical systems (CPS). We utilize the pseudo-random number as a watermarking to encrypt and decrypt the data transmitted through the wireless network. Via the proposed method, the transmitted data in the normal operation can be recovered. Since the data modified by the attacker can be marked with the watermarking, the chi(2) detector is capable of detecting the attack. For three different attack scenarios, we analyze the evolution of the remote estimation error covariances and the detection performance, respectively. In the sense of minimizing the estimation error covariance, the optimal parameter set of the watermarking is derived. Furthermore, the proposed method can even be extended to detect the false data injection attack and the replay attack. Finally, several examples are provided to illustrate the derived results. (C) 2020 Elsevier Ltd. All rights reserved.
引用
收藏
页数:13
相关论文
共 50 条
  • [1] Mobile Authentication Secure Against Man-In-The-Middle Attacks
    Bicakci, Kemal
    Unal, Devrim
    Ascioglu, Nadir
    Adalier, Oktay
    9TH INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND COMMUNICATIONS (FNC'14) / THE 11TH INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS AND PERVASIVE COMPUTING (MOBISPC'14) / AFFILIATED WORKSHOPS, 2014, 34 : 323 - 329
  • [2] Optimal Linear Encryption Against Stealthy Attacks on Remote State Estimation
    Shang, Jun
    Chen, Maoyin
    Chen, Tongwen
    IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2021, 66 (08) : 3592 - 3607
  • [3] Stochastic Detector Against Linear Deception Attacks on Remote State Estimation
    Li, Yuzhe
    Chen, Tongwen
    2016 IEEE 55TH CONFERENCE ON DECISION AND CONTROL (CDC), 2016, : 6291 - 6296
  • [4] Two Practical Man-In-The-Middle Attacks on Bluetooth Secure Simple Pairing and Countermeasures
    Haataja, Keijo
    Toivanen, Pekka
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2010, 9 (01) : 384 - 392
  • [5] Taxonomy of Man-in-the-Middle Attacks on HTTPS
    Stricot-Tarboton, Shaun
    Chaisiri, Sivadon
    Ko, Ryan K. L.
    2016 IEEE TRUSTCOM/BIGDATASE/ISPA, 2016, : 527 - 534
  • [6] A Watermarking Strategy Against Linear Deception Attacks on Remote State Estimation Under K-L Divergence
    Wang, Di
    Huang, Jiahao
    Tang, Yang
    Li, Fangfei
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2021, 17 (05) : 3273 - 3281
  • [7] DoubleCheck: Multi-path Verification Against Man-in-the-Middle Attacks
    Alicherry, Mansoor
    Keromytis, Angelos D.
    ISCC: 2009 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS, VOLS 1 AND 2, 2009, : 556 - 562
  • [8] Linear Attacks Against Remote State Estimation: Performance Analysis Under an Encryption Scheme
    Liu, Hanxiao
    Ni, Yuqing
    Wang, Xiaofan
    Xie, Lihua
    IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, 2024, 11 (04): : 1812 - 1824
  • [9] On Information Fusion in Optimal Linear FDI Attacks Against Remote State Estimation
    Zhou, Jing
    Shang, Jun
    Chen, Tongwen
    IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, 2023, 10 (04): : 2085 - 2096
  • [10] Security and usability aspects of Man-in-the-Middle attacks on ZRTP
    Petraschek, Martin
    Hoeher, Thomas
    Jung, Oliver
    Hlavacs, Helmut
    Gansterer, Wilfried
    JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2008, 14 (05) : 673 - 692