Secure remote state estimation against linear man-in-the-middle attacks using watermarking

被引:88
作者
Huang, Jiahao [1 ]
Ho, Daniel W. C. [2 ]
Li, Fangfei [1 ,3 ]
Yang, Wen [1 ]
Tang, Yang [1 ]
机构
[1] East China Univ Sci & Technol, Key Lab Adv Control & Optimizat Chem Proc, Minist Educ, Shanghai 200237, Peoples R China
[2] City Univ Hong Kong, Dept Math, Kowloon, Hong Kong, Peoples R China
[3] East China Univ Sci & Technol, Dept Math, Shanghai 200237, Peoples R China
基金
中国国家自然科学基金;
关键词
Cyber-physical systems; Cyber security; Man-in-the-middle attack; Remote state estimation; Watermarking; CONTROL-SYSTEMS; CYBER;
D O I
10.1016/j.automatica.2020.109182
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, an attack defense method is proposed to address the secure remote state estimation problem caused by linear man-in-the-middle attacks in cyber-physical systems (CPS). We utilize the pseudo-random number as a watermarking to encrypt and decrypt the data transmitted through the wireless network. Via the proposed method, the transmitted data in the normal operation can be recovered. Since the data modified by the attacker can be marked with the watermarking, the chi(2) detector is capable of detecting the attack. For three different attack scenarios, we analyze the evolution of the remote estimation error covariances and the detection performance, respectively. In the sense of minimizing the estimation error covariance, the optimal parameter set of the watermarking is derived. Furthermore, the proposed method can even be extended to detect the false data injection attack and the replay attack. Finally, several examples are provided to illustrate the derived results. (C) 2020 Elsevier Ltd. All rights reserved.
引用
收藏
页数:13
相关论文
共 50 条
[41]   Distributed Secure State Estimation Against Sparse Attacks: A Sensor Clustering Approach [J].
Lei, Xuqiang ;
Wen, Guanghui ;
Wang, Shuai .
2023 62ND ANNUAL CONFERENCE OF THE SOCIETY OF INSTRUMENT AND CONTROL ENGINEERS, SICE, 2023, :973-978
[42]   Secure State Estimation Against Sparse Sensor Attacks With Adaptive Switching Mechanism [J].
An, Liwei ;
Yang, Guang-Hong .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2018, 63 (08) :2596-2603
[43]   AUTOMATED MAN-IN-THE-MIDDLE ATTACK AGAINST WI-FI NETWORKS [J].
Vondracek, Martin ;
Pluskal, Jan ;
Rysavy, Ondrej .
JOURNAL OF DIGITAL FORENSICS SECURITY AND LAW, 2018, 13 (01) :59-80
[44]   Transmission scheduling for privacy-optimal encryption against eavesdropping attacks on remote state estimation [J].
Wang, Le ;
Cao, Xianghui ;
Zhang, Heng ;
Sun, Changyin ;
Zheng, Wei Xing .
AUTOMATICA, 2022, 137
[45]   Watermarking-based remote secure sequential fusion estimation under the event-triggered mechanism [J].
Deng, Junyong ;
Liu, Shuai ;
Qin, Xiaona .
JOURNAL OF THE FRANKLIN INSTITUTE-ENGINEERING AND APPLIED MATHEMATICS, 2024, 361 (12)
[46]   Optimal Privacy-Preserving Transmission Schedule Against Eavesdropping Attacks on Remote State Estimation [J].
Zou, Jiaying ;
Liu, Hanxiao ;
Liu, Chun ;
Ren, Xiaoqiang ;
Wang, Xiaofan .
IEEE CONTROL SYSTEMS LETTERS, 2024, 8 :538-543
[47]   Wiretapping via Mimicry: Short Voice Imitation Man-in-the-Middle Attacks on Crypto Phones [J].
Shirvanian, Maliheh ;
Saxena, Nitesh .
CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2014, :868-879
[48]   Implementation and Analysis of Penetration Techniques Using the Man-In-The-Middle Attack [J].
Arnaldy, Defiana ;
Perdana, Audhika Rahmat .
2019 2ND INTERNATIONAL CONFERENCE OF COMPUTER AND INFORMATICS ENGINEERING (IC2IE 2019): ARTIFICIAL INTELLIGENCE ROLES IN INDUSTRIAL REVOLUTION 4.0, 2019, :188-192
[49]   Man-in-the-middle attack against cyber-physical systems under random access protocol [J].
Zhang, Xiao-Guang ;
Yang, Guang-Hong ;
Wasly, Saud .
INFORMATION SCIENCES, 2021, 576 :708-724
[50]   Secure State Estimation against Sparse Attacks on a Time-varying Set of Sensors [J].
Li, Zishuo ;
Niazi, Muhammad Umar B. ;
Liu, Changxin ;
Mo, Yilin ;
Johansson, Karl H. .
IFAC PAPERSONLINE, 2023, 56 (02) :270-275