Network steganography based security framework for cyber-physical systems

被引:7
作者
Zhang, Xiao-Guang [1 ,3 ]
Yang, Guang-Hong [1 ,2 ]
Ren, Xiu-Xiu [1 ]
机构
[1] Northeastern Univ, Coll Informat Sci & Engn, Shenyang 110819, Peoples R China
[2] Northeastern Univ, State Key Lab Synthet Automat Proc Ind, Shenyang 110819, Liaoning, Peoples R China
[3] Shanghai Intelligent Qual Technol Co Ltd, Shanghai 201801, Peoples R China
基金
中国国家自然科学基金;
关键词
Cyber-physical systems; Network steganography; Covert channel; Attack detection; Eavesdropping attack defense; REMOTE STATE ESTIMATION; ATTACKS;
D O I
10.1016/j.ins.2022.07.081
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper proposes a novel network steganography (NS) based security framework to ensure the security operation of the cyber-physical systems (CPSs). Firstly, a new covert channel is established to conceal the existence of the secret data exchange by exploiting the dynamical system's measurements with no extra communication overhead. The covert channel evades the imperceptible and statistical detections in an effective manner. Next, combining covert transmission with data consistency, a data-based attack detection methodology is explored, which is capable of detecting a broad class of cyber-attacks and differs from the existing detection methods that enhance detection performance by degrading system performance or adding redundant systems. Then, combining covert transmission with simple linear encryption, an eavesdropping defense methodology is pro-posed, which guarantees that the authorized user's estimation performance is optimal and renders the eavesdropper's error covariance unbounded. Moreover, the detection and defense methods take small memory and computational overhead of the embedded sys-tem, which ensures the ease of implementation in real-world systems. Finally, the effec-tiveness of the proposed security framework is demonstrated by a proof-of-concept implementation on a CPS prototype called permanent magnet synchronous machine (PMSM) monitoring system.(c) 2022 Elsevier Inc. All rights reserved.
引用
收藏
页码:963 / 983
页数:21
相关论文
共 41 条
  • [11] A Moving Target Defense for Securing Cyber-Physical Systems
    Griffioen, Paul
    Weerakkody, Sean
    Sinopoli, Bruno
    [J]. IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2021, 66 (05) : 2016 - 2031
  • [12] Worst-case stealthy innovation-based linear attack on remote state estimation
    Guo, Ziyang
    Shi, Dawei
    Johansson, Karl Henrik
    Shi, Ling
    [J]. AUTOMATICA, 2018, 89 : 117 - 124
  • [13] Optimal Linear Cyber-Attack on Remote State Estimation
    Guo, Ziyang
    Shi, Dawei
    Johansson, Karl Henrik
    Shi, Ling
    [J]. IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, 2017, 4 (01): : 4 - 13
  • [14] State estimation under false data injection attacks: Security analysis and system protection
    Hu, Liang
    Wang, Zidong
    Han, Qing-Long
    Liu, Xiaohui
    [J]. AUTOMATICA, 2018, 87 : 176 - 183
  • [15] Adaptive NN-Based Consensus for a Class of Nonlinear Multiagent Systems With Actuator Faults and Faulty Networks
    Jin, Xiaozheng
    Lu, Shaoyu
    Yu, Jiguo
    [J]. IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, 2022, 33 (08) : 3474 - 3486
  • [16] Steganalysis of embedding in two least-significant bits
    Ker, Andrew D.
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2007, 2 (01) : 46 - 54
  • [17] Transmission Scheduling for Remote State Estimation Over Packet Dropping Links in the Presence of an Eavesdropper
    Leong, Alex S.
    Quevedo, Daniel E.
    Dolz, Daniel
    Dey, Subhrakanti
    [J]. IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2019, 64 (09) : 3732 - 3739
  • [18] A Data-Driven Attack Detection Approach for DC Servo Motor Systems Based on Mixed Optimization Strategy
    Li, Xiao-Jian
    Shen, Xin-Yu
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2020, 16 (09) : 5806 - 5813
  • [19] Secure Control Against Replay Attacks
    Mo, Yilin
    Sinopoli, Bruno
    [J]. 2009 47TH ANNUAL ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING, VOLS 1 AND 2, 2009, : 911 - 918
  • [20] Covert Communication Over VoIP Streaming Media With Dynamic Key Distribution and Authentication
    Peng, Jinghui
    Tang, Shanyu
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2021, 68 (04) : 3619 - 3628