Design of False Data Injection Attacks in Cyber-Physical Systems

被引:23
作者
Padhan, Sushree [1 ]
Turuk, Ashok Kumar [1 ]
机构
[1] Natl Inst Technol Rourkela, Dept Comp Sci & Engn, Rourkela 769008, Odisha, India
关键词
Cyber-physical systems; FDI attacks; State estimation error; System security analysis; STATE ESTIMATION; ACTUATOR;
D O I
10.1016/j.ins.2022.06.082
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cyber-physical systems (CPSs) are more vulnerable to false data injection (FDI) attacks. An attacker can launch an FDI attack at any chosen location in the CPS. It is required to analyze the system's behaviour in the presence of FDI attacks rather than analyzing attacks at a specific location. In this paper, we consider security in CPS due to FDI attacks at a single as well as multiple locations. The CPS is modeled as a discrete linear time-invariant system with white Gaussian noise. The system is equipped with a Kalman filter as a state estimator and a Chi-square detector for attack detection. We studied FDI attacks at the sensor, actuator, and physical system. Attackers may guess the system parameters in the worst-case and remain undetectable by carefully designing the attack sequences. The attacker always attempts to increase the state estimation error in the system. Based on the system model, we have identified seven kinds of FDI attacks and analyzed their effects on the system's security. It is found that the attacker can produce bounded errors in some cases and unbounded errors in some others. Simulation of the attacks on the system model is performed through numerical examples to illustrate their effectiveness. (c) 2022 Elsevier Inc. All rights reserved.
引用
收藏
页码:825 / 843
页数:19
相关论文
共 33 条
[1]  
Ahmad I, 2018, 2018 1ST INTERNATIONAL CONFERENCE ON COMPUTER APPLICATIONS & INFORMATION SECURITY (ICCAIS' 2018)
[2]   LQ Secure Control for Cyber-Physical Systems Against Sparse Sensor and Actuator Attacks [J].
An, Liwei ;
Yang, Guang-Hong .
IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, 2019, 6 (02) :833-841
[3]  
[Anonymous], 2010, Preprints of the 1st Workshop on Secure Control Systems
[4]   Survey of false data injection in smart power grid: Attacks, countermeasures and challenges [J].
Aoufi, Souhila ;
Derhab, Abdelouahid ;
Guerroumi, Mohamed .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 54
[5]   On Kalman Filtering with Compromised Sensors: Attack Stealthiness and Performance Bounds [J].
Bai, Cheng-Zong ;
Gupta, Vijay ;
Pasqualetti, Fabio .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2017, 62 (12) :6641-6648
[6]  
Cao XH, 2017, ASIA CONTROL CONF AS, P946, DOI 10.1109/ASCC.2017.8287298
[7]  
Chattopadhyay A., 2019, IEEE T CONTROL NETW
[8]   Resilient State Estimation and Control of Cyber-Physical Systems Against False Data Injection Attacks on Both Actuator and Sensors [J].
Chen, Guoxi ;
Zhang, Ya ;
Gu, Shiyi ;
Hu, Wenjun .
IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, 2022, 9 (01) :500-510
[9]   Secure State Estimation and Control of Cyber-Physical Systems: A Survey [J].
Ding, Derui ;
Han, Qing-Long ;
Ge, Xiaohua ;
Wang, Jun .
IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2021, 51 (01) :176-190
[10]   Distributed Krein space-based attack detection over sensor networks under deception attacks [J].
Ge, Xiaohua ;
Han, Qing-Long ;
Zhong, Maiying ;
Zhang, Xian-Ming .
AUTOMATICA, 2019, 109