Detection of Stealthy False Data Injection Attacks Against Cyber-Physical Systems: A Stochastic Coding Scheme

被引:9
作者
Guo, Haibin [1 ,2 ]
Pang, Zhonghua [3 ]
Sun, Jian [1 ,2 ]
Li, Jun [4 ]
机构
[1] Beijing Inst Technol, Sch Automat, State Key Lab Intelligent Control & Decis Complex, Beijing 100081, Peoples R China
[2] Beijing Inst Technol, Chongqing Innovat Ctr, Chongqing 401120, Peoples R China
[3] North China Univ Technol, Key Lab Fieldbus Technol & Automat Beijing, Beijing 100144, Peoples R China
[4] China Ind Control Syst Cyber Emergency Response T, Beijing 100040, Peoples R China
基金
国家重点研发计划; 中国国家自然科学基金; 北京市自然科学基金;
关键词
Attack detection; cyber-physical systems (CPSs); stealthy FDI attacks; stochastic coding; INTEGRITY ATTACKS; PREDICTIVE CONTROL; STATE ESTIMATION;
D O I
10.1007/s11424-022-1005-z
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
This paper, from the view of a defender, addresses the security problem of cyber-physical systems (CPSs) subject to stealthy false data injection (FDI) attacks that cannot be detected by a residual-based anomaly detector without other defensive measures. To detect such a class of FDI attacks, a stochastic coding scheme, which codes the sensor measurement with a Gaussian stochastic signal at the sensor side, is proposed to assist an anomaly detector to expose the FDI attack. In order to ensure the system performance in the normal operational context, a decoder is adopted to decode the coded sensor measurement when received at the controller side. With this detection scheme, the residual under the attack can be significantly different from that in the normal situation, and thus trigger an alarm. The design condition of the coding signal covariance is derived to meet the constraints of false alarm rate and attack detection rate. To minimize the trace of the coding signal covariance, the design problem of the coding signal is converted into a constraint non-convex optimization problem, and an estimation-optimization iteration algorithm is presented to obtain a numerical solution of the coding signal covariance. A numerical example is given to verify the effectiveness of the proposed scheme.
引用
收藏
页码:1668 / 1684
页数:17
相关论文
共 29 条
  • [1] Data-injection attacks in stochastic control systems: Detectability and performance tradeoffs
    Bai, Cheng-Zong
    Pasqualetti, Fabio
    Gupta, Vijay
    [J]. AUTOMATICA, 2017, 82 : 251 - 260
  • [2] Chattopadhyay A., 2018, INFORM SCI SYSTEMS C, P1, DOI [DOI 10.1109/CISS.2018.8362307, 10.1109/CISS.2018.8362307]
  • [3] Cyber-Physical Attacks With Control Objectives
    Chen, Yuan
    Kar, Soummya
    Moura, Jose M. F.
    [J]. IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2018, 63 (05) : 1418 - 1425
  • [4] Was Stuxnet an Act of War? Decoding a Cyberattack
    Fidler, David P.
    [J]. IEEE SECURITY & PRIVACY, 2011, 9 (04) : 56 - 59
  • [5] Secure State Estimation Against Integrity Attacks: A Gaussian Mixture Model Approach
    Guo, Ziyang
    Shi, Dawei
    Quevedo, Daniel E.
    Shi, Ling
    [J]. IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2019, 67 (01) : 194 - 207
  • [6] Worst-case stealthy innovation-based linear attack on remote state estimation
    Guo, Ziyang
    Shi, Dawei
    Johansson, Karl Henrik
    Shi, Ling
    [J]. AUTOMATICA, 2018, 89 : 117 - 124
  • [7] Optimal Linear Cyber-Attack on Remote State Estimation
    Guo, Ziyang
    Shi, Dawei
    Johansson, Karl Henrik
    Shi, Ling
    [J]. IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, 2017, 4 (01): : 4 - 13
  • [8] Deep reinforcement learning for optimal denial-of-service attacks scheduling
    Hou, Fangyuan
    Sun, Jian
    Yang, Qiuling
    Pang, Zhonghua
    [J]. SCIENCE CHINA-INFORMATION SCIENCES, 2022, 65 (06)
  • [9] Kalman R.E., 1960, J BASIC ENG, V82, P35, DOI DOI 10.1115/1.3662552
  • [10] The Performance and Limitations of ε-Stealthy Attacks on Higher Order Systems
    Kung, Enoch
    Dey, Subhrakanti
    Shi, Ling
    [J]. IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2017, 62 (02) : 941 - 947