Detection of stealthy false data injection attacks against networked control systems via active data modification

被引:120
作者
Pang, Zhong-Hua [1 ]
Fan, Lan-Zhi [1 ]
Sun, Jian [2 ]
Liu, Kun [2 ]
Liu, Guo-Ping [3 ]
机构
[1] North China Univ Technol, Key Lab Fieldbus Technol & Automat Beijing, Beijing 100144, Peoples R China
[2] Beijing Inst Technol, Sch Automat, State Key Lab Intelligent Control & Decis Complex, Beijing 100081, Peoples R China
[3] Wuhan Univ, Dept Artificial Intelligence & Automat, Wuhan 430072, Peoples R China
基金
国家重点研发计划; 中国国家自然科学基金;
关键词
Networked control systems (NCSs); Stealthy false data injection attacks; Attack design; Attack detection; Active data modification;
D O I
10.1016/j.ins.2020.06.074
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper investigates the design and detection problems of stealthy false data injection (FDI) attacks against networked control systems from the different perspectives of an attacker and a defender, respectively. First, a Kalman filter-based output tracking control system is presented, where stealthy FDI attacks are designed for its feedback and forward channels so as to destroy the system performance while bypassing a traditional residual based detector. Second, to successfully detect such two-channel stealthy attacks, an active data modification scheme is proposed, by which the measurement and control data are amended before transmitting them through communication networks. Theoretical analysis is then carried out for both ideal and practical cases to evaluate the effectiveness of the detection scheme. An interesting finding is that the attacks designed based on a false model obtained from those modified data can remain stealthy. Finally, simulation results are provided to validate the proposed attack design and detection schemes. (C) 2020 Elsevier Inc. All rights reserved.
引用
收藏
页码:192 / 205
页数:14
相关论文
共 37 条
[1]   Risk-Sensitive Control Under Markov Modulated Denial-of-Service (DoS) Attack Strategies [J].
Befekadu, Getachew K. ;
Gupta, Vijay ;
Antsaklis, Panos J. .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2015, 60 (12) :3299-3304
[2]   Statistical Tests for Detecting Granger Causality [J].
Chopra, Ribhu ;
Murthy, Chandra Ramabhadra ;
Rangarajan, Govindan .
IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2018, 66 (22) :5803-5816
[3]   False Data Injection on State Estimation in Power Systems-Attacks, Impacts, and Defense: A Survey [J].
Deng, Ruilong ;
Xiao, Gaoxi ;
Lu, Rongxing ;
Liang, Hao ;
Vasilakos, Athanasios V. .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2017, 13 (02) :411-423
[4]   A Survey on Model-Based Distributed Control and Filtering for Industrial Cyber-Physical Systems [J].
Ding, Derui ;
Han, Qing-Long ;
Wang, Zidong ;
Ge, Xiaohua .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2019, 15 (05) :2483-2499
[5]   Security Control for Discrete-Time Stochastic Nonlinear Systems Subject to Deception Attacks [J].
Ding, Derui ;
Wang, Zidong ;
Han, Qing-Long ;
Wei, Guoliang .
IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2018, 48 (05) :779-789
[6]   Secure Cooperative Event-Triggered Control of Linear Multiagent Systems Under DoS Attacks [J].
Feng, Zhi ;
Hu, Guoqiang .
IEEE TRANSACTIONS ON CONTROL SYSTEMS TECHNOLOGY, 2020, 28 (03) :741-752
[7]   Distributed Krein space-based attack detection over sensor networks under deception attacks [J].
Ge, Xiaohua ;
Han, Qing-Long ;
Zhong, Maiying ;
Zhang, Xian-Ming .
AUTOMATICA, 2019, 109
[8]   Distributed Event-Triggered Estimation Over Sensor Networks: A Survey [J].
Ge, Xiaohua ;
Han, Qing-Long ;
Zhang, Xian-Ming ;
Ding, Lei ;
Yang, Fuwen .
IEEE TRANSACTIONS ON CYBERNETICS, 2020, 50 (03) :1306-1320
[9]   Distributed Attack Detection and Secure Estimation of Networked Cyber-Physical Systems Against False Data Injection Attacks and Jamming Attacks [J].
Guan, Yanpeng ;
Ge, Xiaohua .
IEEE TRANSACTIONS ON SIGNAL AND INFORMATION PROCESSING OVER NETWORKS, 2018, 4 (01) :48-59
[10]   Worst-case stealthy innovation-based linear attack on remote state estimation [J].
Guo, Ziyang ;
Shi, Dawei ;
Johansson, Karl Henrik ;
Shi, Ling .
AUTOMATICA, 2018, 89 :117-124