Detection of False Data Injection Attack for Interconnected Systems

被引:0
作者
Xu, Ning [1 ]
Xu, Huiling [1 ]
Zhai, Xiaokai [2 ]
Chen, Yuqing [1 ]
Zhao, Jiajia [3 ]
机构
[1] Nanjing Univ Sci & Technol, Sch Math & Stat, Nanjing 210094, Peoples R China
[2] Suzhou Univ Sci & Technol, Sch Math & Sci, Suzhou 215009, Peoples R China
[3] Sci & Technol Complex Syst Control & Intelligent, Beijing 100074, Peoples R China
来源
2022 41ST CHINESE CONTROL CONFERENCE (CCC) | 2022年
关键词
Systems interconnected over graph; decentralized attack detection; unknown input observer; network attacks; FAULT-DETECTION; DESIGN;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Decentralized detection of network attacks for interconnected systems is addressed in this paper. Most of the existing researches on decentralized attack detection are focused on multi-agent systems and no related research has been done on systems interconnected over graph with complex spatial terms. This paper will discuss from the following three aspects. Firstly, to isolate the effect of neighbor subsystems, the problem of dealing with spatial terms is analyzed. The unknown input terms are introduced to decouple the interconnected structure of the interconnected system, which will be eliminated from measurement output equation based on the generalized inverse theory. Secondly, the sufficient conditions for the existence of the decentralized attack detector and attack detection principle is given. Detection threshold value is calculated by the estimation error under no attack. Finally, detectability analysis is given. Two illustrated examples are provided to demonstrate the effectiveness of the proposed strategy.
引用
收藏
页码:939 / 946
页数:8
相关论文
共 20 条
  • [1] Centralized Versus Decentralized Detection of Attacks in Stochastic Interconnected Systems
    Anguluri, Rajasekhar
    Katewa, Vaibhav
    Pasqualetti, Fabio
    [J]. IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2020, 65 (09) : 3903 - 3910
  • [2] Distributed cooperative control of autonomous multi-agent UAV systems using smooth control
    Belkacem, Kada
    Munawar, Khalid
    Muhammad, Shafique Shaikh
    [J]. JOURNAL OF SYSTEMS ENGINEERING AND ELECTRONICS, 2020, 31 (06) : 1297 - 1307
  • [3] Design of unknown input observers and robust fault detection filters
    Chen, J
    Patton, RJ
    Zhang, HY
    [J]. INTERNATIONAL JOURNAL OF CONTROL, 1996, 63 (01) : 85 - 105
  • [4] Potential of Intelligent Transportation Systems in Mitigating Adverse Weather Impacts on Road Mobility: A Review
    Dey, Kakan C.
    Mishra, Ashok
    Chowdhury, Mashrur
    [J]. IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2015, 16 (03) : 1107 - 1119
  • [5] Security correction control of stochastic cyber-physical systems subject to false data injection attacks with heterogeneous effects
    Dong, Lewei
    Xu, Huiling
    Wei, Xinjiang
    Hu, Xin
    [J]. ISA TRANSACTIONS, 2022, 123 : 1 - 13
  • [6] Stuxnet and the Future of Cyber War
    Farwell, James P.
    Rohozinski, Rafal
    [J]. SURVIVAL, 2011, 53 (01) : 23 - 40
  • [7] Heng Zhang, 2015, 2015 11th IEEE International Conference and Workshops on Automatic Face and Gesture Recognition (FG), P1, DOI 10.1109/FG.2015.7163146
  • [8] Distributed control design for systems interconnected over an arbitrary graph
    Langbort, C
    Chandra, RS
    D'Andrea, R
    [J]. IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2004, 49 (09) : 1502 - 1519
  • [9] Langner R., 2011, IEEE SECUR PRIV, V9, P4
  • [10] The 2015 Ukraine Blackout: Implications for False Data Injection Attacks
    Liang, Gaoqi
    Weller, Steven R.
    Zhao, Junhua
    Luo, Fengji
    Dong, Zhao Yang
    [J]. IEEE TRANSACTIONS ON POWER SYSTEMS, 2017, 32 (04) : 3317 - 3318