Previous Articles     Next Articles

Detection of Stealthy False Data Injection Attacks Against Cyber-Physical Systems:A Stochastic Coding Scheme

GUO Haibin1,2, PANG Zhonghua3, SUN Jian1,2, LI Jun4   

  1. 1. State Key Lab of Intelligent Control and Decision of Complex Systems, School of Automation, Beijing Institute of Technology, Beijing 100081, China;
    2. Beijing Institute of Technology Chongqing Innovation Center, Chongqing 401120, China;
    3. Key Laboratory of Fieldbus Technology and Automation of Beijing, North China University of Technology, Beijing 100144, China;
    3. China Industrial Control Systems Cyber Emergency Response Team, Beijing 100040, China
  • Received:2021-01-21 Revised:2021-03-05 Online:2022-10-25 Published:2022-10-12
  • Supported by:
    This research was supported by the National Natural Science Foundation of China under Grant Nos.61925303,62088101,U20B2073,61720106011,and 62173002,the National Key R&D Program of China under Grant No.2018YFB1700100,and the Beijing Natural Science Foundation under Grant No.4222045.

GUO Haibin, PANG Zhonghua, SUN Jian, LI Jun. Detection of Stealthy False Data Injection Attacks Against Cyber-Physical Systems:A Stochastic Coding Scheme[J]. Journal of Systems Science and Complexity, 2022, 35(5): 1668-1684.

This paper,from the view of a defender,addresses the security problem of cyber-physical systems (CPSs) subject to stealthy false data injection (FDI) attacks that cannot be detected by a residual-based anomaly detector without other defensive measures.To detect such a class of FDI attacks,a stochastic coding scheme,which codes the sensor measurement with a Gaussian stochastic signal at the sensor side,is proposed to assist an anomaly detector to expose the FDI attack.In order to ensure the system performance in the normal operational context,a decoder is adopted to decode the coded sensor measurement when received at the controller side.With this detection scheme,the residual under the attack can be significantly different from that in the normal situation,and thus trigger an alarm.The design condition of the coding signal covariance is derived to meet the constraints of false alarm rate and attack detection rate.To minimize the trace of the coding signal covariance,the design problem of the coding signal is converted into a constraint non-convex optimization problem,and an estimation-optimization iteration algorithm is presented to obtain a numerical solution of the coding signal covariance.A numerical example is given to verify the effectiveness of the proposed scheme.
[1] Mahmoud M S, Hamdan M M, and Baroudi U A, Modeling and control of cyber-physical systems subject to cyber attacks:A survey of recent advances and challenges, Neurocomputing, 2019, 338:101-115.
[2] Pang Z H, Bai C D, Liu G P, et al., A novel networked predictive control method for systems with random communication constraints, Journal of Systems Science&Complexity, 2021, 34(4):1364-1378.
[3] Pang Z H, Zheng C B, Li C, et al., Cloud-based time-varying formation predictive control of multi-agent systems with random communication constraints and quantized signals, IEEE Trans. Circuits Syst. II, Exp. Briefs, 2022, 69(3):1282-1286.
[4] Fidler D P, Was stuxnet an act of war?Decoding a cyberattack, IEEE Secur. Priv., 2011, 9(4):56-59.
[5] Zhang H, Cheng P, Shi L, et al., Optimal denial-of-service attack scheduling with energy constraint, IEEE Trans. Autom. Control, 2015, 60(11):3023-3028.
[6] Qin J H, Li M L, Shi L, et al., Optimal denial-of-service attack scheduling with energy constraint over packet-dropping networks, IEEE Trans. Autom. Control, 2018, 63(6):1648-1663.
[7] Bai C Z, Pasqualetti F, and Gupta V, Data-injection attacks in stochastic control systems:Detectability and performance tradeoffs, Automatica, 2017, 82:251-260.
[8] Kung E, Dey S, and Shi L, The performance and limitations of ε-stealthy attacks on higher order systems, IEEE Trans. Autom. Control, 2017, 62(2):941-947.
[9] Chen Y, Kar S, and Moura J M F, Cyber-physical attacks with control objectives, IEEE Trans. Autom. Control, 2017, 63(5):1418-1425.
[10] Zhang Q R, Liu K, Xia Y Q, et al., Optimal stealthy deception attack against cyber-physical systems, IEEE Trans. Cybern., 2020, 50(9):3963-3972.
[11] Pang Z H, Fan L Z, Dong Z, et al., False data injection attacks against partial sensor measurements of networked control systems, IEEE Trans. Circuits Syst. II, Exp. Briefs, 2022, 69(1):149-153.
[12] Qin J H, Li M L, Wang J, et al., Optimal denial-of-service attack energy management against state estimation over an SINR-based network, Automatica, 2020, 119:109090.
[13] Hou F Y, Sun J, Yang Q L, et al., Deep reinforcement learning for optimal denial-of-service attack scheduling, Sci. China Inf. Sci., 2022, 65:162201..
[14] Wu G Y and Sun J, Optimal switching integrity attacks on sensors in industrial control systems, Journal of Systems Science&Complexity, 2019, 32(5):1290-1305.
[15] Wu G Y, Wang G, Sun J, et al., Optimal partial feedback attacks in cyber-physical power systems, IEEE Trans. Autom. Control, 2020, 65(9):3919-3926.
[16] Li F F and Tang Y, False data injection attack for cyber-physical systems with resource constraint, IEEE Trans. Cybern., 2020, 50(2):729-738.
[17] Guo Z Y, Shi D W, Johansson K H, et al., Optimal linear cyber-attack on remote state estimation, IEEE Trans. Control Netw. Syst., 2017, 4(1):4-13.
[18] Guo Z Y, Shi D W, Johansson K H, et al., Worst-case stealthy innovation-based linear attack on remote state estimation, Automatica, 2018, 89:117-124.
[19] Li Y G and Yang G H, Optimal stealthy false data injection attacks in cyber-physical systems,Inf. Sci., 2019, 481:474-490.
[20] Pang Z H, Liu G P, Zhou D H, et al., Two-channel false data injection attacks against output tracking control of networked systems, IEEE Trans. Ind. Electron., 2016, 63(5):3242-3251.
[21] Mo Y L, Chabukswar R, and Sinopoli B, Detecting integrity attacks on SCADA systems, IEEE Trans. Control Syst. Technol., 2014, 22(4):1396-1407.
[22] Ye D, Zhang T Y, and Guo G, Stochastic coding detection scheme in cyber-physical systems against replay attack, Inf. Sci., 2019, 481:432-444.
[23] Li Y Z, Shi L, and Chen T W, Detection against linear deception attacks on multi-sensor remote state estimation, IEEE Trans. Control Netw. Syst., 2017, 5(3):846-856.
[24] Chattopadhyay A and Mitra U, Attack detection and secure estimation under false data injection attack in cyber-physical systems, 52nd Annu. Conf. Inf. Sci. Syst., 2018, 1-6.
[25] Guo Z Y, Shi D W, Quevedo D E, et al., Secure state estimation against integrity attacks:A gaussian mixture model approach, IEEE Trans. Signal Process., 2019, 67(1):194-207.
[26] Miao F, Zhu Q Y, Pajic M, et al., Coding schemes for securing cyber-physical systems against stealthy data injection attacks, IEEE Transactions on Control of Network Systems, 2017, 4(1):106-117.
[27] Pang Z H, Fan L Z, Sun J, et al., Detection of stealthy false data injection attacks against networked control systems via active data modification, Inf. Sci., 2021, 546:192-205.
[28] Kalman R E, A new approach to linear filtering and prediction problems, Journal of Basic Engineering, 1960, 82(1):35-45.
[29] Zhang T Y and Ye D, False data injection attacks with complete stealthiness in cyber-physical systems:A self-generated approach, Automatica, 2020, 120:109117.
No related articles found!
Viewed
Full text


Abstract