Abstract
This paper, from the view of a defender, addresses the security problem of cyber-physical systems (CPSs) subject to stealthy false data injection (FDI) attacks that cannot be detected by a residual-based anomaly detector without other defensive measures. To detect such a class of FDI attacks, a stochastic coding scheme, which codes the sensor measurement with a Gaussian stochastic signal at the sensor side, is proposed to assist an anomaly detector to expose the FDI attack. In order to ensure the system performance in the normal operational context, a decoder is adopted to decode the coded sensor measurement when received at the controller side. With this detection scheme, the residual under the attack can be significantly different from that in the normal situation, and thus trigger an alarm. The design condition of the coding signal covariance is derived to meet the constraints of false alarm rate and attack detection rate. To minimize the trace of the coding signal covariance, the design problem of the coding signal is converted into a constraint non-convex optimization problem, and an estimation-optimization iteration algorithm is presented to obtain a numerical solution of the coding signal covariance. A numerical example is given to verify the effectiveness of the proposed scheme.
Similar content being viewed by others
References
Mahmoud M S, Hamdan M M, and Baroudi U A, Modeling and control of cyber-physical systems subject to cyber attacks: A survey of recent advances and challenges, Neurocomputing, 2019, 338: 101–115.
Pang Z H, Bai C D, Liu G P, et al., A novel networked predictive control method for systems with random communication constraints, Journal of Systems Science & Complexity, 2021, 34(4): 1364–1378.
Pang Z H, Zheng C B, Li C, et al., Cloud-based time-varying formation predictive control of multi-agent systems with random communication constraints and quantized signals, IEEE Trans. Circuits Syst. II, Exp. Briefs, 2022, 69(3): 1282–1286.
Fidler D P, Was stuxnet an act of war? Decoding a cyberattack, IEEE Secur. Priv., 2011, 9(4): 56–59.
Zhang H, Cheng P, Shi L, et al., Optimal denial-of-service attack scheduling with energy constraint, IEEE Trans. Autom. Control, 2015, 60(11): 3023–3028.
Qin J H, Li M L, Shi L, et al., Optimal denial-of-service attack scheduling with energy constraint over packet-dropping networks, IEEE Trans. Autom. Control, 2018, 63(6): 1648–1663.
Bai C Z, Pasqualetti F, and Gupta V, Data-injection attacks in stochastic control systems: Detectability and performance tradeoffs, Automatica, 2017, 82: 251–260.
Kung E, Dey S, and Shi L, The performance and limitations of ε-stealthy attacks on higher order systems, IEEE Trans. Autom. Control, 2017, 62(2): 941–947.
Chen Y, Kar S, and Moura J M F, Cyber-physical attacks with control objectives, IEEE Trans. Autom. Control, 2017, 63(5): 1418–1425.
Zhang Q R, Liu K, Xia Y Q, et al., Optimal stealthy deception attack against cyber-physical systems, IEEE Trans. Cybern., 2020, 50(9): 3963–3972.
Pang Z H, Fan L Z, Dong Z, et al., False data injection attacks against partial sensor measurements of networked control systems, IEEE Trans. Circuits Syst. II, Exp. Briefs, 2022, 69(1): 149–153.
Qin J H, Li M L, Wang J, et al., Optimal denial-of-service attack energy management against state estimation over an SINR-based network, Automatica, 2020, 119: 109090.
Hou F Y, Sun J, Yang Q L, et al., Deep reinforcement learning for optimal denial-of-service attack scheduling, Sci. China Inf. Sci., 2022, 65: 162201.
Wu G Y and Sun J, Optimal switching integrity attacks on sensors in industrial control systems, Journal of Systems Science & Complexity, 2019, 32(5): 1290–1305.
Wu G Y, Wang G, Sun J, et al., Optimal partial feedback attacks in cyber-physical power systems, IEEE Trans. Autom. Control, 2020, 65(9): 3919–3926.
Li F F and Tang Y, False data injection attack for cyber-physical systems with resource constraint, IEEE Trans. Cybern., 2020, 50(2): 729–738.
Guo Z Y, Shi D W, Johansson K H, et al., Optimal linear cyber-attack on remote state estimation, IEEE Trans. Control Netw. Syst., 2017, 4(1): 4–13.
Guo Z Y, Shi D W, Johansson K H, et al., Worst-case stealthy innovation-based linear attack on remote state estimation, Automatica, 2018, 89: 117–124.
Li Y G and Yang G H, Optimal stealthy false data injection attacks in cyber-physical systems, Inf. Sci., 2019, 481: 474–490.
Pang Z H, Liu G P, Zhou D H, et al., Two-channel false data injection attacks against output tracking control of networked systems, IEEE Trans. Ind. Electron., 2016, 63(5): 3242–3251.
Mo Y L, Chabukswar R, and Sinopoli B, Detecting integrity attacks on SCADA systems, IEEE Trans. Control Syst. Technol., 2014, 22(4): 1396–1407.
Ye D, Zhang T Y, and Guo G, Stochastic coding detection scheme in cyber-physical systems against replay attack, Inf. Sci., 2019, 481: 432–444.
Li Y Z, Shi L, and Chen T W, Detection against linear deception attacks on multi-sensor remote state estimation, IEEE Trans. Control Netw. Syst., 2017, 5(3): 846–856.
Chattopadhyay A and Mitra U, Attack detection and secure estimation under false data injection attack in cyber-physical systems, 52nd Annu. Conf. Inf. Sci. Syst., 2018, 1–6.
Guo Z Y, Shi D W, Quevedo D E, et al., Secure state estimation against integrity attacks: A gaussian mixture model approach, IEEE Trans. Signal Process., 2019, 67(1): 194–207.
Miao F, Zhu Q Y, Pajic M, et al., Coding schemes for securing cyber-physical systems against stealthy data injection attacks, IEEE Transactions on Control of Network Systems, 2017, 4(1): 106–117.
Pang Z H, Fan L Z, Sun J, et al., Detection of stealthy false data injection attacks against networked control systems via active data modification, Inf. Sci., 2021, 546: 192–205.
Kalman R E, A new approach to linear filtering and prediction problems, Journal of Basic Engineering, 1960, 82(1): 35–45.
Zhang T Y and Ye D, False data injection attacks with complete stealthiness in cyber-physical systems: A self-generated approach, Automatica, 2020, 120: 109117.
Author information
Authors and Affiliations
Corresponding author
Additional information
This research was supported by the National Natural Science Foundation of China under Grant Nos. 61925303, 62088101, U20B2073, 61720106011, and 62173002, the National Key R&D Program of China under Grant No. 2018YFB1700100, and the Beijing Natural Science Foundation under Grant No. 4222045.
This paper was recommended for publication by Editor GUO Jin.
Rights and permissions
About this article
Cite this article
Guo, H., Pang, Z., Sun, J. et al. Detection of Stealthy False Data Injection Attacks Against Cyber-Physical Systems: A Stochastic Coding Scheme. J Syst Sci Complex 35, 1668–1684 (2022). https://doi.org/10.1007/s11424-022-1005-z
Received:
Revised:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11424-022-1005-z