Detecting False Data Injection Attacks in Linear Parameter Varying Cyber-Physical Systems

In this paper, we investigate the process of detection of False Data Injection (FDI) in a Linear Parameter Varying (LPV) cyber-physical system (CPS). We design a model based FDI detector capable of detecting false data injections on output measurements and scheduling variables. To improve the detection accuracy of FDI attacks, the attack detector design uses the performance metric H_ to maximize the detection capability of the detector module to effectively detect FDI attacks. On the other hand, it uses the $H_{\infty}$ metric to minimize the effect of disturbance on the detector module given an unreliable network. We assume that the network unreliability comes from packet dropout that we modeled as Bernoulli process. The FDI attack detector is designed such that H_ and $H_{\infty}$ performance metrics are maintained despite packet dropout. Based on stochastic stability, we define a set of sufficient Linear Matrix Inequalities (LMI) that we solve as a multi-objective optimization problem to obtain the detector gain. The obtained detector gain is used for estimating the current system state and current output measurement using the system input, manipulated measurements and manipulated scheduling variables. Then, the output of the detector is compared with the actual sensor measurement. The resulting residual signal carries the information about the FDI attack.The proposed approach is tested and validated on a two-tank system. The evaluation results demonstrate that the proposed detector is able to detect FDI attacks.

[1]  Javad Mohammadpour,et al.  Control of linear parameter varying systems with applications , 2012 .

[2]  Tyler H. Summers,et al.  Security analysis of cyber-physical systems using H 2 norm , 2017 .

[3]  Paul Honeine,et al.  ${l_p}$-norms in One-Class Classification for Intrusion Detection in SCADA Systems , 2014, IEEE Transactions on Industrial Informatics.

[4]  Valery A. Ugrinovskii,et al.  Detection of biasing attacks on distributed estimation networks , 2016, 2016 IEEE 55th Conference on Decision and Control (CDC).

[5]  Thomas Parisini,et al.  Reducing false alarm rates in observer-based distributed fault detection schemes by analyzing moving averages , 2018 .

[6]  Javad Mohammadpour,et al.  A Bayesian Approach for LPV Model Identification and Its Application to Complex Processes , 2017, IEEE Transactions on Control Systems Technology.

[7]  Yilin Mo,et al.  False Data Injection Attacks in Control Systems , 2010 .

[8]  E. Yaz Linear Matrix Inequalities In System And Control Theory , 1998, Proceedings of the IEEE.

[9]  Li Yu,et al.  Packet-Based State Feedback Control Under DoS Attacks in Cyber-Physical Systems , 2019, IEEE Transactions on Circuits and Systems II: Express Briefs.

[10]  Sherif Abdelwahed,et al.  A Model-Based Validated Autonomic Approach to Self-Protect Computing Systems , 2014, IEEE Internet of Things Journal.

[11]  Panos J. Antsaklis,et al.  A resilient design for cyber physical systems under attack , 2017, 2017 American Control Conference (ACC).

[12]  Xiaohua Ge,et al.  Distributed Attack Detection and Secure Estimation of Networked Cyber-Physical Systems Against False Data Injection Attacks and Jamming Attacks , 2018, IEEE Transactions on Signal and Information Processing over Networks.

[13]  Javad Mohammadpour,et al.  Event-triggered fault detection for discrete-time LPV systems , 2016, 2016 Second International Conference on Event-based Control, Communication, and Signal Processing (EBCCSP).

[14]  Damiano Rotondo,et al.  A virtual actuator approach for the secure control of networked LPV systems under pulse-width modulated DoS attacks , 2019, Neurocomputing.

[15]  Xinghuo Yu,et al.  Survey on Recent Advances in Networked Control Systems , 2016, IEEE Transactions on Industrial Informatics.

[16]  Didier Theilliol,et al.  Robust H−/H∞ fault detection observer design for descriptor-LPV systems with unmeasurable gain scheduling functions , 2015, Int. J. Control.

[17]  Hideaki Ishii Limitations in remote stabilization over unreliable channels without acknowledgements , 2009, Autom..

[18]  Qi Wang,et al.  Review of the false data injection attack against the cyber-physical power system , 2018, IET Cyper-Phys. Syst.: Theory & Appl..

[19]  Steven X. Ding,et al.  A Survey of Fault Diagnosis and Fault-Tolerant Techniques—Part I: Fault Diagnosis With Model-Based and Signal-Based Approaches , 2015, IEEE Transactions on Industrial Electronics.