Optimal Data Injection Attacks in Cyber-Physical Systems

The primary goal of this paper is to analyze the dynamic response of a system under optimal data injection attacks from a control perspective. In this paper, optimal data injection attack design problems are formulated in a similar framework of optimal control. We consider a scenario, where an attacker injects false data to a healthy plant comprising many actuators distributed in different regions. For the case, where an attacker pollutes all actuators, an optimal state feedback injection law is proposed to minimize a quadratic cost functional containing two conflicting objectives. For the case, where the attacker only pollutes partial actuators within a short period, the quadratic programming is employed to solve an optimal switching data injection attack design problem using the technique of embedded transformation. A bang-bang-type solution of the quadratic programming exists on account of the minimum value of the Hamilton functional and is achieved at an extreme point of the convex set. Consequently, a switching condition is derived to obtain the optimal attack sequence. We also introduce a closed-form switching policy for data injection attacks with multiple objectives, which is shown optimal in the sense of minimizing a hybrid quadratic performance criterion. Finally, applications of our approaches to a networked dc motor and a power system are provided to illustrate the effectiveness of the proposed method.

[1]  H. Su,et al.  LMI approach to optimal guaranteed cost control for a class of linear uncertain discrete systems , 2000, Proceedings of the 2000 American Control Conference. ACC (IEEE Cat. No.00CH36334).

[2]  Alberto Bemporad,et al.  Min-max control of constrained uncertain discrete-time linear systems , 2003, IEEE Trans. Autom. Control..

[3]  Pierre Riedinger,et al.  Suboptimal switched controls in context of singular arcs , 2003, 42nd IEEE International Conference on Decision and Control (IEEE Cat. No.03CH37475).

[4]  Panos J. Antsaklis,et al.  Optimal control of switched systems based on parameterization of the switching instants , 2004, IEEE Transactions on Automatic Control.

[5]  Shuzhi Sam Ge,et al.  Analysis and synthesis of switched linear control systems , 2005, Autom..

[6]  Raymond A. DeCarlo,et al.  Optimal control of switching systems , 2005, Autom..

[7]  Ranjan Mukherjee,et al.  Optimally switched linear systems , 2008, Autom..

[8]  Peng Ning,et al.  False data injection attacks against state estimation in electric power grids , 2009, CCS.

[9]  Emanuele Garone,et al.  False data injection attacks against state estimation in wireless sensor networks , 2010, 49th IEEE Conference on Decision and Control (CDC).

[10]  F. Bullo,et al.  A graph-theoretical characterization of power network vulnerabilities , 2011, Proceedings of the 2011 American Control Conference.

[11]  Sonia Martínez,et al.  Attack-resilient distributed formation control via online adaptation , 2011, IEEE Conference on Decision and Control and European Control Conference.

[12]  Hamed Mohsenian Rad,et al.  Distributed Internet-Based Load Altering Attacks Against Smart Power Grids , 2011, IEEE Transactions on Smart Grid.

[13]  Jianghai Hu,et al.  Infinite-Horizon Switched LQR Problems in Discrete Time: A Suboptimal Algorithm With Performance Analysis , 2012, IEEE Transactions on Automatic Control.

[14]  Deepa Kundur,et al.  A Framework for Modeling Cyber-Physical Switching Attacks in Smart Grid , 2013, IEEE Transactions on Emerging Topics in Computing.

[15]  Florian Dörfler,et al.  Attack Detection and Identification in Cyber-Physical Systems -- Part II: Centralized and Distributed Monitor Design , 2012, ArXiv.

[16]  Ling Shi,et al.  Optimal DoS attack policy against remote state estimation , 2013, 52nd IEEE Conference on Decision and Control.

[17]  Deepa Kundur,et al.  A Coordinated Multi-Switch Attack for Cascading Failures in Smart Grid , 2014, IEEE Transactions on Smart Grid.

[18]  Farzad Rajaei Salmasi,et al.  Speed Sensorless and Sensor-Fault Tolerant Optimal PI Regulator for Networked DC Motor System With Unknown Time-Delay and Packet Dropout , 2014, IEEE Transactions on Industrial Electronics.

[19]  João P. Hespanha,et al.  Resilient Detection in the Presence of Integrity Attacks , 2014, IEEE Transactions on Signal Processing.

[20]  Sonia Martínez,et al.  On the Performance Analysis of Resilient Networked Control Systems Under Replay Attacks , 2013, IEEE Transactions on Automatic Control.

[21]  Ying Jun Zhang,et al.  Using Covert Topological Information for Defense Against Malicious Attacks on DC State Estimation , 2014, IEEE Journal on Selected Areas in Communications.

[22]  Ali Heydari,et al.  Optimal Switching and Control of Nonlinear Switching Systems Using Approximate Dynamic Programming , 2014, IEEE Transactions on Neural Networks and Learning Systems.

[23]  Wei Yu,et al.  On False Data-Injection Attacks against Power System State Estimation: Modeling and Countermeasures , 2014, IEEE Transactions on Parallel and Distributed Systems.

[24]  Ying Jun Zhang,et al.  Graphical Methods for Defense Against False-Data Injection Attacks on Power System State Estimation , 2013, IEEE Transactions on Smart Grid.

[25]  Florian Dörfler,et al.  A divide-and-conquer approach to distributed attack identification , 2015, 2015 54th IEEE Conference on Decision and Control (CDC).

[26]  Emilio Frazzoli,et al.  Resilient state estimation against switching attacks on stochastic cyber-physical systems , 2015, 2015 54th IEEE Conference on Decision and Control (CDC).

[27]  Karl Henrik Johansson,et al.  A secure control framework for resource-limited adversaries , 2012, Autom..

[28]  Yang Liu,et al.  Abnormal traffic-indexed state estimation: A cyber-physical fusion approach for Smart Grid attack detection , 2015, Future Gener. Comput. Syst..

[29]  Feng Zhu,et al.  Optimal control of hybrid switched systems: A brief survey , 2015, Discret. Event Dyn. Syst..

[30]  Jinping Hao,et al.  Sparse Malicious False Data Injection Attacks and Defense Mechanisms in Smart Grids , 2015, IEEE Transactions on Industrial Informatics.

[31]  Soummya Kar,et al.  Cyber physical attacks constrained by control objectives , 2016, 2016 American Control Conference (ACC).

[32]  Deepa Kundur,et al.  A Game-Theoretic Analysis of Cyber Switching Attacks and Mitigation in Smart Grid Systems , 2016, IEEE Transactions on Smart Grid.

[33]  Jian Sun,et al.  Optimal data integrity attack on actuators in Cyber-Physical Systems , 2016, 2016 American Control Conference (ACC).

[34]  Hamed Mohsenian Rad,et al.  Identification of destabilizing attacks in power systems , 2017, 2017 American Control Conference (ACC).

[35]  Ligang Wu,et al.  Event-Triggered Fault Detection of Nonlinear Networked Systems , 2017, IEEE Transactions on Cybernetics.

[36]  Ling Shi,et al.  Optimal Linear Cyber-Attack on Remote State Estimation , 2017, IEEE Transactions on Control of Network Systems.

[37]  Ruochi Zhang,et al.  Stealthy Control Signal Attacks in Linear Quadratic Gaussian Control Systems: Detectability Reward Tradeoff , 2017, IEEE Transactions on Information Forensics and Security.

[38]  Guoqiang Hu,et al.  Distributed Secure Coordinated Control for Multiagent Systems Under Strategic Attacks , 2017, IEEE Transactions on Cybernetics.

[39]  Chengnian Long,et al.  Dynamic State Recovery for Cyber-Physical Systems Under Switching Location Attacks , 2017, IEEE Transactions on Control of Network Systems.

[40]  Hamed Mohsenian-Rad,et al.  Dynamic load altering attacks against power system stability: Attack models and protection schemes , 2017 .

[41]  David K. Y. Yau,et al.  Modeling and Mitigating Impact of False Data Injection Attacks on Automatic Generation Control , 2017, IEEE Transactions on Information Forensics and Security.

[42]  Jing Liu,et al.  A Two-Phase Multiobjective Evolutionary Algorithm for Enhancing the Robustness of Scale-Free Networks Against Multiple Malicious Attacks , 2017, IEEE Transactions on Cybernetics.

[43]  Hamed Mohsenian-Rad,et al.  Dynamic Load Altering Attacks Against Power System Stability: Attack Models and Protection Schemes , 2017, IEEE Transactions on Smart Grid.

[44]  Xiaohong Guan,et al.  Enhanced Hidden Moving Target Defense in Smart Grids , 2019, IEEE Transactions on Smart Grid.

[45]  Zhao Yang Dong,et al.  A Framework for Cyber-Topology Attacks: Line-Switching and New Attack Scenarios , 2019, IEEE Transactions on Smart Grid.