Performance degradation of stealthy attacks against sensor measurements in vector systems

Abstract In this work, we analyze the performance degradation of stealthy attacks against sensor measurements in vector systems. Two types of attacks are considered. One is strictly stealthy attack and the other is ϵ-stealthy attack. For the strictly stealthy attack, we characterize the upper bound of the performance degradation and design an optimal strictly stealthy attack that can achieve the upper bound. For the ϵ-stealthy attack, we quantify the upper bound of the performance degradation and propose a sub-optimal ϵ-stealthy attack approximately achieving the upper bound. Numerical results are given to illustrate the trade off between performance degradation versus the stealthiness level of the attack.

[1]  Quanyan Zhu,et al.  Coding Schemes for Securing Cyber-Physical Systems Against Stealthy Data Injection Attacks , 2016, IEEE Transactions on Control of Network Systems.

[2]  Tongwen Chen,et al.  Stochastic Detector against linear deception attacks on remote state estimation , 2016, 2016 IEEE 55th Conference on Decision and Control (CDC).

[3]  Bruno Sinopoli,et al.  Physical Authentication of Control Systems: Designing Watermarked Control Inputs to Detect Counterfeit Sensor Outputs , 2015, IEEE Control Systems.

[4]  Xingshe Zhou,et al.  Intelligent CPS: features and challenges , 2016, Science China Information Sciences.

[5]  Florian Dörfler,et al.  Attack Detection and Identification in Cyber-Physical Systems -- Part II: Centralized and Distributed Monitor Design , 2012, ArXiv.

[6]  Fei Hu,et al.  Detection of Faults and Attacks Including False Data Injection Attack in Smart Grid Using Kalman Filter , 2014, IEEE Transactions on Control of Network Systems.

[7]  Ling Shi,et al.  Worst-case stealthy innovation-based linear attack on remote state estimation , 2018, Autom..

[8]  Karl Henrik Johansson,et al.  Revealing stealthy attacks in control systems , 2012, 2012 50th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[9]  Ruochi Zhang,et al.  Stealthy control signal attacks in scalar LQG systems , 2015, 2015 IEEE Global Conference on Signal and Information Processing (GlobalSIP).

[10]  Yilin Mo,et al.  False Data Injection Attacks in Control Systems , 2010 .

[11]  Bruno Sinopoli,et al.  Detecting Integrity Attacks on SCADA Systems , 2014, IEEE Transactions on Control Systems Technology.

[12]  Vijay Gupta,et al.  On Kalman Filtering with Compromised Sensors: Attack Stealthiness and Performance Bounds , 2017, IEEE Transactions on Automatic Control.

[13]  Jian Sun,et al.  Optimal Data Injection Attacks in Cyber-Physical Systems , 2018, IEEE Transactions on Cybernetics.

[14]  Vijay Gupta,et al.  Security in stochastic control systems: Fundamental limitations and performance bounds , 2015, 2015 American Control Conference (ACC).

[15]  Ling Shi,et al.  Causality Countermeasures for Anomaly Detection in Cyber-Physical Systems , 2018, IEEE Transactions on Automatic Control.

[16]  Bruno Sinopoli,et al.  A Bernoulli-Gaussian physical watermark for detecting integrity attacks in control systems , 2017, 2017 55th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[17]  Jian Sun,et al.  Fasle data injection attacks in cyber-physical systems based on inaccurate model , 2017, IECON 2017 - 43rd Annual Conference of the IEEE Industrial Electronics Society.

[18]  Shlomo Shamai,et al.  Information Theoretic Security , 2009, Found. Trends Commun. Inf. Theory.

[19]  Zhong-Ping Jiang,et al.  A junction-by-junction feedback-based strategy with convergence analysis for dynamic traffic assignment , 2015, Science China Information Sciences.

[20]  Lihua Xie,et al.  Resilience and Performance Analysis for State Estimation against Integrity Attacks , 2016 .

[21]  Ling Shi,et al.  The Performance and Limitations of $\epsilon$- Stealthy Attacks on Higher Order Systems , 2017, IEEE Transactions on Automatic Control.

[22]  Zuowen Tan A new threshold authenticated encryption scheme using labor-division signature , 2010, J. Syst. Sci. Complex..

[23]  Jie Chen,et al.  A survey on the security of cyber-physical systems , 2016 .

[24]  Vijay Gupta,et al.  Data-injection attacks in stochastic control systems: Detectability and performance tradeoffs , 2017, Autom..

[25]  I. D. Coope,et al.  On Matrix Trace Inequalities and Related Topics for Products of Hermitian Matrices , 1994 .

[26]  Bruno Sinopoli,et al.  Detecting integrity attacks on control systems using robust physical watermarking , 2014, 53rd IEEE Conference on Decision and Control.

[27]  Donghua Zhou,et al.  Two-Channel False Data Injection Attacks Against Output Tracking Control of Networked Systems , 2016, IEEE Transactions on Industrial Electronics.