Security analysis of stochastic networked control systems under false data injection attacks

In this paper, the security issue is investigated for networked control systems (NCSs) where the physical plant is controlled by a remote observer-based controller. The communication channel from system measurement to remote control centre is vulnerable to attacks from malicious adversaries. Here, false data injection (FDI) attacks are considered. The aim is to find the so-called insecurity conditions under which the NCS is insecure in the sense that there exist FDI attacks that can bypass the anomaly detector but still destabilize the overall system. In particular, a new necessary and sufficient condition for the insecurity is derived when the communication channel is compromised by the adversary. Moreover, a specific algorithm is proposed with which the NCS is shown to be insecure. A simulation example is utilized to demonstrate the usefulness of the proposed conditions/algorithms in the secure control problem.

[1]  Peng Ning,et al.  False data injection attacks against state estimation in electric power grids , 2011, TSEC.

[2]  Bruno Sinopoli,et al.  On the Performance Degradation of Cyber-Physical Systems Under Stealthy Integrity Attacks , 2016, IEEE Transactions on Automatic Control.

[3]  D. Bernstein Matrix Mathematics: Theory, Facts, and Formulas , 2009 .

[4]  Zhong-Hua Pang,et al.  Secure transmission mechanism for networked control systems under deception attacks , 2011, 2011 IEEE International Conference on Cyber Technology in Automation, Control, and Intelligent Systems.

[5]  Lang Tong,et al.  Malicious Data Attacks on the Smart Grid , 2011, IEEE Transactions on Smart Grid.

[6]  Paulo Tabuada,et al.  Secure Estimation and Control for Cyber-Physical Systems Under Adversarial Attacks , 2012, IEEE Transactions on Automatic Control.

[7]  Guo-Ping Liu,et al.  Design and Implementation of Secure Networked Predictive Control Systems Under Deception Attacks , 2012, IEEE Transactions on Control Systems Technology.

[8]  Florian Dörfler,et al.  Attack Detection and Identification in Cyber-Physical Systems -- Part II: Centralized and Distributed Monitor Design , 2012, ArXiv.

[9]  Weiyi Liu,et al.  Security analysis for Cyber-Physical Systems against stealthy deception attacks , 2013, 2013 American Control Conference.

[10]  Huijun Gao,et al.  Finite-Horizon $H_{\infty} $ Filtering With Missing Measurements and Quantization Effects , 2013, IEEE Transactions on Automatic Control.

[11]  T. M. Chen,et al.  Stuxnet, the real start of cyber warfare? [Editor's Note] , 2010, IEEE Netw..

[12]  Karl Henrik Johansson,et al.  Cyber security analysis of state estimators in electric power systems , 2010, 49th IEEE Conference on Decision and Control (CDC).

[13]  Yilin Mo,et al.  False Data Injection Attacks in Control Systems , 2010 .

[14]  Oliver Kosut Malicious data attacks against dynamic state estimation in the presence of random noise , 2013, 2013 IEEE Global Conference on Signal and Information Processing.

[15]  João Pedro Hespanha,et al.  A Survey of Recent Results in Networked Control Systems , 2007, Proceedings of the IEEE.

[16]  Huijun Gao,et al.  ${\cal H}_{\infty}$ Estimation for Uncertain Systems With Limited Communication Capacity , 2007, IEEE Transactions on Automatic Control.