Stochastic coding detection scheme in cyber-physical systems against replay attack

Abstract In this paper, the security problems in cyber-physical systems (CPSs) against replay attack are considered. With replay attacks, attacker records and covers the transmitted data between the senders and receivers of the sensors. In order to achieve the detection objective for malicious replay attacks, the stochastic coding scheme is proposed to make the CPSs generate covariance differences between the normal and compromised data. Different from the existing results, this method detects the replay attack without sacrificing any system performances in normal systems. Based on the coding scheme, two types of detectors are further designed to detect the covariance changes in residual and output, respectively. Moreover, the output-based detector has more low-computing solution process than the residual-based one. Finally, a practical example is proposed to demonstrate the superiority of the stochastic coding scheme.

[1]  Vijay Gupta,et al.  Data-injection attacks in stochastic control systems: Detectability and performance tradeoffs , 2017, Autom..

[2]  Pietro Tesi,et al.  Input-to-State Stabilizing Control Under Denial-of-Service , 2015, IEEE Transactions on Automatic Control.

[3]  Ling Shi,et al.  SINR-Based DoS Attack on Remote State Estimation: A Game-Theoretic Approach , 2017, IEEE Transactions on Control of Network Systems.

[4]  George J. Pappas,et al.  Stochastic game approach for replay attack detection , 2013, 52nd IEEE Conference on Decision and Control.

[5]  Yang Xiang,et al.  A survey on security control and attack detection for industrial cyber-physical systems , 2018, Neurocomputing.

[6]  Xavier Litrico,et al.  Stealthy deception attacks on water SCADA systems , 2010, HSCC '10.

[7]  Qing-Long Han,et al.  Variance-Constrained Distributed Filtering for Time-Varying Systems With Multiplicative Noises and Deception Attacks Over Sensor Networks , 2017, IEEE Sensors Journal.

[8]  Ling Shi,et al.  Detection Against Linear Deception Attacks on Multi-Sensor Remote State Estimation , 2018, IEEE Transactions on Control of Network Systems.

[9]  Derui Ding,et al.  Distributed recursive filtering for stochastic systems under uniform quantizations and deception attacks through sensor networks , 2017, Autom..

[10]  Karl Henrik Johansson,et al.  A secure control framework for resource-limited adversaries , 2012, Autom..

[11]  S. Shankar Sastry,et al.  Secure Control: Towards Survivable Cyber-Physical Systems , 2008, 2008 The 28th International Conference on Distributed Computing Systems Workshops.

[12]  Xinghuo Yu,et al.  Survey on Recent Advances in Networked Control Systems , 2016, IEEE Transactions on Industrial Informatics.

[13]  Tansel Yucelen,et al.  An Adaptive Control Architecture for Mitigating Sensor and Actuator Attacks in Cyber-Physical Systems , 2017, IEEE Transactions on Automatic Control.

[14]  Bruno Sinopoli,et al.  Detecting Integrity Attacks on SCADA Systems , 2014, IEEE Transactions on Control Systems Technology.

[15]  Ling Shi,et al.  Optimal DoS Attack Scheduling in Wireless Networked Control System , 2016, IEEE Transactions on Control Systems Technology.

[16]  Guang-Hong Yang,et al.  Input-to-State Stabilizing Control for Cyber-Physical Systems With Multiple Transmission Channels Under Denial of Service , 2018, IEEE Transactions on Automatic Control.

[17]  Romain Postoyan,et al.  A Lyapunov Redesign of Coordination Algorithms for Cyber-Physical Systems , 2014, IEEE Transactions on Automatic Control.

[18]  Guang-Hong Yang,et al.  Data-Driven Coordinated Attack Policy Design Based on Adaptive $\mathcal {L}_2$-Gain Optimal Theory , 2018, IEEE Transactions on Automatic Control.

[19]  Guoqiang Hu,et al.  Secure Fusion Estimation for Bandwidth Constrained Cyber-Physical Systems Under Replay Attacks , 2018, IEEE Transactions on Cybernetics.

[20]  Guang-Hong Yang,et al.  Improved adaptive resilient control against sensor and actuator attacks , 2018, Inf. Sci..

[21]  Qing-Long Han,et al.  Network-based H∞H∞ filtering using a logic jumping-like trigger , 2013, Autom..

[22]  Sonia Martínez,et al.  On the Performance Analysis of Resilient Networked Control Systems Under Replay Attacks , 2013, IEEE Transactions on Automatic Control.

[23]  Panganamala Ramana Kumar,et al.  Cyber–Physical Systems: A Perspective at the Centennial , 2012, Proceedings of the IEEE.

[24]  Pietro Tesi,et al.  Resilient control under Denial-of-Service: Robust design , 2016, 2016 American Control Conference (ACC).

[25]  Dan Ye,et al.  A cooperative detection and compensation mechanism against Denial-of-Service attack for cyber-physical systems , 2018, Inf. Sci..

[26]  Ling Shi,et al.  Optimal Denial-of-Service Attack Scheduling With Energy Constraint , 2015, IEEE Transactions on Automatic Control.

[27]  Hak-Keung Lam,et al.  Distributed Event-Based Set-Membership Filtering for a Class of Nonlinear Systems With Sensor Saturations Over Sensor Networks , 2017, IEEE Transactions on Cybernetics.

[28]  Guang-Hong Yang,et al.  Distributed consensus control for multi-agent systems under denial-of-service , 2018, Inf. Sci..

[29]  Derong Liu,et al.  Discrete-Time Optimal Control via Local Policy Iteration Adaptive Dynamic Programming , 2017, IEEE Transactions on Cybernetics.

[30]  Ling Shi,et al.  Worst-case stealthy innovation-based linear attack on remote state estimation , 2018, Autom..

[31]  Qing-Long Han,et al.  An Overview and Deep Investigation on Sampled-Data-Based Event-Triggered Control and Filtering for Networked Systems , 2017, IEEE Transactions on Industrial Informatics.

[32]  Quanyan Zhu,et al.  Coding Schemes for Securing Cyber-Physical Systems Against Stealthy Data Injection Attacks , 2016, IEEE Transactions on Control of Network Systems.

[33]  Bruno Sinopoli,et al.  Detection in Adversarial Environments , 2014, IEEE Transactions on Automatic Control.

[34]  Qing-Long Han,et al.  Security Control for Discrete-Time Stochastic Nonlinear Systems Subject to Deception Attacks , 2018, IEEE Transactions on Systems, Man, and Cybernetics: Systems.

[35]  Paulo Tabuada,et al.  Secure Estimation and Control for Cyber-Physical Systems Under Adversarial Attacks , 2012, IEEE Transactions on Automatic Control.

[36]  Florian Dörfler,et al.  Attack Detection and Identification in Cyber-Physical Systems -- Part II: Centralized and Distributed Monitor Design , 2012, ArXiv.