Fasle data injection attacks in cyber-physical systems based on inaccurate model

This paper is concerned with the problem of designing successful false data injection attacks in cyber-physical systems from the attacker's angle. A discrete linear time-invariant system is considered, which is equipped with a Kalman filter and a χ2 failure detector. It is assumed that the attacker cannot obtain the accurate model of the control system. Based on the inaccurate model, the method of designing stealthy false data injection attacks, which can compromise the system without being detected is proposed. A sufficient condition under which the attacker can successfully compromise the system is also proposed. A numerical example is provided to illustrate the effectiveness of the proposed method.

[1]  Sun Dehui,et al.  False data injection attacks for output tracking control systems , 2015, 2015 34th Chinese Control Conference (CCC).

[2]  Ling Shi,et al.  Detection Against Linear Deception Attacks on Multi-Sensor Remote State Estimation , 2018, IEEE Transactions on Control of Network Systems.

[3]  Karl Henrik Johansson,et al.  A secure control framework for resource-limited adversaries , 2012, Autom..

[4]  Soummya Kar,et al.  Cyber physical attacks constrained by control objectives , 2016, 2016 American Control Conference (ACC).

[5]  Sonia Martínez,et al.  On the Performance Analysis of Resilient Networked Control Systems Under Replay Attacks , 2013, IEEE Transactions on Automatic Control.

[6]  Ling Shi,et al.  Optimal Linear Cyber-Attack on Remote State Estimation , 2017, IEEE Transactions on Control of Network Systems.

[7]  Bruno Sinopoli,et al.  Detecting Integrity Attacks on SCADA Systems , 2011 .

[8]  Ling Shi,et al.  Guest Editorial Special Issue on Secure Control of Cyber-Physical Systems , 2017, IEEE Trans. Control. Netw. Syst..

[9]  Panganamala Ramana Kumar,et al.  Cyber–Physical Systems: A Perspective at the Centennial , 2012, Proceedings of the IEEE.

[10]  Lihua Xie,et al.  Resilience and Performance Analysis for State Estimation against Integrity Attacks , 2016 .

[11]  Emanuele Garone,et al.  False data injection attacks against state estimation in wireless sensor networks , 2010, 49th IEEE Conference on Decision and Control (CDC).

[12]  Ruochi Zhang,et al.  Stealthy control signal attacks in vector LQG systems , 2016, 2016 American Control Conference (ACC).

[13]  Dehui Sun,et al.  False data injection attacks for a class of output tracking control systems , 2015, The 27th Chinese Control and Decision Conference (2015 CCDC).

[14]  Aditya Ashok,et al.  Cyber-Physical Security Testbeds: Architecture, Application, and Evaluation for Smart Grid , 2013, IEEE Transactions on Smart Grid.

[15]  Paulo Tabuada,et al.  Secure Estimation and Control for Cyber-Physical Systems Under Adversarial Attacks , 2012, IEEE Transactions on Automatic Control.

[16]  T. M. Chen,et al.  Stuxnet, the real start of cyber warfare? [Editor's Note] , 2010, IEEE Netw..

[17]  Insup Lee,et al.  Attack-Resilient State Estimation for Noisy Dynamical Systems , 2017, IEEE Transactions on Control of Network Systems.

[18]  Bruno Sinopoli,et al.  On the Performance Degradation of Cyber-Physical Systems Under Stealthy Integrity Attacks , 2016, IEEE Transactions on Automatic Control.

[19]  Florian Dörfler,et al.  Attack Detection and Identification in Cyber-Physical Systems -- Part II: Centralized and Distributed Monitor Design , 2012, ArXiv.

[20]  Guo-Ping Liu,et al.  Design and Implementation of Secure Networked Predictive Control Systems Under Deception Attacks , 2012, IEEE Transactions on Control Systems Technology.

[21]  Tongwen Chen,et al.  Stochastic Detector against linear deception attacks on remote state estimation , 2016, 2016 IEEE 55th Conference on Decision and Control (CDC).

[22]  Yilin Mo,et al.  Security in cyber-physical systems: Controller design against Known-Plaintext Attack , 2015, 2015 54th IEEE Conference on Decision and Control (CDC).

[23]  Donghua Zhou,et al.  Two-Channel False Data Injection Attacks Against Output Tracking Control of Networked Systems , 2016, IEEE Transactions on Industrial Electronics.

[24]  Weiyi Liu,et al.  Security analysis for Cyber-Physical Systems against stealthy deception attacks , 2013, 2013 American Control Conference.

[25]  Antonio Bicchi,et al.  Distributed intrusion detection for secure consensus computations , 2007, 2007 46th IEEE Conference on Decision and Control.

[26]  Emilio Frazzoli,et al.  Resilient state estimation against switching attacks on stochastic cyber-physical systems , 2015, 2015 54th IEEE Conference on Decision and Control (CDC).

[27]  Alan S. Willsky,et al.  A survey of design methods for failure detection in dynamic systems , 1976, Autom..

[28]  Qing-Long Han,et al.  Security Control for Discrete-Time Stochastic Nonlinear Systems Subject to Deception Attacks , 2018, IEEE Transactions on Systems, Man, and Cybernetics: Systems.

[29]  Bruno Sinopoli,et al.  Detecting integrity attacks on control systems using robust physical watermarking , 2014, 53rd IEEE Conference on Decision and Control.

[30]  R. K. Mehra,et al.  Correspondence item: An innovations approach to fault detection and diagnosis in dynamic systems , 1971 .

[31]  Weiyi Liu,et al.  Cyber Security Analysis for State Estimators in Air Traffic Control Systems , 2012 .

[32]  Ruixin Niu,et al.  System state estimation in the presence of false information injection , 2012, 2012 IEEE Statistical Signal Processing Workshop (SSP).

[33]  Yilin Mo,et al.  False Data Injection Attacks in Control Systems , 2010 .