Security Against False Data-Injection Attack in Cyber-Physical Systems

In this paper, secure, remote estimation of a linear Gaussian process via observations at multiple sensors is considered. Such a framework is relevant to many cyber-physical systems and Internet-of-things applications. Sensors make sequential measurements that are shared with a fusion center; the fusion center applies a filtering algorithm to make its estimates. The challenge is the presence of a few unknown malicious sensors which can inject anomalous observations to skew the estimates at the fusion center. The set of malicious sensors may be time varying. The problems of malicious sensor detection and secure estimation are considered. First, an algorithm for secure estimation is proposed. The proposed estimation scheme uses a novel filtering and learning algorithm, where an optimal filter is learned over time by using the sensor observations in order to filter out malicious sensor observations while retaining other sensor measurements. Next, a novel detector to detect injection attacks on an unknown sensor subset is developed. Numerical results demonstrate up to 3-dB gain in the mean-squared error and up to $\text{75} \%$ higher attack detection probability under a small false alarm rate constraint, against a competing algorithm that requires additional side information.

[1]  Petros G. Voulgaris,et al.  On optimal ℓ∞ to ℓ∞ filtering , 1995, Autom..

[2]  Bruno Sinopoli,et al.  Secure control against replay attacks , 2009, 2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[3]  Zhao Yang Dong,et al.  A Review of False Data Injection Attacks Against Modern Power Systems , 2017, IEEE Transactions on Smart Grid.

[4]  Urbashi Mitra,et al.  Attack detection and secure estimation under false data injection attack in cyber-physical systems , 2018, 2018 52nd Annual Conference on Information Sciences and Systems (CISS).

[5]  Marceau Coupechoux,et al.  Sequential Decision Algorithms for Measurement-Based Impromptu Deployment of a Wireless Relay Network Along a Line , 2015, IEEE/ACM Transactions on Networking.

[6]  Soummya Kar,et al.  Cyber physical attacks with control objectives and detection constraints , 2016, 2016 IEEE 55th Conference on Decision and Control (CDC).

[7]  V. Borkar Stochastic Approximation: A Dynamical Systems Viewpoint , 2008 .

[8]  Dimitri P. Bertsekas,et al.  Dynamic Programming and Optimal Control, Two Volume Set , 1995 .

[9]  Soummya Kar,et al.  Optimal Attack Strategies Subject to Detection Constraints Against Cyber-Physical Systems , 2016, IEEE Transactions on Control of Network Systems.

[10]  Urbashi Mitra,et al.  Optimal Sensing and Data Estimation in a Large Sensor Network , 2017, GLOBECOM 2017 - 2017 IEEE Global Communications Conference.

[11]  Paulo Tabuada,et al.  Secure Estimation and Control for Cyber-Physical Systems Under Adversarial Attacks , 2012, IEEE Transactions on Automatic Control.

[12]  Florian Dörfler,et al.  Attack Detection and Identification in Cyber-Physical Systems -- Part II: Centralized and Distributed Monitor Design , 2012, ArXiv.

[13]  Ling Shi,et al.  Optimal Linear Cyber-Attack on Remote State Estimation , 2017, IEEE Transactions on Control of Network Systems.

[14]  Quanyan Zhu,et al.  Coding Schemes for Securing Cyber-Physical Systems Against Stealthy Data Injection Attacks , 2016, IEEE Transactions on Control of Network Systems.

[15]  Paulo Tabuada,et al.  Secure State Estimation Against Sensor Attacks in the Presence of Noise , 2015, IEEE Transactions on Control of Network Systems.

[16]  J. Spall Multivariate stochastic approximation using a simultaneous perturbation gradient approximation , 1992 .

[17]  Yilin Mo,et al.  Attack-Resilient H_2, H_∞, and ℓ_1 State Estimator , 2018, 1803.07053.

[18]  Fei Hu,et al.  Detection of Faults and Attacks Including False Data Injection Attack in Smart Grid Using Kalman Filter , 2014, IEEE Transactions on Control of Network Systems.

[19]  Insup Lee,et al.  Attack-Resilient State Estimation for Noisy Dynamical Systems , 2017, IEEE Transactions on Control of Network Systems.

[20]  G. Smirnov Introduction to the Theory of Differential Inclusions , 2002 .

[21]  Chengnian Long,et al.  Dynamic State Recovery for Cyber-Physical Systems Under Switching Location Attacks , 2017, IEEE Transactions on Control of Network Systems.

[22]  Claire J. Tomlin,et al.  Secure State Estimation and Control for Cyber Security of the Nonlinear Power Systems , 2018, IEEE Transactions on Control of Network Systems.

[23]  Bruno Sinopoli,et al.  Detecting Integrity Attacks on SCADA Systems , 2014, IEEE Transactions on Control Systems Technology.

[24]  Ling Shi,et al.  Detection Against Linear Deception Attacks on Multi-Sensor Remote State Estimation , 2018, IEEE Transactions on Control of Network Systems.

[25]  Xiaohua Ge,et al.  Distributed Attack Detection and Secure Estimation of Networked Cyber-Physical Systems Against False Data Injection Attacks and Jamming Attacks , 2018, IEEE Transactions on Signal and Information Processing over Networks.