Optimal stealthy false data injection attacks in cyber-physical systems

Abstract In this paper, the problem of false data injection attacks for cyber-physical systems is investigated. The Kullback–Leibler divergence is utilized to measure the stealthiness of the attacks. Different from the existing attack policies which are required to be zero-mean Gaussian distributed, a more general linear attack strategy based on Gaussian distribution with an arbitrary mean is proposed. Under the framework of the attacks, the degradation of system performance is analyzed by utilizing the statistical characteristics of the measurement innovation, and the optimal attack strategy is obtained by employing the Lagrange multiplier method to solve a constrained quadratic optimization problem. It is proved that the developed attack scheme can achieve the largest remote estimation error and guarantee the attack stealthiness simultaneously. Finally, simulation examples are provided to demonstrate the theoretical results.

[1]  Guang-Hong Yang,et al.  Secure state estimation for cyber-physical systems under sparse sensor attacks via a switched Luenberger observer , 2017, Inf. Sci..

[2]  Ling Shi,et al.  Detection Against Linear Deception Attacks on Multi-Sensor Remote State Estimation , 2018, IEEE Transactions on Control of Network Systems.

[3]  H. Vincent Poor,et al.  An Introduction to Signal Detection and Estimation , 1994, Springer Texts in Electrical Engineering.

[4]  S. Shankar Sastry,et al.  Secure Control: Towards Survivable Cyber-Physical Systems , 2008, 2008 The 28th International Conference on Distributed Computing Systems Workshops.

[5]  Ling Shi,et al.  Worst-case stealthy innovation-based linear attack on remote state estimation , 2018, Autom..

[6]  Guang-Hong Yang,et al.  Data-Driven Coordinated Attack Policy Design Based on Adaptive $\mathcal {L}_2$-Gain Optimal Theory , 2018, IEEE Transactions on Automatic Control.

[7]  Thomas M. Cover,et al.  Elements of Information Theory , 2005 .

[8]  Tat-Seng Chua,et al.  Item Silk Road: Recommending Items from Information Domains to Social Users , 2017, SIGIR.

[9]  Guang-Hong Yang,et al.  Secure State Estimation Against Sparse Sensor Attacks With Adaptive Switching Mechanism , 2018, IEEE Transactions on Automatic Control.

[10]  Ling Shi,et al.  SINR-Based DoS Attack on Remote State Estimation: A Game-Theoretic Approach , 2017, IEEE Transactions on Control of Network Systems.

[11]  Dan Ye,et al.  A cooperative detection and compensation mechanism against Denial-of-Service attack for cyber-physical systems , 2018, Inf. Sci..

[12]  Peng Ning,et al.  False data injection attacks against state estimation in electric power grids , 2009, CCS.

[13]  Dimitri P. Bertsekas,et al.  Nonlinear Programming , 1997 .

[14]  Quanyan Zhu,et al.  Coding Schemes for Securing Cyber-Physical Systems Against Stealthy Data Injection Attacks , 2016, IEEE Transactions on Control of Network Systems.

[15]  R. E. Kalman,et al.  A New Approach to Linear Filtering and Prediction Problems , 2002 .

[16]  Pietro Tesi,et al.  Input-to-State Stabilizing Control Under Denial-of-Service , 2015, IEEE Transactions on Automatic Control.

[17]  Vijay Gupta,et al.  On Kalman filtering in the presence of a compromised sensor: Fundamental performance bounds , 2014, 2014 American Control Conference.

[18]  Vijay Gupta,et al.  Security in stochastic control systems: Fundamental limitations and performance bounds , 2015, 2015 American Control Conference (ACC).

[19]  Karl Henrik Johansson,et al.  Cyber security analysis of state estimators in electric power systems , 2010, 49th IEEE Conference on Decision and Control (CDC).

[20]  Guanghui Wen,et al.  Bridging the gap between complex networks and smart grids , 2014 .

[21]  Ling Shi,et al.  Optimal Linear Cyber-Attack on Remote State Estimation , 2017, IEEE Transactions on Control of Network Systems.

[22]  Bruno Sinopoli,et al.  Secure control against replay attacks , 2009, 2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[23]  Junmin Wang,et al.  Adaptive Sliding-Mode Observer Design for a Selective Catalytic Reduction System of Ground-Vehicle Diesel Engines , 2016, IEEE/ASME Transactions on Mechatronics.

[24]  Rafal Rohozinski,et al.  Stuxnet and the Future of Cyber War , 2011 .

[25]  Jill Slay,et al.  Lessons Learned from the Maroochy Water Breach , 2007, Critical Infrastructure Protection.

[26]  Ling Shi,et al.  Optimal Denial-of-Service Attack Scheduling With Energy Constraint , 2015, IEEE Transactions on Automatic Control.

[27]  B. Anderson,et al.  Optimal Filtering , 1979, IEEE Transactions on Systems, Man, and Cybernetics.

[28]  Hui Zhang,et al.  Active Steering Actuator Fault Detection for an Automatically-Steered Electric Ground Vehicle , 2017, IEEE Transactions on Vehicular Technology.

[29]  Guang-Hong Yang,et al.  Improved adaptive resilient control against sensor and actuator attacks , 2018, Inf. Sci..

[30]  Emanuele Garone,et al.  False data injection attacks against state estimation in wireless sensor networks , 2010, 49th IEEE Conference on Decision and Control (CDC).

[31]  Ling Shi,et al.  Worst-Case Innovation-Based Integrity Attacks With Side Information on Remote State Estimation , 2019, IEEE Transactions on Control of Network Systems.

[32]  Qing-Long Han,et al.  State estimation under false data injection attacks: Security analysis and system protection , 2018, Autom..

[33]  Karl Henrik Johansson,et al.  On Security Indices for State Estimators in Power Networks , 2010 .

[34]  Cheolhyeon Kwon,et al.  Reachability Analysis for Safety Assurance of Cyber-Physical Systems Against Cyber Attacks , 2018, IEEE Transactions on Automatic Control.

[35]  Tat-Seng Chua,et al.  Unifying Virtual and Physical Worlds , 2017, ACM Trans. Inf. Syst..