False data injection attacks with complete stealthiness in cyber-physical systems: A self-generated approach

Abstract In this paper, we consider the security problem of dynamic state estimations in cyber–physical systems (CPSs) when the sensors are compromised by false data injection (FDI) attacks with complete stealthiness. The FDI attacks with complete stealthiness can completely remove its influences on monitored residuals, which have better stealthy performance against residual-based detectors than existing FDI attacks. Based on self-generated FDI attacks that are independent of real-time data of CPSs, we propose the necessary and sufficient condition of attack parameters such that FDI attacks can achieve complete stealthiness. Furthermore, we introduce the energy stealthiness of FDI attacks, which is a special case of complete stealthiness and makes the accumulated attack energy on residuals is bounded. Then, the existence and design conditions of FDI attacks with energy stealthiness are given. Finally, the superiority of the FDI attacks with complete stealthiness is demonstrated by the IEEE 6 bus power system.

[1]  Rongxing Lu,et al.  Defending Against False Data Injection Attacks on Power System State Estimation , 2017, IEEE Transactions on Industrial Informatics.

[2]  Andrea Conti,et al.  Wireless Sensor and Actuator Networks: Technologies, Analysis and Design , 2008 .

[3]  Derong Liu,et al.  Discrete-Time Optimal Control via Local Policy Iteration Adaptive Dynamic Programming , 2017, IEEE Transactions on Cybernetics.

[4]  Bruno Sinopoli,et al.  Detecting Integrity Attacks on SCADA Systems , 2014, IEEE Transactions on Control Systems Technology.

[5]  Vijay Gupta,et al.  On Kalman Filtering with Compromised Sensors: Attack Stealthiness and Performance Bounds , 2017, IEEE Transactions on Automatic Control.

[6]  Ling Shi,et al.  Optimal Denial-of-Service Attack Scheduling With Energy Constraint Over Packet-Dropping Networks , 2018, IEEE Transactions on Automatic Control.

[7]  Fengjun Li,et al.  Cyber-Physical Systems Security—A Survey , 2017, IEEE Internet of Things Journal.

[8]  Bruno Sinopoli,et al.  Sensor selection strategies for state estimation in energy constrained wireless sensor networks , 2011, Autom..

[9]  Beibei Li,et al.  DDOA: A Dirichlet-Based Detection Scheme for Opportunistic Attacks in Smart Grid Cyber-Physical System , 2016, IEEE Transactions on Information Forensics and Security.

[10]  Hyungbo Shim,et al.  Stealthy Adversaries Against Uncertain Cyber-Physical Systems: Threat of Robust Zero-Dynamics Attack , 2019, IEEE Transactions on Automatic Control.

[11]  Guang-Hong Yang,et al.  Input-to-State Stabilizing Control for Cyber-Physical Systems With Multiple Transmission Channels Under Denial of Service , 2018, IEEE Transactions on Automatic Control.

[12]  Guang-Hong Yang,et al.  Data-Driven Coordinated Attack Policy Design Based on Adaptive $\mathcal {L}_2$-Gain Optimal Theory , 2018, IEEE Transactions on Automatic Control.

[13]  Pietro Tesi,et al.  Resilient control under Denial-of-Service: Robust design , 2016, 2016 American Control Conference (ACC).

[14]  Tongwen Chen,et al.  False Data Injection Attacks on Networked Control Systems: A Stackelberg Game Analysis , 2018, IEEE Transactions on Automatic Control.

[15]  Zhao Yang Dong,et al.  A Review of False Data Injection Attacks Against Modern Power Systems , 2017, IEEE Transactions on Smart Grid.

[16]  Yuanqing Xia,et al.  Optimal Stealthy Deception Attack Against Cyber-Physical Systems , 2020, IEEE Transactions on Cybernetics.

[17]  Qing-Long Han,et al.  State estimation under false data injection attacks: Security analysis and system protection , 2018, Autom..

[18]  S. Shankar Sastry,et al.  Security of interdependent and identical networked control systems , 2013, Autom..

[19]  Vijay Gupta,et al.  Data-injection attacks in stochastic control systems: Detectability and performance tradeoffs , 2017, Autom..

[20]  Athanasios V. Vasilakos,et al.  False Data Injection on State Estimation in Power Systems—Attacks, Impacts, and Defense: A Survey , 2017, IEEE Transactions on Industrial Informatics.

[21]  Dan Ye,et al.  Stochastic coding detection scheme in cyber-physical systems against replay attack , 2019, Inf. Sci..

[22]  Karl Henrik Johansson,et al.  A secure control framework for resource-limited adversaries , 2012, Autom..

[23]  Ling Shi,et al.  Worst-case stealthy innovation-based linear attack on remote state estimation , 2018, Autom..

[24]  Zhao Yang Dong,et al.  The 2015 Ukraine Blackout: Implications for False Data Injection Attacks , 2017, IEEE Transactions on Power Systems.

[25]  Ling Shi,et al.  The Performance and Limitations of $\epsilon$- Stealthy Attacks on Higher Order Systems , 2017, IEEE Transactions on Automatic Control.

[26]  Guang-Hong Yang,et al.  Optimal Stealthy Innovation-Based Attacks With Historical Data in Cyber-Physical Systems , 2019, IEEE Transactions on Systems, Man, and Cybernetics: Systems.

[27]  Ruilong Deng,et al.  On Feasibility and Limitations of Detecting False Data Injection Attacks on Power Grid State Estimation Using D-FACTS Devices , 2020, IEEE Transactions on Industrial Informatics.

[28]  Dan Ye,et al.  Distributed Secure Control Against Denial-of-Service Attacks in Cyber-Physical Systems Based on K-Connected Communication Topology , 2020, IEEE Transactions on Cybernetics.

[29]  Guang-Hong Yang,et al.  Secure State Estimation Against Sparse Sensor Attacks With Adaptive Switching Mechanism , 2018, IEEE Transactions on Automatic Control.

[30]  Xiaoqiang Ren,et al.  Attack Allocation on Remote State Estimation in Multi-Systems: Structural Results and Asymptotic Solution , 2016, Autom..

[31]  Guang-Hong Yang,et al.  Data-Driven Methods for Stealthy Attacks on TCP/IP-Based Networked Control Systems Equipped With Attack Detectors , 2019, IEEE Transactions on Cybernetics.

[32]  Chao Yang,et al.  Distributed filtering under false data injection attacks , 2019, Autom..

[33]  Donghua Zhou,et al.  Two-Channel False Data Injection Attacks Against Output Tracking Control of Networked Systems , 2016, IEEE Transactions on Industrial Electronics.

[34]  Ling Shi,et al.  Accurate clock synchronization in wireless sensor networks with bounded noise , 2017, Autom..

[35]  Wei Xing Zheng,et al.  Denial-of-Service Power Dispatch Against Linear Quadratic Control via a Fading Channel , 2018, IEEE Transactions on Automatic Control.

[36]  Dan Ye,et al.  Summation Detector for False Data-Injection Attack in Cyber-Physical Systems , 2020, IEEE Transactions on Cybernetics.

[37]  Charles R. Johnson,et al.  Matrix analysis , 1985, Statistical Inference for Engineers and Data Scientists.