Design of data-injection attacks for cyber-physical systems based on Kullback-Leibler divergence

Abstract In this paper, the design problem of data-injection attacks is investigated for a class of cyber-physical systems (CPSs) whose inputs can be changed by the malicious adversary. A novel attack design method is proposed by solving an optimization problem based on Kullback–Leibler divergence (KLD). It can make maximum influence on the residual sequences in the sense of probability distribution but cannot be detected by the detector with preset significance level. A simulation study is carried out to demonstrate the effectiveness and applicability of the proposed method.

[1]  Lihui Wang,et al.  Current status and advancement of cyber-physical systems in manufacturing , 2015 .

[2]  Jian Sun,et al.  Optimal Data Injection Attacks in Cyber-Physical Systems , 2018, IEEE Transactions on Cybernetics.

[3]  Ruochi Zhang,et al.  Stealthy Control Signal Attacks in Linear Quadratic Gaussian Control Systems: Detectability Reward Tradeoff , 2017, IEEE Transactions on Information Forensics and Security.

[4]  Sonia Martínez,et al.  On the Performance Analysis of Resilient Networked Control Systems Under Replay Attacks , 2013, IEEE Transactions on Automatic Control.

[5]  Daqiang Zhang,et al.  Context-aware vehicular cyber-physical systems with cloud support: architecture, challenges, and solutions , 2014, IEEE Communications Magazine.

[6]  Hsiao-Hwa Chen,et al.  Intrusion Detection in Cyber-Physical Systems: Techniques and Challenges , 2014, IEEE Systems Journal.

[7]  Edward A. Lee,et al.  Modeling Cyber–Physical Systems , 2012, Proceedings of the IEEE.

[8]  Edward A. Lee The Past, Present and Future of Cyber-Physical Systems: A Focus on Models , 2015, Sensors.

[9]  Chao Yang,et al.  DoS attack in centralised sensor network against state estimation , 2018, IET Control Theory & Applications.

[10]  Bruce M. McMillin,et al.  Analysis of information flow security in cyber-physical systems , 2010, Int. J. Crit. Infrastructure Prot..

[11]  Martine Chlela,et al.  Fallback Control for Isochronous Energy Storage Systems in Autonomous Microgrids Under Denial-of-Service Cyber-Attacks , 2018, IEEE Transactions on Smart Grid.

[12]  Xiaofeng Wang,et al.  Networked Strong Tracking Filtering with Multiple Packet Dropouts: Algorithms and Applications , 2014, IEEE Transactions on Industrial Electronics.

[13]  Haibo He,et al.  Cyber-physical attacks and defences in the smart grid: a survey , 2016, IET Cyper-Phys. Syst.: Theory & Appl..

[14]  Wei Yu,et al.  On False Data-Injection Attacks against Power System State Estimation: Modeling and Countermeasures , 2014, IEEE Transactions on Parallel and Distributed Systems.

[15]  Fuad E. Alsaadi,et al.  A New Look at Boundedness of Error Covariance of Kalman Filtering , 2018, IEEE Transactions on Systems, Man, and Cybernetics: Systems.

[16]  Xin Huang,et al.  Reliable Control Policy of Cyber-Physical Systems Against a Class of Frequency-Constrained Sensor and Actuator Attacks , 2018, IEEE Transactions on Cybernetics.

[17]  Xinwen Fu,et al.  A New Replay Attack Against Anonymous Communication Networks , 2008, 2008 IEEE International Conference on Communications.

[18]  Donghua Zhou,et al.  Incipient sensor fault isolation based on augmented Mahalanobis distance , 2019, Control Engineering Practice.

[19]  Edward A. Lee Cyber Physical Systems: Design Challenges , 2008, 2008 11th IEEE International Symposium on Object and Component-Oriented Real-Time Distributed Computing (ISORC).

[20]  Donghua Zhou,et al.  Robust Fault Detection for Networked Systems with Distributed Sensors , 2011, IEEE Transactions on Aerospace and Electronic Systems.

[21]  Vijay Gupta,et al.  Data-injection attacks in stochastic control systems: Detectability and performance tradeoffs , 2017, Autom..

[22]  Changyun Wen,et al.  Adaptive cyber-physical system attack detection and reconstruction with application to power systems , 2016 .

[23]  Ping Zhang,et al.  Detection of replay attacks in cyber-physical systems , 2016, 2016 American Control Conference (ACC).

[24]  Ling Shi,et al.  Jamming Attacks on Remote State Estimation in Cyber-Physical Systems: A Game-Theoretic Approach , 2015, IEEE Transactions on Automatic Control.

[25]  Daniel W. C. Ho,et al.  Observer-Based Event-Triggering Consensus Control for Multiagent Systems With Lossy Sensors and Cyber-Attacks , 2017, IEEE Transactions on Cybernetics.

[26]  Gabriela Hug,et al.  Vulnerability Assessment of AC State Estimation With Respect to False Data Injection Cyber-Attacks , 2012, IEEE Transactions on Smart Grid.

[27]  Peng Huang,et al.  A denial-of-service attack on fiber-based continuous-variable quantum key distribution , 2018, Physics Letters A.

[28]  Changyin Sun,et al.  Energy efficient jamming attack schedule against remote state estimation in wireless cyber-physical systems , 2018, Neurocomputing.

[29]  Qing-Long Han,et al.  State estimation under false data injection attacks: Security analysis and system protection , 2018, Autom..

[30]  Pierluigi Pisu,et al.  Resilient control strategy under Denial of Service in connected vehicles , 2017, 2017 American Control Conference (ACC).

[31]  Donghua Zhou,et al.  Exponential Smoothing Reconstruction Approach for Incipient Fault Isolation , 2018 .

[32]  Donghua Zhou,et al.  Leakage Fault Diagnosis for an Internet-Based Three-Tank System: An Experimental Study , 2012, IEEE Transactions on Control Systems Technology.

[33]  Xin Huang,et al.  Adaptive integral sliding‐mode control strategy of data‐driven cyber‐physical systems against a class of actuator attacks , 2018, IET Control Theory & Applications.

[34]  Yuanqing Xia,et al.  Security estimation under Denial-of-Service attack with energy constraint , 2018, Neurocomputing.

[35]  Yurong Liu,et al.  Stability Analysis of Covariance Intersection-Based Kalman Consensus Filtering for Time-Varying Systems , 2020, IEEE Transactions on Systems, Man, and Cybernetics: Systems.

[36]  David K. Y. Yau,et al.  Defense of Cyber Infrastructures Against Cyber‐Physical Attacks Using Game‐Theoretic Models , 2016, Risk analysis : an official publication of the Society for Risk Analysis.

[37]  Insup Lee,et al.  Cyber-physical systems: The next computing revolution , 2010, Design Automation Conference.

[38]  Ling Shi,et al.  Optimal Denial-of-Service Attack Scheduling With Energy Constraint Over Packet-Dropping Networks , 2018, IEEE Transactions on Automatic Control.

[39]  Ali Davoudi,et al.  Detection of False-Data Injection Attacks in Cyber-Physical DC Microgrids , 2017, IEEE Transactions on Industrial Informatics.

[40]  Jay Lee,et al.  A Cyber-Physical Systems architecture for Industry 4.0-based manufacturing systems , 2015 .

[41]  Weiyi Liu,et al.  Security analysis for Cyber-Physical Systems against stealthy deception attacks , 2013, 2013 American Control Conference.

[42]  Soummya Kar,et al.  Dynamic Attack Detection in Cyber-Physical Systems With Side Initial State Information , 2015, IEEE Transactions on Automatic Control.

[43]  Qing-Long Han,et al.  A Survey on Model-Based Distributed Control and Filtering for Industrial Cyber-Physical Systems , 2019, IEEE Transactions on Industrial Informatics.

[44]  Yang Xiang,et al.  A survey on security control and attack detection for industrial cyber-physical systems , 2018, Neurocomputing.

[45]  Zhu Han,et al.  Bad Data Injection Attack and Defense in Electricity Market Using Game Theory Study , 2012, IEEE Transactions on Smart Grid.

[46]  Theodore Tryfonas,et al.  A game theoretic defence framework against DoS/DDoS cyber attacks , 2013, Comput. Secur..

[47]  Xiaohua Ge,et al.  Distributed Attack Detection and Secure Estimation of Networked Cyber-Physical Systems Against False Data Injection Attacks and Jamming Attacks , 2018, IEEE Transactions on Signal and Information Processing over Networks.