A Controllable False Data Injection Attack for a Cyber Physical System

With the evolution of the Internet of Things (IoT), various types of devices and massive systems comprising national infrastructures such as a smart grid are connected on a network, which poses various types of security issues in a cyber physical system. In this paper, we propose two false data injection attacks, which are on the forward path and the feedback path of a control system. Both are designed with a controllable parameter which determines the degree of degradation. A defensive method of inversing a linear forward attack through estimating with least square or minimum mean squared method was developed. A conventional Kalman filter was considered as a defensive method for a noise injection attack on the feedback path. The numerical evaluation verifies that the parameters of the proposed attacks control the degree of performance degradation of the control system, and the proposed defenses can effectively defend the proposed attacks.

[1]  Siu-Ming Yiu,et al.  Security Issues and Challenges for Cyber Physical System , 2010, 2010 IEEE/ACM Int'l Conference on Green Computing and Communications & Int'l Conference on Cyber, Physical and Social Computing.

[2]  Bobbi Jo Broxson The Kronecker Product , 2006 .

[3]  Aaas News,et al.  Book Reviews , 1893, Buffalo Medical and Surgical Journal.

[4]  Thomas M. Chen,et al.  Lessons from Stuxnet , 2011, Computer.

[5]  Florian Dörfler,et al.  Attack Detection and Identification in Cyber-Physical Systems -- Part II: Centralized and Distributed Monitor Design , 2012, ArXiv.

[6]  Edward A. Lee Cyber Physical Systems: Design Challenges , 2008, 2008 11th IEEE International Symposium on Object and Component-Oriented Real-Time Distributed Computing (ISORC).

[7]  Raphael Machado,et al.  Covert Attacks in Cyber-Physical Control Systems , 2016, IEEE Transactions on Industrial Informatics.

[8]  Yilin Mo,et al.  False Data Injection Attacks in Control Systems , 2010 .

[9]  Biyun Chen,et al.  Real-Time Identification of False Data Injection Attacks: A Novel Dynamic-Static Parallel State Estimation Based Mechanism , 2019, IEEE Access.

[10]  L. El Ghaoui,et al.  Synthesis of fixed-structure controllers via numerical optimization , 1994, Proceedings of 1994 33rd IEEE Conference on Decision and Control.

[11]  Sonia Martínez,et al.  On the Performance Analysis of Resilient Networked Control Systems Under Replay Attacks , 2013, IEEE Transactions on Automatic Control.

[12]  Bin Jiang,et al.  Multiple incipient sensor faults diagnosis with application to high-speed railway traction devices. , 2017, ISA transactions.

[13]  Bin Jiang,et al.  Incipient winding fault detection and diagnosis for squirrel-cage induction motors equipped on CRH trains. , 2020, ISA transactions.

[14]  Yugang Niu,et al.  Finite-Time Sliding-Mode Control of Markovian Jump Cyber-Physical Systems Against Randomly Occurring Injection Attacks , 2020, IEEE Transactions on Automatic Control.

[15]  Roy S. Smith,et al.  Covert Misappropriation of Networked Control Systems: Presenting a Feedback Structure , 2015, IEEE Control Systems.

[16]  Zidong Wang,et al.  Event-based security control for discrete-time stochastic systems , 2016 .

[17]  Ping Zhang,et al.  Detection of covert attacks on cyber-physical systems by extending the system dynamics with an auxiliary system , 2017, 2017 IEEE 56th Annual Conference on Decision and Control (CDC).

[18]  Steven E. Shladover,et al.  Potential Cyberattacks on Automated Vehicles , 2015, IEEE Transactions on Intelligent Transportation Systems.

[19]  Jean-Christophe Bourin Matrix versions of some classical inequalities , 2006 .

[20]  Michael G. Safonov Data-Driven Robust Control Design: Unfalsified Control , 2003 .

[21]  Yuanyuan Wang,et al.  Online Generative Adversary Network Based Measurement Recovery in False Data Injection Attacks: A Cyber-Physical Approach , 2020, IEEE Transactions on Industrial Informatics.

[22]  Xiao-Heng Chang,et al.  Estimation for a Class of Parameter-Controlled Tunnel Diode Circuits , 2020, IEEE Transactions on Systems, Man, and Cybernetics: Systems.

[23]  Deepa Kundur,et al.  Implementing a real-time cyber-physical system test bed in RTDS and OPNET , 2014, 2014 North American Power Symposium (NAPS).

[24]  Mohammad Sayad Haghighi,et al.  Detection and Compensation of Covert Service-Degrading Intrusions in Cyber Physical Systems through Intelligent Adaptive Control , 2019, 2019 IEEE International Conference on Industrial Technology (ICIT).

[25]  Tirza Routtenberg,et al.  Detection of False Data Injection Attacks in Smart Grids Based on Graph Signal Processing , 2018, IEEE Systems Journal.

[26]  Roy S. Smith,et al.  A Decoupled Feedback Structure for Covertly Appropriating Networked Control Systems , 2011 .

[27]  Xiao-Heng Chang,et al.  Fuzzy Peak-to-Peak Filtering for Networked Nonlinear Systems With Multipath Data Packet Dropouts , 2019, IEEE Transactions on Fuzzy Systems.

[28]  Shihua Li,et al.  Prescribed-Time Second-Order Sliding Mode Controller Design Subject to Mismatched Term , 2017, IEEE Transactions on Circuits and Systems II: Express Briefs.

[29]  Massimo Franceschetti,et al.  Learning-based attacks in cyber-physical systems. , 2018 .

[30]  Parv Venkitasubramaniam,et al.  Information-Theoretic Security in Stochastic Control Systems , 2015, Proceedings of the IEEE.