Skip to main content
Log in

Detection of Stealthy False Data Injection Attacks Against Cyber-Physical Systems: A Stochastic Coding Scheme

  • Published:
Journal of Systems Science and Complexity Aims and scope Submit manuscript

Abstract

This paper, from the view of a defender, addresses the security problem of cyber-physical systems (CPSs) subject to stealthy false data injection (FDI) attacks that cannot be detected by a residual-based anomaly detector without other defensive measures. To detect such a class of FDI attacks, a stochastic coding scheme, which codes the sensor measurement with a Gaussian stochastic signal at the sensor side, is proposed to assist an anomaly detector to expose the FDI attack. In order to ensure the system performance in the normal operational context, a decoder is adopted to decode the coded sensor measurement when received at the controller side. With this detection scheme, the residual under the attack can be significantly different from that in the normal situation, and thus trigger an alarm. The design condition of the coding signal covariance is derived to meet the constraints of false alarm rate and attack detection rate. To minimize the trace of the coding signal covariance, the design problem of the coding signal is converted into a constraint non-convex optimization problem, and an estimation-optimization iteration algorithm is presented to obtain a numerical solution of the coding signal covariance. A numerical example is given to verify the effectiveness of the proposed scheme.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Mahmoud M S, Hamdan M M, and Baroudi U A, Modeling and control of cyber-physical systems subject to cyber attacks: A survey of recent advances and challenges, Neurocomputing, 2019, 338: 101–115.

    Article  Google Scholar 

  2. Pang Z H, Bai C D, Liu G P, et al., A novel networked predictive control method for systems with random communication constraints, Journal of Systems Science & Complexity, 2021, 34(4): 1364–1378.

    Article  MathSciNet  Google Scholar 

  3. Pang Z H, Zheng C B, Li C, et al., Cloud-based time-varying formation predictive control of multi-agent systems with random communication constraints and quantized signals, IEEE Trans. Circuits Syst. II, Exp. Briefs, 2022, 69(3): 1282–1286.

    Article  Google Scholar 

  4. Fidler D P, Was stuxnet an act of war? Decoding a cyberattack, IEEE Secur. Priv., 2011, 9(4): 56–59.

    Article  Google Scholar 

  5. Zhang H, Cheng P, Shi L, et al., Optimal denial-of-service attack scheduling with energy constraint, IEEE Trans. Autom. Control, 2015, 60(11): 3023–3028.

    Article  MathSciNet  Google Scholar 

  6. Qin J H, Li M L, Shi L, et al., Optimal denial-of-service attack scheduling with energy constraint over packet-dropping networks, IEEE Trans. Autom. Control, 2018, 63(6): 1648–1663.

    Article  MathSciNet  Google Scholar 

  7. Bai C Z, Pasqualetti F, and Gupta V, Data-injection attacks in stochastic control systems: Detectability and performance tradeoffs, Automatica, 2017, 82: 251–260.

    Article  MathSciNet  Google Scholar 

  8. Kung E, Dey S, and Shi L, The performance and limitations of ε-stealthy attacks on higher order systems, IEEE Trans. Autom. Control, 2017, 62(2): 941–947.

    Article  MathSciNet  Google Scholar 

  9. Chen Y, Kar S, and Moura J M F, Cyber-physical attacks with control objectives, IEEE Trans. Autom. Control, 2017, 63(5): 1418–1425.

    Article  MathSciNet  Google Scholar 

  10. Zhang Q R, Liu K, Xia Y Q, et al., Optimal stealthy deception attack against cyber-physical systems, IEEE Trans. Cybern., 2020, 50(9): 3963–3972.

    Article  Google Scholar 

  11. Pang Z H, Fan L Z, Dong Z, et al., False data injection attacks against partial sensor measurements of networked control systems, IEEE Trans. Circuits Syst. II, Exp. Briefs, 2022, 69(1): 149–153.

    Article  Google Scholar 

  12. Qin J H, Li M L, Wang J, et al., Optimal denial-of-service attack energy management against state estimation over an SINR-based network, Automatica, 2020, 119: 109090.

    Article  MathSciNet  Google Scholar 

  13. Hou F Y, Sun J, Yang Q L, et al., Deep reinforcement learning for optimal denial-of-service attack scheduling, Sci. China Inf. Sci., 2022, 65: 162201.

    Article  MathSciNet  Google Scholar 

  14. Wu G Y and Sun J, Optimal switching integrity attacks on sensors in industrial control systems, Journal of Systems Science & Complexity, 2019, 32(5): 1290–1305.

    Article  MathSciNet  Google Scholar 

  15. Wu G Y, Wang G, Sun J, et al., Optimal partial feedback attacks in cyber-physical power systems, IEEE Trans. Autom. Control, 2020, 65(9): 3919–3926.

    Article  MathSciNet  Google Scholar 

  16. Li F F and Tang Y, False data injection attack for cyber-physical systems with resource constraint, IEEE Trans. Cybern., 2020, 50(2): 729–738.

    Article  Google Scholar 

  17. Guo Z Y, Shi D W, Johansson K H, et al., Optimal linear cyber-attack on remote state estimation, IEEE Trans. Control Netw. Syst., 2017, 4(1): 4–13.

    Article  MathSciNet  Google Scholar 

  18. Guo Z Y, Shi D W, Johansson K H, et al., Worst-case stealthy innovation-based linear attack on remote state estimation, Automatica, 2018, 89: 117–124.

    Article  MathSciNet  Google Scholar 

  19. Li Y G and Yang G H, Optimal stealthy false data injection attacks in cyber-physical systems, Inf. Sci., 2019, 481: 474–490.

    Article  MathSciNet  Google Scholar 

  20. Pang Z H, Liu G P, Zhou D H, et al., Two-channel false data injection attacks against output tracking control of networked systems, IEEE Trans. Ind. Electron., 2016, 63(5): 3242–3251.

    Article  Google Scholar 

  21. Mo Y L, Chabukswar R, and Sinopoli B, Detecting integrity attacks on SCADA systems, IEEE Trans. Control Syst. Technol., 2014, 22(4): 1396–1407.

    Article  Google Scholar 

  22. Ye D, Zhang T Y, and Guo G, Stochastic coding detection scheme in cyber-physical systems against replay attack, Inf. Sci., 2019, 481: 432–444.

    Article  MathSciNet  Google Scholar 

  23. Li Y Z, Shi L, and Chen T W, Detection against linear deception attacks on multi-sensor remote state estimation, IEEE Trans. Control Netw. Syst., 2017, 5(3): 846–856.

    Article  MathSciNet  Google Scholar 

  24. Chattopadhyay A and Mitra U, Attack detection and secure estimation under false data injection attack in cyber-physical systems, 52nd Annu. Conf. Inf. Sci. Syst., 2018, 1–6.

  25. Guo Z Y, Shi D W, Quevedo D E, et al., Secure state estimation against integrity attacks: A gaussian mixture model approach, IEEE Trans. Signal Process., 2019, 67(1): 194–207.

    Article  MathSciNet  Google Scholar 

  26. Miao F, Zhu Q Y, Pajic M, et al., Coding schemes for securing cyber-physical systems against stealthy data injection attacks, IEEE Transactions on Control of Network Systems, 2017, 4(1): 106–117.

    Article  MathSciNet  Google Scholar 

  27. Pang Z H, Fan L Z, Sun J, et al., Detection of stealthy false data injection attacks against networked control systems via active data modification, Inf. Sci., 2021, 546: 192–205.

    Article  MathSciNet  Google Scholar 

  28. Kalman R E, A new approach to linear filtering and prediction problems, Journal of Basic Engineering, 1960, 82(1): 35–45.

    Article  MathSciNet  Google Scholar 

  29. Zhang T Y and Ye D, False data injection attacks with complete stealthiness in cyber-physical systems: A self-generated approach, Automatica, 2020, 120: 109117.

    Article  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jun Li.

Additional information

This research was supported by the National Natural Science Foundation of China under Grant Nos. 61925303, 62088101, U20B2073, 61720106011, and 62173002, the National Key R&D Program of China under Grant No. 2018YFB1700100, and the Beijing Natural Science Foundation under Grant No. 4222045.

This paper was recommended for publication by Editor GUO Jin.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Guo, H., Pang, Z., Sun, J. et al. Detection of Stealthy False Data Injection Attacks Against Cyber-Physical Systems: A Stochastic Coding Scheme. J Syst Sci Complex 35, 1668–1684 (2022). https://doi.org/10.1007/s11424-022-1005-z

Download citation

  • Received:

  • Revised:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11424-022-1005-z

Keywords

Navigation