Detection of Perfect Stealthy Attacks on Cyber-Physical Systems Subject to Measurement Quantizations: A Watermark-Based Strategy

IF 15.3 1区 计算机科学 Q1 AUTOMATION & CONTROL SYSTEMS
Yu-Ang Wang;Zidong Wang;Lei Zou;Bo Shen;Hongli Dong
{"title":"Detection of Perfect Stealthy Attacks on Cyber-Physical Systems Subject to Measurement Quantizations: A Watermark-Based Strategy","authors":"Yu-Ang Wang;Zidong Wang;Lei Zou;Bo Shen;Hongli Dong","doi":"10.1109/JAS.2024.124815","DOIUrl":null,"url":null,"abstract":"In this paper, the attack detection problem is inves-tigated for a class of closed-loop systems subjected to unknown-but-bounded noises in the presence of stealthy attacks. The measurement outputs from the sensors are quantized before transmission. A specific type of perfect stealthy attack, which meets certain rather stringent conditions, is taken into account. Such attacks could be injected by adversaries into both the sensor-to-estimator and controller-to-actuator channels, with the aim of disrupting the normal data flow. For the purpose of defending against these perfect stealthy attacks, a novel scheme based on watermarks is developed. This scheme includes the injection of watermarks (applied to data prior to quantization) and the recovery of data (implemented before the data reaches the estimator). The watermark-based scheme is designed to be both time-varying and hidden from adversaries through incorporating a time-varying and bounded watermark signal. Subsequently, a watermark-based attack detection strategy is proposed which thoroughly considers the characteristics of perfect stealthy attacks, thereby ensuring that an alarm is activated upon the occurrence of such attacks. An example is provided to demonstrate the efficacy of the proposed mechanism for detecting attacks.","PeriodicalId":54230,"journal":{"name":"Ieee-Caa Journal of Automatica Sinica","volume":"12 1","pages":"114-125"},"PeriodicalIF":15.3000,"publicationDate":"2025-01-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Ieee-Caa Journal of Automatica Sinica","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10848385/","RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"AUTOMATION & CONTROL SYSTEMS","Score":null,"Total":0}
引用次数: 0

Abstract

In this paper, the attack detection problem is inves-tigated for a class of closed-loop systems subjected to unknown-but-bounded noises in the presence of stealthy attacks. The measurement outputs from the sensors are quantized before transmission. A specific type of perfect stealthy attack, which meets certain rather stringent conditions, is taken into account. Such attacks could be injected by adversaries into both the sensor-to-estimator and controller-to-actuator channels, with the aim of disrupting the normal data flow. For the purpose of defending against these perfect stealthy attacks, a novel scheme based on watermarks is developed. This scheme includes the injection of watermarks (applied to data prior to quantization) and the recovery of data (implemented before the data reaches the estimator). The watermark-based scheme is designed to be both time-varying and hidden from adversaries through incorporating a time-varying and bounded watermark signal. Subsequently, a watermark-based attack detection strategy is proposed which thoroughly considers the characteristics of perfect stealthy attacks, thereby ensuring that an alarm is activated upon the occurrence of such attacks. An example is provided to demonstrate the efficacy of the proposed mechanism for detecting attacks.
测量量化的网络物理系统完美隐身攻击检测:一种基于水印的策略
本文研究了一类具有未知但有界噪声的闭环系统在隐身攻击下的攻击检测问题。传感器的测量输出在传输前被量化。一种特定类型的完美隐身攻击,它满足某些相当严格的条件,被考虑在内。这种攻击可以被攻击者注入到传感器到估计器和控制器到执行器的通道中,目的是破坏正常的数据流。为了防御这些完美的隐身攻击,提出了一种基于水印的新方案。该方案包括水印的注入(在量化之前应用于数据)和数据的恢复(在数据到达估计器之前实现)。该方案采用时变有界水印信号,既具有时变特性,又具有隐蔽性。在此基础上,提出了一种基于水印的攻击检测策略,该策略充分考虑了完美隐身攻击的特点,从而保证在完美隐身攻击发生时触发报警。通过实例验证了所提出的攻击检测机制的有效性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
Ieee-Caa Journal of Automatica Sinica
Ieee-Caa Journal of Automatica Sinica Engineering-Control and Systems Engineering
CiteScore
23.50
自引率
11.00%
发文量
880
期刊介绍: The IEEE/CAA Journal of Automatica Sinica is a reputable journal that publishes high-quality papers in English on original theoretical/experimental research and development in the field of automation. The journal covers a wide range of topics including automatic control, artificial intelligence and intelligent control, systems theory and engineering, pattern recognition and intelligent systems, automation engineering and applications, information processing and information systems, network-based automation, robotics, sensing and measurement, and navigation, guidance, and control. Additionally, the journal is abstracted/indexed in several prominent databases including SCIE (Science Citation Index Expanded), EI (Engineering Index), Inspec, Scopus, SCImago, DBLP, CNKI (China National Knowledge Infrastructure), CSCD (Chinese Science Citation Database), and IEEE Xplore.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信