Detection of stealthy false data injection attacks against networked control systems via active data modification

Zhong Hua Pang*, Lan Zhi Fan, Jian Sun, Kun Liu, Guo Ping Liu

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

127 Citations (Scopus)

Abstract

This paper investigates the design and detection problems of stealthy false data injection (FDI) attacks against networked control systems from the different perspectives of an attacker and a defender, respectively. First, a Kalman filter-based output tracking control system is presented, where stealthy FDI attacks are designed for its feedback and forward channels so as to destroy the system performance while bypassing a traditional residual-based detector. Second, to successfully detect such two-channel stealthy attacks, an active data modification scheme is proposed, by which the measurement and control data are amended before transmitting them through communication networks. Theoretical analysis is then carried out for both ideal and practical cases to evaluate the effectiveness of the detection scheme. An interesting finding is that the attacks designed based on a false model obtained from those modified data can remain stealthy. Finally, simulation results are provided to validate the proposed attack design and detection schemes.

Original languageEnglish
Pages (from-to)192-205
Number of pages14
JournalInformation Sciences
Volume546
DOIs
Publication statusPublished - 6 Feb 2021

Keywords

  • Active data modification
  • Attack design
  • Attack detection
  • Networked control systems (NCSs)
  • Stealthy false data injection attacks

Fingerprint

Dive into the research topics of 'Detection of stealthy false data injection attacks against networked control systems via active data modification'. Together they form a unique fingerprint.

Cite this