Security Analysis of Cyber-Physical System under False Data Injection Attacks

Ruirui Liu, Hao Yu, Fei Hao

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

In this paper, the security analysis of the cyber-physical system which is modeled as linear dynamical system is investigated. The attackers can maliciously inject some false data into measurement and actuation channels; and the false data injection attacks are stealthy (complete stealthy) if the attack actions can bypass a χ2 detector (completely remove its impacts on monitored normal innovation). Correspondingly, a cyber-physical system is insecure if it can be destabilized by a stealthy or complete stealthy attack. When the attackers are able to compromise all measurement and part of (all) actuation channels, a necessary and sufficient condition for the attack effectiveness is established. In addition, a sufficient condition for the security of the system is derived when part of measurement and all (part of) actuation channels are under attacks. Finally, some simulations are provided to illustrate the effectiveness of the obtained results.

Original languageEnglish
Title of host publicationProceedings of the 40th Chinese Control Conference, CCC 2021
EditorsChen Peng, Jian Sun
PublisherIEEE Computer Society
Pages8586-8591
Number of pages6
ISBN (Electronic)9789881563804
DOIs
Publication statusPublished - 26 Jul 2021
Externally publishedYes
Event40th Chinese Control Conference, CCC 2021 - Shanghai, China
Duration: 26 Jul 202128 Jul 2021

Publication series

NameChinese Control Conference, CCC
Volume2021-July
ISSN (Print)1934-1768
ISSN (Electronic)2161-2927

Conference

Conference40th Chinese Control Conference, CCC 2021
Country/TerritoryChina
CityShanghai
Period26/07/2128/07/21

Keywords

  • Security analysis
  • cyber-physical system
  • false data injection attacks

Fingerprint

Dive into the research topics of 'Security Analysis of Cyber-Physical System under False Data Injection Attacks'. Together they form a unique fingerprint.

Cite this