TY - JOUR
T1 - Analysis of Stealthy False Data Injection Attacks Against Networked Control Systems
T2 - Three Case Studies
AU - Pang, Zhonghua
AU - Fu, Yuan
AU - Guo, Haibin
AU - Sun, Jian
N1 - Publisher Copyright:
© 2023, The Editorial Office of JSSC & Springer-Verlag GmbH Germany.
PY - 2023/8
Y1 - 2023/8
N2 - This paper mainly investigates the security problem of a networked control system based on a Kalman filter. A false data injection attack scheme is proposed to only tamper the measurement output, and its stealthiness and effects on system performance are analyzed under three cases of system knowledge held by an attacker and a defender. Firstly, it is derived that the proposed attack scheme is stealthy for a residual-based detector when the attacker and the defender hold the same accurate system knowledge. Secondly, it is proven that the proposed attack scheme is still stealthy even if the defender actively modifies the Kalman filter gain so as to make it different from that of the attacker. Thirdly, the stealthiness condition of the proposed attack scheme based on an inaccurate model is given. Furthermore, for each case, the instability conditions of the closed-loop system under attack are derived. Finally, simulation results are provided to test the proposed attack scheme.
AB - This paper mainly investigates the security problem of a networked control system based on a Kalman filter. A false data injection attack scheme is proposed to only tamper the measurement output, and its stealthiness and effects on system performance are analyzed under three cases of system knowledge held by an attacker and a defender. Firstly, it is derived that the proposed attack scheme is stealthy for a residual-based detector when the attacker and the defender hold the same accurate system knowledge. Secondly, it is proven that the proposed attack scheme is still stealthy even if the defender actively modifies the Kalman filter gain so as to make it different from that of the attacker. Thirdly, the stealthiness condition of the proposed attack scheme based on an inaccurate model is given. Furthermore, for each case, the instability conditions of the closed-loop system under attack are derived. Finally, simulation results are provided to test the proposed attack scheme.
KW - False data injection attack
KW - networked control systems (NCSs)
KW - stability
KW - stealthiness
UR - http://www.scopus.com/inward/record.url?scp=85142148744&partnerID=8YFLogxK
U2 - 10.1007/s11424-022-2120-6
DO - 10.1007/s11424-022-2120-6
M3 - Article
AN - SCOPUS:85142148744
SN - 1009-6124
VL - 36
SP - 1407
EP - 1422
JO - Journal of Systems Science and Complexity
JF - Journal of Systems Science and Complexity
IS - 4
ER -