Analysis of Stealthy False Data Injection Attacks Against Networked Control Systems: Three Case Studies

Zhonghua Pang, Yuan Fu, Haibin Guo, Jian Sun*

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

26 Citations (Scopus)

Abstract

This paper mainly investigates the security problem of a networked control system based on a Kalman filter. A false data injection attack scheme is proposed to only tamper the measurement output, and its stealthiness and effects on system performance are analyzed under three cases of system knowledge held by an attacker and a defender. Firstly, it is derived that the proposed attack scheme is stealthy for a residual-based detector when the attacker and the defender hold the same accurate system knowledge. Secondly, it is proven that the proposed attack scheme is still stealthy even if the defender actively modifies the Kalman filter gain so as to make it different from that of the attacker. Thirdly, the stealthiness condition of the proposed attack scheme based on an inaccurate model is given. Furthermore, for each case, the instability conditions of the closed-loop system under attack are derived. Finally, simulation results are provided to test the proposed attack scheme.

Original languageEnglish
Pages (from-to)1407-1422
Number of pages16
JournalJournal of Systems Science and Complexity
Volume36
Issue number4
DOIs
Publication statusPublished - Aug 2023

Keywords

  • False data injection attack
  • networked control systems (NCSs)
  • stability
  • stealthiness

Fingerprint

Dive into the research topics of 'Analysis of Stealthy False Data Injection Attacks Against Networked Control Systems: Three Case Studies'. Together they form a unique fingerprint.

Cite this