Stealthy FDI Attacks Against Networked Control Systems Using Two Filters with an Arbitrary Gain

  • Haibin Guo
  • , Jian Sun
  • , Zhong Hua Pang*
  • *Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

23 Citations (Scopus)

Abstract

This brief investigates a stealthy false data injection (FDI) attack scheme against two communication channels to damage the performance of a networked control system. Compared with most existing works, a more practical and reasonable assumption that an attacker only needs to know the physical system knowledge is considered. By using two filters with an arbitrary gain that can be different from the filter gain of the system, a novel feedback channel attack scheme is proposed to ensure the attack process is stealthy, and the forward channel attack signal can be flexibly designed according to specific attack purposes. It is proved that the proposed attack scheme can render the closed-loop system unstable while bypassing a residual-based detector. Two cases of simulation results are provided to verify the theoretical analysis results.

Original languageEnglish
Pages (from-to)3219-3223
Number of pages5
JournalIEEE Transactions on Circuits and Systems II: Express Briefs
Volume69
Issue number7
DOIs
Publication statusPublished - 1 Jul 2022

Keywords

  • Kalman filter
  • networked control systems
  • residual-based detector
  • stealthy FDI attacks

Fingerprint

Dive into the research topics of 'Stealthy FDI Attacks Against Networked Control Systems Using Two Filters with an Arbitrary Gain'. Together they form a unique fingerprint.

Cite this