175
Views
0
CrossRef citations to date
0
Altmetric
Research Articles

A transmission scheme for secure estimation of cyber-physical systems against malicious attack

, &
Pages 811-822 | Received 16 Nov 2020, Accepted 26 Jan 2023, Published online: 09 Feb 2023

References

  • Amin, S., Litrico, X., Sastry, S. S., & Bayen, A. M. (2013). Cyber security of water scada systems–Part I: Analysis and experimentation of stealthy deception attacks. IEEE Transactions on Control Systems Technology, 21(5), 1963–1970. https://doi.org/10.1109/TCST.2012.2211873
  • Biron, Z. A., Dey, S., & Pisu, P. (2018). Real-time detection and estimation of denial of service attack in connected vehicle systems. IEEE Transactions on Intelligent Transportation Systems, 19(12), 3893–3902. https://doi.org/10.1109/TITS.2018.2791484
  • Ding, D. R., Wei, G. L., Zhang, S. J., Liu, Y. R., & Alsaadi, F. E. (2017). On scheduling of deception attacks for discrete-time networked systems equipped with attack detectors. Neurocomputing, 219, 99–106. https://doi.org/10.1016/j.neucom.2016.09.009
  • Fawzi, H., Tabuada, P., & Diggavi, S. (2014). Secure estimation and control for cyber-physical systems under adversarial attacks. IEEE Transactions on Automatic Control, 59(6), 1454–1467. https://doi.org/10.1109/TAC.2014.2303233
  • Giraldo, J., Urbina, D., Cardenas, A., Valente, J., Faisal, M., Ruths, J., Tippenhauer, N. O., Sandberg, H., & Candell, R. (2018). A survey of physics-based attack detection in cyber-physical systems. ACM Computing Surveys (CSUR), 51(4), 1–36. https://doi.org/10.1145/3203245
  • Guan, Y., & Ge, X. (2018). Distributed attack detection and secure estimation of networked cyber-physical systems against false data injection attacks and jamming attacks. IEEE Transactions on Signal and Information Processing over Networks, 4(1), 48–59. https://doi.org/10.1109/TSIPN.6884276
  • Guo, Z., Shi, D., Johansson, K. H., & Shi, L. (2018). Worst-case stealthy innovation-based linear attack on remote state estimation. Automatica, 89, 117–124. https://doi.org/10.1016/j.automatica.2017.11.018
  • Hu, L., Wang, Z., Han, Q. L., & Liu, X. (2018). State estimation under false data injection attacks: Security analysis and system protection. Automatica, 87(87), 176–183. https://doi.org/10.1016/j.automatica.2017.09.028
  • Hua, Y., Chen, F., Deng, S., Duan, S., & Wang, L. (2020). Secure distributed estimation against false data injection attack. Information Siences, 515, 248–262. https://doi.org/10.1016/j.ins.2019.12.016
  • Jun, S. W., & Guang, H. Y. (2019). Data-Driven methods for stealthy attacks on TCP/IP-based networked control systems equipped with attack detectors. IEEE Transactions on Cybernetics, 49(8), 3020–3031. https://doi.org/10.1109/TCYB.2018.2837874
  • Khanna, K., Panigrahi, B. K., & Joshi, A. (2017). AI-based approach to identify compromised meters in data integrity attacks on smart grid. IET Generation, Transmission & Distribution, 12(5), 1052–1066. https://doi.org/10.1049/gtd2.v12.5
  • Kosut, O., Jia, L., Thomas, R. J., & Lang, T. (2011). Malicious data attacks on the smart grid. IEEE Transactions on Smart Grid, 2(4), 648–658. https://doi.org/10.1109/TSG.2011.2163807
  • Kurt, M. N., lmaz, Y. Y., & Wang, X. (2019). Real-time detection of hybrid and stealthy cyber-attacks in smart grid. IEEE Transactions on Information Forensics and Security, 14(2), 498–513. https://doi.org/10.1109/TIFS.2018.2854745
  • Liang, G., Weller, S. R., Zhao, J., Luo, F., & Dong, Z. Y. (2017). The 2015 Ukraine blackout: Implications for false data injection attacks. IEEE Transactions on Power Systems, 32(4), 3317–3318. https://doi.org/10.1109/TPWRS.2016.2631891
  • Liu, Y., Ning, P., & Reiter, M. K. (2009). False data injection attacks against state estimation in electric power grids. In Proceedings of 16th ACM conference computer and communications security (pp. 21–32).
  • Ljung, L. (1996). System identification. In W. Levine (Ed.), The control handbook (pp. 1033–1054). CRC Press.
  • Lu, A. Y., & Yang, G. H. (2020). Malicious attacks on state estimation against distributed control systems. IEEE Transactions on Automatic Control, 65(9), 3911–3918. https://doi.org/10.1109/TAC.9
  • Manandhar, K., Cao, X., Hu, F., & Liu, Y. (2014). Detection of faults and attacks including false data injection attack in smart grid using Kalman filter. IEEE Transactions on Control of Network Systems, 1(4), 370–379. https://doi.org/10.1109/TCNS.2014.2357531
  • Michelle, S. C., Masashi, W., & Joao, P. H. (2015). Observability of linear systems under adversarial attacks. In Proceedings of the American control conference (ACC'15) (pp. 2439–2444).
  • Mo, Y., & Sinopoli, B. (2015). Secure estimation in the presence of integrity attacks. IEEE Transactions on Automatic Control, 60(4), 1145–1151. https://doi.org/10.1109/TAC.2014.2350231
  • Mo, Y., & Sinopoli, B. (2016). On the performance degradation of cyberphysical systems under stealthy integrity attacks. IEEE Transactions on Automatic Control, 61(9), 2618–2624. https://doi.org/10.1109/TAC.2015.2498708
  • Mousavinejad, E., Yang, F., Han, Q. L., & Vlacic, L. (2018). A novel cyber attack detection method in networked control systems. IEEE Transactions on Cybernetics, 48(11), 3254–3264. https://doi.org/10.1109/TCYB.2018.2843358
  • Ozay, M., Esnaola, I., Vural, F. T. Y., Kulkarni, S. R., & Poor, H. V. (2016). Machine learning methods for attack detection in the smart grid. IEEE Transactions on Neural Networks and Learning Systems, 27(8), 1773–1786. https://doi.org/10.1109/TNNLS.5962385
  • Pang, Z. H., Liu, G. P., Zhou, D. H., Hou, F. Y., & Sun, D. H. (2016). Two channel false data injection attacks against output tracking control of networked systems. IEEE Transactions on Industrial Electronics, 63(5), 3242–3251. https://doi.org/10.1109/TIE.2016.2535119
  • Robert, M., & Chen, I. (2014). A survey of intrusion detection techniques for cyber-physical systems. ACM Computing Surveys, 46(4), Article Number: 55. https://doi.org/10.1145/2542049
  • Sargolzaei, A., Yazdani, K., Abbaspour, A., Crane III, C. D., & Dixon, W. E. (2020). Detection and mitigation of false data injection attacks in networked control systems. IEEE Transactions on Industrial Informatics, 16(6), 4281–4292. https://doi.org/10.1109/TII.9424
  • Sinopoli, B., Schenato, L., Franceschetti, M., Poolla, K., Jordan, M. I., & Sastry, S. S. (2004). Kalman filtering with intermittent observations. IEEE Transactions on Automatic Control, 49(9), 1453–1464. https://doi.org/10.1109/TAC.2004.834121
  • Sun, K., Esnaola, I., Perlaza, S. M., & Poor, H. V. (2020). Stealth attacks on the smart grid. IEEE Transactions on Smart Grid, 11(2), 1276–1285. https://doi.org/10.1109/TSG.5165411
  • Wilson, E. B., & Hilferty, M. M. (1931). The distribution of Chi-square. Proceedings of the National Academy of Sciences, 17(12), 684–688. https://doi.org/10.1073/pnas.17.12.684
  • Wolf, M., & Serpanos, D. (2018). Safety and security in cyber-physical systems and Internet-of-Things systems. Proceedings of the IEEE, 106(1), 9–20. https://doi.org/10.1109/JPROC.2017.2781198
  • Wood, A. D., & Stankovic, J. A. (2002). Denial of service in sensor networks. IEEE Computer, 35(10), 54–62. https://doi.org/10.1109/MC.2002.1039518
  • Zhang, Q., Liu, K., Xia, Y., & Ma, A. (2019). Optimal stealthy deception attack against cyber-physical systems. IEEE Transactions on Cybernetics, 50(9), 3963–3972. https://doi.org/10.1109/TCYB.2019.2912622

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.