Abstract
The integration of cyber (network) with physical world is a big step in cyber-physical systems. This has revolutionised many industries. But this transformation has made cyber-physical systems vulnerable to attacks. One particular type of attack is the adversarial false data injection which injects false data in either the sensor measurements or the corresponding communication channel. A better understanding of how false data injection (FDI) attacks are constructed is crucial for developing strategies to protect against such attacks. In this paper, we consider two models for networked control systems and present an algorithm for constructing FDI attacks in each case and compare with an existing approach. The conditions for the attack to remain stealthy for systems equipped with a failure detector and the design of attack vectors that satisfy these conditions are discussed in detail. The algorithms are demonstrated by developing FDI attacks for two real-world examples.
Disclosure statement
No potential conflict of interest was reported by the author(s).
Additional information
Notes on contributors
Syed Ahmed Pasha
Syed Ahmed Pasha was born in Rawalpindi, Pakistan. He has a Bachelors degree in Electrical Engineering (2001). His Ph.D. (UNSW, 2009) is in Electrical Engineering. He has held two postdoc positions (UNSW, 2009–2011 & USyd, 2012–2013). He is currently Associate Professor at Air University, Pakistan and Visiting Fellow at UNSW since 2012. His research interests are in control and signal processing.
Rijha Safdar
Rijha Safdar did her B.E. from Air University, Pakistan in 2015. She received an MS in Electrical Engineering in 2019 from National University of Sciences and Technology, Pakistan, where she is pursuing a Ph.D. in Electrical Engineering. She is currently Assistant Manager at Centre of Excellence in Science & Applied Technologies, Pakistan. Her research interests include control and cyber security.
Syed Taha Ali
Syed Taha Ali did his BSc. from GIK Institute of Engineering Science and Technology in Pakistan in 2002, followed by an MS and PhD in Electrical Engineering from the University of New South Wales, Australia in 2006 and 2012. He did his postdoctoral research at the University of New South Wales, Australia, in 2013, and at Newcastle University, UK from 2014 to 2016. He is currently Associate Professor at National University of Sciences and Technology, Pakistan. His research interests include network security, cryptocurrencies, election protocols, and security applications of computer vision.