265
Views
4
CrossRef citations to date
0
Altmetric
Research Articles

Window-type detector for stealthy false data injection attack in cyber-physical systems

&
Pages 1602-1615 | Received 26 Sep 2022, Accepted 26 Feb 2023, Published online: 10 Mar 2023

References

  • Anderson, B. D. O., & Moore, J. (1979). Optimal filtering. Prentice-Hall.
  • Chen, W., Hu, J., Wu, Z., Yu, X., & Chen, D. (2020). Finite-time memory fault detection filter design for nonlinear discrete systems with deception attacks. International Journal of Systems Science, 51(8), 1464–1481. https://doi.org/10.1080/00207721.2020.1765219
  • Chowdhury, N. R., Belikov, J., Baimel, D., & Levron, Y. (2020). Observer-based detection and identification of sensor attacks in networked CPSs. Automatica, 121, 109166. https://doi.org/10.1016/j.automatica.2020.109166
  • Dagle, J. E. (2012). Cyber-physical system security of smart grids. In IEEE PES innovative smart grid technologies (ISGT) (pp. 1-2).
  • Farwell, J. P., & Rohozinski, R. (2011). Stuxnet and the future of cyber war. Survival, 53(1), 23–40. https://doi.org/10.1080/00396338.2011.555586
  • Ghaderi, M., Gheitasi, K., & Lucia, W. (2021). A blended active detection strategy for false data injection attacks in cyber-physical systems. IEEE Transactions on Control of Network Systems, 8(1), 168–176. https://doi.org/10.1109/TCNS.6509490
  • Gheitasi, K., & Lucia, W. (2022). Undetectable finite-Time covert attack on constrained cyber-physical systems. IEEE Transactions on Control of Network Systems, 9(2), 1040–1048. https://doi.org/10.1109/TCNS.2022.3140692
  • Huang, X., & Dong, J. (2018). Reliable control policy of cyber-physical systems against a class of frequency-constrained sensor and actuator attacks. IEEE Transactions on Cybernetics, 48(12), 3432–3439. https://doi.org/10.1109/TCYB.2018.2815758
  • Kullback, S. (1997). Information theory and statistics. Courier Corporation.
  • Kuvshinkova, S. (2003). SQL slammer worm lessons learned for consideration by the electricity sector. North American Electric Reliability Council, 1(2), 5.
  • Kwon, C., Liu, W., & Hwang, I. (2014). Analysis and design of stealthy cyber attacks on unmanned aerial systems. Journal of Aerospace Information Systems, 11(8), 525–539. https://doi.org/10.2514/1.I010201
  • Lu, A. Y., & Yang, G. H. (2022). False data injection attacks against state estimation without knowledge of estimators. IEEE Transactions on Automatic Control, 67(9), 4529–4540. https://doi.org/10.1109/TAC.2022.3161259
  • Lucia, W., Gheitasi, K., & Ghaderi, M. (2021). Setpoint attack detection in cyber-physical systems. IEEE Transactions on Automatic Control, 66(5), 2332–2338. https://doi.org/10.1109/TAC.2020.3004326
  • Mo, Y., & Sinopoli, B. (2010). False data injection attacks in control systems. Preprints of the 1st Workshop on Secure Control Systems.
  • Ren, X. X., & Yang, G. H. (2022). Kullback–Leibler divergence-based optimal stealthy sensor attack against networked linear quadratic Gaussian systems. IEEE Transactions on Cybernetics, 52(11), 11539–11548. https://doi.org/10.1109/TCYB.2021.3068220
  • Schenato, L., Sinopoli, B., Franceschetti, M., Poolla, K., & Sastry, S. S. (2007). Foundations of control and estimation over lossy networks. Proceedings of the IEEE, 95(1), 163–187. https://doi.org/10.1109/JPROC.2006.887306
  • Song, H., Ding, D., Dong, H., & Han, Q. L. (2022). Distributed maximum correntropy filtering for stochastic nonlinear systems under deception attacks. IEEE Transactions on Cybernetics, 52(5), 3733–3744. https://doi.org/10.1109/TCYB.2020.3016093
  • Song, H., Ding, D., Dong, H., & Yi, X. (2022). Distributed filtering based on Cauchy-kernel-based maximum correntropy subject to randomly occurring cyber-attacks. Automatica, 135, 110004. https://doi.org/10.1016/j.automatica.2021.110004
  • Sui, T., Mo, Y., Marelli, D., Sun, X., & Fu, M. (2021). The vulnerability of cyber-physical system under stealthy attacks. IEEE Transactions on Automatic Control, 66(2), 637–650. https://doi.org/10.1109/TAC.9
  • Wang, D., Huang, J., Tang, Y., & Li, F. (2021). A watermarking strategy against linear deception attacks on remote state estimation under K–L divergence. IEEE Transactions on Industrial Informatics, 17(5), 3273–3281. https://doi.org/10.1109/TII.9424
  • Weerakkody, S., & Sinopoli, B. (2015). Detecting integrity attacks on control systems using a moving target approach. In 54th ieee conference on decision and control (cdc) (pp. 5820–5826).
  • Yang, C., Shi, Z., Zhang, H., Wu, J., & Shi, X. (2020). Multiple attacks detection in cyber-physical systems using random finite set theory. IEEE Transactions on Cybernetics, 50(9), 4066–4075. https://doi.org/10.1109/TCYB.6221036
  • Ye, D., & Zhang, T. Y. (2020). Summation detector for false data-Injection attack in cyber-physical systems. IEEE Transactions on Cybernetics, 50(6), 2338–2345. https://doi.org/10.1109/TCYB.6221036
  • Zhang, K., Keliris, C., Polycarpou, M. M., & Parisini, T. (2022). Detecting stealthy integrity attacks in a class of nonlinear cyber–physical systems: A backward-in-time approach. Automatica, 141, 110262. https://doi.org/10.1016/j.automatica.2022.110262
  • Zhang, Q., Liu, K., Xia, Y., & Ma, A. (2020). Optimal stealthy deception attack against Cyber-Physical systems. IEEE Transactions on Cybernetics, 50(9), 3963–3972. https://doi.org/10.1109/TCYB.6221036
  • Zhang, R., & Venkitasubramaniam, P. (2020). False data injection and detection in LQG systems: A game theoretic approach. IEEE Transactions on Control of Network Systems, 7(1), 338–348. https://doi.org/10.1109/TCNS.6509490
  • Zhang, X. G., Yang, G. H., & Wasly, S. (2021). Man-in-the-middle attack against cyber-physical systems under random access protocol. Information Sciences, 576, 708–724. https://doi.org/10.1016/j.ins.2021.07.083

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.