Abstract
This paper mainly investigates the security problem of a networked control system based on a Kalman filter. A false data injection attack scheme is proposed to only tamper the measurement output, and its stealthiness and effects on system performance are analyzed under three cases of system knowledge held by an attacker and a defender. Firstly, it is derived that the proposed attack scheme is stealthy for a residual-based detector when the attacker and the defender hold the same accurate system knowledge. Secondly, it is proven that the proposed attack scheme is still stealthy even if the defender actively modifies the Kalman filter gain so as to make it different from that of the attacker. Thirdly, the stealthiness condition of the proposed attack scheme based on an inaccurate model is given. Furthermore, for each case, the instability conditions of the closed-loop system under attack are derived. Finally, simulation results are provided to test the proposed attack scheme.
Similar content being viewed by others
References
Pang Z, Bai C, Liu G, et al., A novel networked predictive control method for systems with random communication constraints, Journal of Systems Science and Complexity, 2021, 34(4): 1364–1378.
Mohammadali A, Haghighi M S, Tadayon M H, et al., A novel identity-based key establishment method for advanced metering infrastructure in smart grid, IEEE Trans. Smart Grid, 2018, 9(4): 2834–2842.
Zhang X M, Han Q L, Ge X, et al., Networked control systems: A survey of trends and techniques, IEEE/CAA J. Autom. Sin., 2020, 7(1): 1–17.
Farivar F, Haghighi M S, Jolfaei A, et al., On the security of networked control systems in smart vehicle and its adaptive cruise control, IEEE Trans. Intell. Transp. Syst., 2021, 22(6): 3824–3831.
Wang Z, Sun J, Chen J, et al., Finite-time stability of switched nonlinear time-delay systems, Int. J. Robust Nonlinear Control, 2020, 30(7): 2906–2919.
Pang Z H, Luo W C, Liu G P, et al., Observer-based incremental predictive control of networked multi-agent systems with random delays and packet dropouts, IEEE Trans. Circuits Syst. II, Exp. Briefs, 2021, 68(1): 426–430.
Zheng C B, Pang Z H, Wang J X, et al., Null-space-based time-varying formation control of uncertain nonlinear second-order multi-agent systems with collision avoidance, IEEE Trans. Ind. Electron., 2022, DOI: https://doi.org/10.1109/TIE.2022.3217585.
Farwell J P and Rohozinski R, Stuxnet and the future of cyber war, Survival, 2011, 53(1): 23–40.
Lee C, Chen B, Chen N, et al., Lessons learned from the blackout accident at a nuclear power plant in taiwan, IEEE Trans. Power Del., 2010, 25(4): 2726–2733.
Conti J P, The day the samba stopped [power blackouts], Eng. Technol., 2010, 5(4): 46–47.
Mo Y, Chabukswar R, and Sinopoli B, Detecting integrity attacks on SCADA systems, IEEE Trans. Control Syst. Technol., 2014, 22(4): 1396–1407.
Zhang H, Cheng P, Shi L, et al., Optimal DoS attack scheduling in wireless networked control system, IEEE Trans. Control Syst. Technol., 2016, 24(3): 843–852.
Chen X and Wang Y, Event-triggered attack-tolerant tracking control design for networked non-linear control systems under DoS jamming attacks, Sci. China Inf. Sci., 2020, 63(5): 150207.
Pang Z H, Fan L Z, Guo H, et al., Security of networked control systems subject to deception attacks: A survey, Int. J. Syst. Sci., 2022, 53(16): 3577–3598.
Hou F, Sun J, Yang Q, et al., Deep reinforcement learning for optimal denial-of-service attack scheduling, Sci. China Inf. Sci., 2022, 65: 162201.
Guo H, Sun J, Pang Z H, et al., Event-based optimal stealthy false data injection attacks against remote state estimation systems, IEEE Trans. Cybern., 2023, DOI: https://doi.org/10.1109/TCYB.2023.3255583.
Deng R, Xiao G, Lu R, et al., False data injection on state estimation in power systems-attacks, impacts, and defense: A survey, IEEE Trans. Ind. Informat., 2017, 13(2): 411–423.
Wu G Y, Wang G, Sun J, et al, Optimal partial feedback attacks in cyber-physical power systems, IEEE Trans. Autom. Control, 2020, 65(9): 3919–3926.
Li F and Tang Y, False data injection attack for cyber-physical systems with resource constraint, IEEE Trans. Cybern., 2020, 50(2): 729–738.
Jorjani M, Seifi H, and Varjani A Y, A graph theory-based approach to detect false data injection attacks in power system AC state estimation, IEEE Trans. Ind. Informat., 2021, 17(4): 2465–2475.
Pang Z H, Fan L Z, Sun J, et al., Detection of stealthy false data injection attacks against networked control systems via active data modification, Inf. Sci., 2021, 546: 192–205.
Guo Z, Shi D, Johansson K H, et al., Optimal linear cyber-attack on remote state estimation, IEEE Trans. Control Network Syst., 2017, 4(1): 4–13.
Guo Z, Shi D, Johansson K H, et al., Worst-case stealthy innovation-based linear attack on remote state estimation, Automatica, 2018, 89: 117–124.
Li Y G and Yang G H, Optimal stealthy false data injection attacks in cyber-physical systems, Inf. Sci., 2019, 481: 474–490.
Guo Z, Shi D, Johansson K H, et al., Worst-case innovation-based integrity attacks with side information on remote state estimation, IEEE Trans. Control Netw. Syst., 2019, 6(1): 48–59.
Shang J and Chen T, Optimal stealthy integrity attacks on remote state estimation: The maximum utilization of hHistorical data, Automatica, 2021, 128: 109555.
Pang Z H, Liu G P, Zhou D, et al., Two-channel false data injection attacks against output tracking control of networked systems, IEEE Trans. Ind. Electron., 2016, 63(5): 3242–3251.
Chen Y, Kar S, and Moura J M, Cyber-physical attacks with control objectives, IEEE Trans. Autom. Control, 2018, 63(5): 1418–1425.
Chen Y, Kar S, and Moura J M, Optimal attack strategies subject to detection constraints against cyber-physical systems, IEEE Trans. Control Netw. Syst., 2018, 5(3): 1157–1168.
Zhang Q, Liu K, Xia Y, et al., Optimal stealthy deception attack against cyber-physical systems, IEEE Trans. Cybern., 2020, 50(9): 3963–3972.
Zhang T Y and Ye D, False data injection attacks with complete stealthiness in cyber-physical systems: A self-generated approach, Automatica, 2020, 120: 109–117.
Ren X X and Yang G H, Kullback-Leibler divergence-based optimal stealthy sensor attack against networked linear quadratic Gaussian systems, IEEE Trans. Cybern., 2022, 52(11): 11539–11548.
Lu A Y and Yang G H, False data injection attacks against state estimation in the presence of sensor failures, Inf. Sci., 2020, 508: 92–104.
Hao J, Piechocki R J, Kaleshi D, et al., Sparse malicious false data injection attacks and defense mechanisms in smart grids, IEEE Trans. Ind. Informat., 2015, 11(5): 1–12.
Yan J, Guo F, and Wen C, False data injection against state estimation in power systems with multiple cooperative attackers, ISA Trans., 2020, 101: 225–233.
Pang Z H, Fan L Z, Dong Z, et al., False data injection attacks against partial sensor measurements of networked control systems, IEEE Trans. Circuits Syst. II, Exp. Briefs, 2022, 69(1): 149–153.
Liu X and Li Z, Local topology attacks in smart grids, IEEE Trans. Smart Grid, 2017, 8(6): 2617–2626.
Pang Z H, Ma B, Liu G P, et al., Data-driven adaptive control: An incremental triangular dynamic linearization approach, IEEE Trans. Circuits Syst. II, Exp. Briefs, 2022, 69(12): 4949–4953.
Wang Z, Sun J, and Chen J, Stability analysis of switched nonlinear systems with multiple time-varying delays, IEEE Trans. Syst. Man Cybern. -Syst., 2022, 52(6): 3947–3956.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
SUN Jian is an editorial board member for Journal of Systems Science and Complexity and was not involved in the editorial review or the decision to publish this article. All authors declare that there are no competing interests.
Additional information
This work was supported in part by the National Natural Science Foundation of China under Grant Nos. 62173002, 61925303, 62088101, U20B2073, and 61720106011, and the Beijing Natural Science Foundation under Grant No. 4222045.
Rights and permissions
About this article
Cite this article
Pang, Z., Fu, Y., Guo, H. et al. Analysis of Stealthy False Data Injection Attacks Against Networked Control Systems: Three Case Studies. J Syst Sci Complex 36, 1407–1422 (2023). https://doi.org/10.1007/s11424-022-2120-6
Received:
Revised:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11424-022-2120-6