Multiplicative Attacks with Essential Stealthiness in Sensor and Actuator Loops against Cyber-Physical Systems
Stealthy attacks in sensor and actuator loops are the research priorities in the security of cyber-physical systems. Existing attacks define the stealthiness conditions against the Chi-square or Kullback-Leibler divergence detectors and parameterize the attack model based on additive signals. Such c...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2023-02-01
|
Series: | Sensors |
Subjects: | |
Online Access: | https://www.mdpi.com/1424-8220/23/4/1957 |
_version_ | 1797618294293790720 |
---|---|
author | Jingzhao Chen Bin Liu Tengfei Li Yong Hu |
author_facet | Jingzhao Chen Bin Liu Tengfei Li Yong Hu |
author_sort | Jingzhao Chen |
collection | DOAJ |
description | Stealthy attacks in sensor and actuator loops are the research priorities in the security of cyber-physical systems. Existing attacks define the stealthiness conditions against the Chi-square or Kullback-Leibler divergence detectors and parameterize the attack model based on additive signals. Such conditions ignore the potential anomalies of the vulnerable outputs in the control layer, and the attack sequences need to be generated online, increasing the hardware and software costs. This paper investigates a type of multiplicative attack with essential stealthiness where the employed model is a novel form. The advantage is that the parameters can be designed in a constant form without having to be generated online. An essential stealthiness condition is proposed for the first time and complements the existing ones. Two sufficient conditions for the existence of constant attack matrices are given in the form of theorems, where two methods for decoupling the unknown variables are particularly considered. A quadruple-tank process, an experimental platform for attack and defense, is developed to verify the theoretical results. The experiments indicate that the proposed attack strategy can fulfill both the attack performance and stealthiness conditions. |
first_indexed | 2024-03-11T08:11:04Z |
format | Article |
id | doaj.art-a42eed3884ff4033891fcbe4f811fcc1 |
institution | Directory Open Access Journal |
issn | 1424-8220 |
language | English |
last_indexed | 2024-03-11T08:11:04Z |
publishDate | 2023-02-01 |
publisher | MDPI AG |
record_format | Article |
series | Sensors |
spelling | doaj.art-a42eed3884ff4033891fcbe4f811fcc12023-11-16T23:08:22ZengMDPI AGSensors1424-82202023-02-01234195710.3390/s23041957Multiplicative Attacks with Essential Stealthiness in Sensor and Actuator Loops against Cyber-Physical SystemsJingzhao Chen0Bin Liu1Tengfei Li2Yong Hu3Engineering Research Center of Metallurgical Automation and Measurement Technology, Ministry of Education, Wuhan University of Science and Technology, Wuhan 430081, ChinaEngineering Research Center of Metallurgical Automation and Measurement Technology, Ministry of Education, Wuhan University of Science and Technology, Wuhan 430081, ChinaEngineering Research Center of Metallurgical Automation and Measurement Technology, Ministry of Education, Wuhan University of Science and Technology, Wuhan 430081, ChinaScience and Technology on Space Intelligent Control Laboratory, Beijing Institute of Control Engineering, Beijing 100190, ChinaStealthy attacks in sensor and actuator loops are the research priorities in the security of cyber-physical systems. Existing attacks define the stealthiness conditions against the Chi-square or Kullback-Leibler divergence detectors and parameterize the attack model based on additive signals. Such conditions ignore the potential anomalies of the vulnerable outputs in the control layer, and the attack sequences need to be generated online, increasing the hardware and software costs. This paper investigates a type of multiplicative attack with essential stealthiness where the employed model is a novel form. The advantage is that the parameters can be designed in a constant form without having to be generated online. An essential stealthiness condition is proposed for the first time and complements the existing ones. Two sufficient conditions for the existence of constant attack matrices are given in the form of theorems, where two methods for decoupling the unknown variables are particularly considered. A quadruple-tank process, an experimental platform for attack and defense, is developed to verify the theoretical results. The experiments indicate that the proposed attack strategy can fulfill both the attack performance and stealthiness conditions.https://www.mdpi.com/1424-8220/23/4/1957cyber-physical systemscyber-attacksfalse data injectionKullback-Leibler divergence detectorChi-square detector |
spellingShingle | Jingzhao Chen Bin Liu Tengfei Li Yong Hu Multiplicative Attacks with Essential Stealthiness in Sensor and Actuator Loops against Cyber-Physical Systems Sensors cyber-physical systems cyber-attacks false data injection Kullback-Leibler divergence detector Chi-square detector |
title | Multiplicative Attacks with Essential Stealthiness in Sensor and Actuator Loops against Cyber-Physical Systems |
title_full | Multiplicative Attacks with Essential Stealthiness in Sensor and Actuator Loops against Cyber-Physical Systems |
title_fullStr | Multiplicative Attacks with Essential Stealthiness in Sensor and Actuator Loops against Cyber-Physical Systems |
title_full_unstemmed | Multiplicative Attacks with Essential Stealthiness in Sensor and Actuator Loops against Cyber-Physical Systems |
title_short | Multiplicative Attacks with Essential Stealthiness in Sensor and Actuator Loops against Cyber-Physical Systems |
title_sort | multiplicative attacks with essential stealthiness in sensor and actuator loops against cyber physical systems |
topic | cyber-physical systems cyber-attacks false data injection Kullback-Leibler divergence detector Chi-square detector |
url | https://www.mdpi.com/1424-8220/23/4/1957 |
work_keys_str_mv | AT jingzhaochen multiplicativeattackswithessentialstealthinessinsensorandactuatorloopsagainstcyberphysicalsystems AT binliu multiplicativeattackswithessentialstealthinessinsensorandactuatorloopsagainstcyberphysicalsystems AT tengfeili multiplicativeattackswithessentialstealthinessinsensorandactuatorloopsagainstcyberphysicalsystems AT yonghu multiplicativeattackswithessentialstealthinessinsensorandactuatorloopsagainstcyberphysicalsystems |