Stochastic Event-Based Physical Watermarks Against Replay Attacks in Cyber-Physical Systems

被引:3
|
作者
Zhao, Xudong [1 ]
Liu, Le [1 ]
Xing, Wei [1 ]
Xu, Ning [2 ]
机构
[1] Dalian Univ Technol, Minist Educ, Key Lab Intelligent Control & Optimizat Ind Equipm, Dalian 116024, Peoples R China
[2] Bohai Univ, Coll Informat Sci & Technol, Jinzhou 121013, Peoples R China
来源
基金
中国国家自然科学基金;
关键词
Watermarking; Detectors; Kalman filters; Costs; Control systems; Real-time systems; Network systems; Cyber-physical system (CPS); detection; event-based control; physical watermark; replay attack; STATE ESTIMATION;
D O I
10.1109/TCNS.2023.3331161
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this article, an event-based physical watermark is proposed and analyzed. It is well known that adding physical watermarks into cyber-physical systems (CPSs) is an effective way to combat malicious attacks. However, the classical ways to adding physical watermarks are based on time, which leads to great decreases in linear-quadratic Gaussian (LQG) performances while increasing detection rates. To deal with the performance loss after adding physical watermarks, an event-based physical watermark is designed to detect replay attacks. A stochastic event scheduler based on the innovation sequence is constructed to indicate adding physical watermarks or not. It is shown that the probability of adding physical watermarks will rise if the system is under attacks. Based on the frequency of adding watermarks, a count detector is proposed, which provides lower memory and computational cost. LQG performance and detection rates of a chi(2) detector are further characterized. Herein, it is formally proved that the event-based independent identically distributed (i.i.d.) watermark is more efficient than the time-based i.i.d. watermark. Furthermore, we investigate the optimal parameters to enlarge detection performance in certain conditions. Finally, some simulations are given to show the superiority of our proposed event-based physical watermark.
引用
收藏
页码:1035 / 1045
页数:11
相关论文
共 50 条
  • [41] Event-Triggered H∞ Filtering for Cyber-Physical Systems Against DoS Attacks
    Sun, Xiang
    Gu, Zhou
    Yue, Dong
    Xie, Xiangpeng
    IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2023, 53 (05): : 2705 - 2715
  • [42] Vulnerability Assessment of Electrical Cyber-Physical Systems against Cyber Attacks
    Wang, Yinan
    Yan, Gangfeng
    Zheng, Ronghao
    APPLIED SCIENCES-BASEL, 2018, 8 (05):
  • [43] Secure framework against cyber attacks on cyber-physical robotic systems
    Bhardwaj, Akashdeep
    Alshehri, Mohammad Dahman
    Kaushik, Keshav
    Alyamani, Hasan J.
    Kumar, Manoj
    JOURNAL OF ELECTRONIC IMAGING, 2022, 31 (06)
  • [44] A Stochastic Game Model for Evaluating the Impacts of Security Attacks Against Cyber-Physical Systems
    Orojloo, Named
    Azgomi, Mohammad Abdollahi
    JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT, 2018, 26 (04) : 929 - 965
  • [45] Observer-based security control for distributed cyber-physical systems under replay attacks
    Li, Xiao-Meng
    Xiao, Wenbin
    Lin, Guohuai
    Li, Hongyi
    Lu, Renquan
    INTERNATIONAL JOURNAL OF ROBUST AND NONLINEAR CONTROL, 2023, 33 (13) : 8015 - 8035
  • [46] Distributed Secure State Estimation for Cyber-Physical Systems Against Replay Attacks via Multisensor Method
    Su, Lei
    Ye, Dan
    Zhao, Xin-Gang
    IEEE SYSTEMS JOURNAL, 2022, 16 (04): : 5720 - 5728
  • [47] A Stochastic Game Model for Evaluating the Impacts of Security Attacks Against Cyber-Physical Systems
    Hamed Orojloo
    Mohammad Abdollahi Azgomi
    Journal of Network and Systems Management, 2018, 26 : 929 - 965
  • [48] Discrimination between replay attacks and sensor faults for cyber-physical systems via event-triggered communication
    Zhang, Kangkang
    Keliris, Christodoulos
    Polycarpou, Marios M.
    Parisini, Thomas
    EUROPEAN JOURNAL OF CONTROL, 2021, 62 : 47 - 56
  • [49] Integrity Attacks on Cyber-Physical Systems
    Mo, Yilin
    Sinopoli, Bruno
    HICONS 12: PROCEEDINGS OF THE 1ST ACM INTERNATIONAL CONFERENCE ON HIGH CONFIDENCE NETWORKED SYSTEMS, 2012, : 47 - 54
  • [50] Cryptanalytical Attacks on Cyber-physical Systems
    Novotny, Martin
    2016 5TH MEDITERRANEAN CONFERENCE ON EMBEDDED COMPUTING (MECO), 2016, : 10 - 10