Fast Attack Detection for Cyber-Physical Systems Using Dynamic Data Encryption

被引:4
|
作者
Li, Tongxiang [1 ,2 ]
Chen, Bo [1 ,2 ]
Liu, Shichao [3 ]
Wang, Zheming [1 ,2 ]
Zhang, Wen-An [1 ,2 ]
Yu, Li [1 ,2 ]
机构
[1] Zhejiang Univ Technol, Coll Informat Engn, Hangzhou 310023, Peoples R China
[2] Zhejiang Univ Technol, Zhejiang Prov United Key Lab Embedded Syst, Hangzhou 310023, Peoples R China
[3] Carleton Univ, Dept Elect, Ottawa, ON K1S 5B6, Canada
基金
中国国家自然科学基金;
关键词
Cyber-physical systems (CPSs); dynamic data encryption; false data injection (FDI) attacks; fast attack detection; replay attacks; setpoint attacks; zero-dynamics attacks; INTEGRITY ATTACKS; DETECTION SCHEME; REPLAY ATTACKS;
D O I
10.1109/TCYB.2023.3332079
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
To defend the cyber-physical system (CPSs) from cyber-attacks, this work proposes an unified intrusion detection mechanism which is capable to fast hunt various types of attacks. Focusing on securing the data transmission, a novel dynamic data encryption scheme is developed and historical system data is used to dynamically update a secret key involved in the encryption. The core idea of the dynamic data encryption scheme is to establish a dynamic relationship between original data, secret key, ciphertext and its decrypted value, and in particular, this dynamic relationship will be destroyed once an attack occurs, which can be used to detect attacks. Then, based on dynamic data encryption, a unified fast attack detection method is proposed to detect different attacks, including replay, false data injection (FDI), zero-dynamics, and setpoint attacks. Extensive comparison studies are conducted by using the power system and flight control system. It is verified that the proposed method can immediately trigger the alarm as soon as attacks are launched while the conventional chi(2) detection could only capture the attacks after the estimation residual goes over the predetermined threshold. Furthermore, the proposed method does not degrade the system performance. Last but not the least, the proposed dynamic encryption scheme turns to normal operation mode as the attacks stop.
引用
收藏
页码:3251 / 3264
页数:14
相关论文
共 50 条
  • [21] Brief Survey on Attack Detection Methods for Cyber-Physical Systems
    Tan, Sen
    Guerrero, Josep M.
    Xie, Peilin
    Han, Renke
    Vasquez, Juan C.
    IEEE SYSTEMS JOURNAL, 2020, 14 (04): : 5329 - 5339
  • [22] Challenges in Cyber-Physical Attack Detection for Building Automation Systems
    Runge, Isabel Madeleine
    Akinci, Burcu
    Berges, Mario
    PROCEEDINGS OF THE 10TH ACM INTERNATIONAL CONFERENCE ON SYSTEMS FOR ENERGY-EFFICIENT BUILDINGS, CITIES, AND TRANSPORTATION, BUILDSYS 2023, 2023, : 236 - 239
  • [23] Distinguishable attack and fault detection in Interconnected cyber-physical systems
    Liu, Chun
    Shi, Yue
    Zhou, Shuo
    Xu, Liang
    Li, Yang
    CONTROL ENGINEERING PRACTICE, 2025, 156
  • [24] Recursive Filtering of Distributed Cyber-Physical Systems With Attack Detection
    Ding, Derui
    Han, Qing-Long
    Wang, Zidong
    Ge, Xiaohua
    IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2021, 51 (10): : 6466 - 6476
  • [25] Replay Attack Detection for Cyber-Physical Systems with Sensitive States
    Chen, Tao
    Wang, Lei
    Ren, Xiaoqiang
    Liu, Zhitao
    Su, Hongye
    2023 62ND IEEE CONFERENCE ON DECISION AND CONTROL, CDC, 2023, : 2821 - 2826
  • [26] Optimal Data Integrity Attack on Actuators in Cyber-Physical Systems
    Wu, Guangyu
    Sun, Jian
    2016 AMERICAN CONTROL CONFERENCE (ACC), 2016, : 1160 - 1164
  • [27] ROBUST FILTERING OF DISTRIBUTED CYBER-PHYSICAL SYSTEMS WITH CYBER-ATTACK DETECTION
    Wang, Hongwei
    Zheng, Xi
    2024 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING WORKSHOPS, ICASSPW 2024, 2024, : 294 - 298
  • [28] Optimal stealthy attack with historical data on cyber-physical systems
    Ren, Xiu-Xiu
    Yang, Guang-Hong
    Zhang, Xiao-Guang
    AUTOMATICA, 2023, 151
  • [29] Study on attack paths of cyber attack in cyber-physical power systems
    Chen, Lei
    Yue, Dong
    Dou, Chunxia
    Chen, Jianbo
    Cheng, Zihao
    IET GENERATION TRANSMISSION & DISTRIBUTION, 2020, 14 (12) : 2352 - 2360
  • [30] Dynamic Data Injection Attack Detection of Cyber Physical Power Systems With Uncertainties
    Wang, Huaizhi
    Ruan, Jiaqi
    Zhou, Bin
    Li, Canbing
    Wu, Qiuwei
    Raza, Muhammad Qamar
    Cao, Guang-Zhong
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2019, 15 (10) : 5505 - 5518