Structural analyses of a parsimonious watermarking policy for data deception attack detection in networked control systems

被引:0
|
作者
Naha, Arunava [1 ]
Teixeira, Andre [2 ]
Ahlen, Anders [1 ]
Dey, Subhrakanti [1 ]
机构
[1] Uppsala Univ, Dept Elect Engn, S-75103 Uppsala, Sweden
[2] Uppsala Univ, Dept Informat Technol, POB 337, SE-75105 Uppsala, Sweden
基金
瑞典研究理事会;
关键词
CYBER-PHYSICAL SYSTEMS;
D O I
10.1109/CDC51059.2022.9993201
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we perform structural analyses of a parsimonious watermarking policy, which minimizes the average detection delay (ADD) to detect data deception attacks on networked control systems (NCS) for a fixed upper bound on the false alarm rate (FAR). The addition of physical watermarking to the control input of a NCS increases the probability of attack detections with an increase in the control cost. Therefore, we formulate the problem of data deception attack detection for NCS with the facility to add physical watermarking as a stochastic optimal control problem. Then we solve the problem by applying dynamic programming value iterations and find a parsimonious watermarking policy that decides to add watermarking and detects attacks based on the estimated posterior probability of attack. We analyze the optimal policy structure and find that it can be a one, two or three threshold policy depending on a few parameter values. Simulation studies show that the optimal policy for a practical range of parameter values is a two-threshold policy on the posterior probability of attack. Derivation of a threshold-based policy from the structural analysis of the value iteration method reduces the computational complexity during the runtime implementation and offers better structural insights. Furthermore, such an analysis provides a guideline for selecting the parameter values to meet the design requirements.
引用
收藏
页码:7648 / 7655
页数:8
相关论文
共 50 条
  • [1] Sequential Detection of Deception Attacks in Networked Control Systems with Watermarking
    Salimi, Somayeh
    Dey, Subhrakanti
    Ahlen, Anders
    2019 18TH EUROPEAN CONTROL CONFERENCE (ECC), 2019, : 883 - 890
  • [2] Quickest detection of deception attacks on cyber-physical systems with a parsimonious watermarking policy
    Naha, Arunava
    Teixeira, Andre M. H.
    Ahlen, Anders
    Dey, Subhrakanti
    AUTOMATICA, 2023, 155
  • [3] Data Security Transmission Mechanism in Industrial Networked Control Systems against Deception Attack
    Deng, Zulan
    Xie, Lun
    Rong, Yu
    Li, Weize
    Jin, Liangchen
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (04): : 391 - 403
  • [4] H∞ Control for Networked Control Systems with Packet Loss and Deception attack
    Shi, Huiru
    Zhang, Yijun
    39TH YOUTH ACADEMIC ANNUAL CONFERENCE OF CHINESE ASSOCIATION OF AUTOMATION, YAC 2024, 2024, : 555 - 560
  • [5] Attack Detection for Networked Control Systems Using Event-Triggered Dynamic Watermarking
    Du, Dajun
    Zhang, Changda
    Li, Xue
    Fei, Minrui
    Zhou, Huiyu
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2023, 19 (01) : 351 - 361
  • [6] Resilient control of networked switched systems subject to deception attack and DoS attack
    Zhao, Rui
    Zuo, Zhiqiang
    Tan, Ying
    Wang, Yijing
    Zhang, Wentao
    AUTOMATICA, 2024, 169
  • [7] Sampled-data stabilization for networked control systems under deception attack and the transmission delay
    Lee, Seok Young
    Park, Junmin
    COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION, 2024, 131
  • [8] Deception Attack Detection using Reduced Watermarking
    Naha, Arunava
    Teixeira, Andre
    Ahlen, Anders
    Dey, Subhrakanti
    2021 EUROPEAN CONTROL CONFERENCE (ECC), 2021, : 74 - 80
  • [9] A Novel Dynamic Watermarking-Based Attack Detection Method for Uncertain Networked Control Systems
    Zhang, Changda
    Du, Dajun
    Zhang, Jingfan
    Fei, Minrui
    Rakic, Aleksandar
    IEEE INTERNATIONAL CONFERENCE ON RECENT ADVANCES IN SYSTEMS SCIENCE AND ENGINEERING (IEEE RASSE 2021), 2021,
  • [10] Detection of Deception Attacks on the Backward Channel of Networked Control Systems
    Pang Zhonghua
    Liu Guoping
    Zhou Donghua
    PROCEEDINGS OF THE 31ST CHINESE CONTROL CONFERENCE, 2012, : 5972 - 5977