Skip to main content

Coding Schemes for Securing Cyber-Physical Systems Against Stealthy Data Injection Attacks

Publication ,  Journal Article
Miao, F; Zhu, Q; Pajic, M; Pappas, GJ
Published in: IEEE Transactions on Control of Network Systems
March 1, 2017

This paper considers a method of coding the sensor outputs in order to detect stealthy false data injection attacks. An intelligent attacker can design a sequence of data injection to sensors and actuators that pass the state estimator and statistical fault detector, based on knowledge of the system parameters. To stay undetected, the injected data should increase the state estimation errors while keep the estimation residues small. We employ a coding matrix to change the original sensor outputs to increase the estimation residues under intelligent data injection attacks. This is a low-cost method compared with encryption schemes over all sensor measurements in communication networks. We show the conditions of a feasible coding matrix under the assumption that the attacker does not have knowledge of the exact coding matrix. An algorithm is developed to compute a feasible coding matrix, and, we show that in general, multiple feasible coding matrices exist. To defend against attackers who estimates the coding matrix via sensor and actuator measurements, time-varying coding matrices are designed according to the detection requirements. A heuristic algorithm to decide the time length of updating a coding matrix is then proposed.

Duke Scholars

Altmetric Attention Stats
Dimensions Citation Stats

Published In

IEEE Transactions on Control of Network Systems

DOI

ISSN

2325-5870

Publication Date

March 1, 2017

Volume

4

Issue

1

Start / End Page

106 / 117

Related Subject Headings

  • 4901 Applied mathematics
  • 4606 Distributed computing and systems software
  • 4006 Communications engineering
  • 0906 Electrical and Electronic Engineering
  • 0805 Distributed Computing
  • 0102 Applied Mathematics
 

Citation

APA
Chicago
ICMJE
MLA
NLM
Miao, F., Zhu, Q., Pajic, M., & Pappas, G. J. (2017). Coding Schemes for Securing Cyber-Physical Systems Against Stealthy Data Injection Attacks. IEEE Transactions on Control of Network Systems, 4(1), 106–117. https://doi.org/10.1109/TCNS.2016.2573039
Miao, F., Q. Zhu, M. Pajic, and G. J. Pappas. “Coding Schemes for Securing Cyber-Physical Systems Against Stealthy Data Injection Attacks.” IEEE Transactions on Control of Network Systems 4, no. 1 (March 1, 2017): 106–17. https://doi.org/10.1109/TCNS.2016.2573039.
Miao F, Zhu Q, Pajic M, Pappas GJ. Coding Schemes for Securing Cyber-Physical Systems Against Stealthy Data Injection Attacks. IEEE Transactions on Control of Network Systems. 2017 Mar 1;4(1):106–17.
Miao, F., et al. “Coding Schemes for Securing Cyber-Physical Systems Against Stealthy Data Injection Attacks.” IEEE Transactions on Control of Network Systems, vol. 4, no. 1, Mar. 2017, pp. 106–17. Scopus, doi:10.1109/TCNS.2016.2573039.
Miao F, Zhu Q, Pajic M, Pappas GJ. Coding Schemes for Securing Cyber-Physical Systems Against Stealthy Data Injection Attacks. IEEE Transactions on Control of Network Systems. 2017 Mar 1;4(1):106–117.

Published In

IEEE Transactions on Control of Network Systems

DOI

ISSN

2325-5870

Publication Date

March 1, 2017

Volume

4

Issue

1

Start / End Page

106 / 117

Related Subject Headings

  • 4901 Applied mathematics
  • 4606 Distributed computing and systems software
  • 4006 Communications engineering
  • 0906 Electrical and Electronic Engineering
  • 0805 Distributed Computing
  • 0102 Applied Mathematics