Cargando…

Multiplicative Attacks with Essential Stealthiness in Sensor and Actuator Loops against Cyber-Physical Systems

Stealthy attacks in sensor and actuator loops are the research priorities in the security of cyber-physical systems. Existing attacks define the stealthiness conditions against the Chi-square or Kullback-Leibler divergence detectors and parameterize the attack model based on additive signals. Such c...

Descripción completa

Detalles Bibliográficos
Autores principales: Chen, Jingzhao, Liu, Bin, Li, Tengfei, Hu, Yong
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2023
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9959309/
https://www.ncbi.nlm.nih.gov/pubmed/36850552
http://dx.doi.org/10.3390/s23041957
_version_ 1784895243595808768
author Chen, Jingzhao
Liu, Bin
Li, Tengfei
Hu, Yong
author_facet Chen, Jingzhao
Liu, Bin
Li, Tengfei
Hu, Yong
author_sort Chen, Jingzhao
collection PubMed
description Stealthy attacks in sensor and actuator loops are the research priorities in the security of cyber-physical systems. Existing attacks define the stealthiness conditions against the Chi-square or Kullback-Leibler divergence detectors and parameterize the attack model based on additive signals. Such conditions ignore the potential anomalies of the vulnerable outputs in the control layer, and the attack sequences need to be generated online, increasing the hardware and software costs. This paper investigates a type of multiplicative attack with essential stealthiness where the employed model is a novel form. The advantage is that the parameters can be designed in a constant form without having to be generated online. An essential stealthiness condition is proposed for the first time and complements the existing ones. Two sufficient conditions for the existence of constant attack matrices are given in the form of theorems, where two methods for decoupling the unknown variables are particularly considered. A quadruple-tank process, an experimental platform for attack and defense, is developed to verify the theoretical results. The experiments indicate that the proposed attack strategy can fulfill both the attack performance and stealthiness conditions.
format Online
Article
Text
id pubmed-9959309
institution National Center for Biotechnology Information
language English
publishDate 2023
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-99593092023-02-26 Multiplicative Attacks with Essential Stealthiness in Sensor and Actuator Loops against Cyber-Physical Systems Chen, Jingzhao Liu, Bin Li, Tengfei Hu, Yong Sensors (Basel) Article Stealthy attacks in sensor and actuator loops are the research priorities in the security of cyber-physical systems. Existing attacks define the stealthiness conditions against the Chi-square or Kullback-Leibler divergence detectors and parameterize the attack model based on additive signals. Such conditions ignore the potential anomalies of the vulnerable outputs in the control layer, and the attack sequences need to be generated online, increasing the hardware and software costs. This paper investigates a type of multiplicative attack with essential stealthiness where the employed model is a novel form. The advantage is that the parameters can be designed in a constant form without having to be generated online. An essential stealthiness condition is proposed for the first time and complements the existing ones. Two sufficient conditions for the existence of constant attack matrices are given in the form of theorems, where two methods for decoupling the unknown variables are particularly considered. A quadruple-tank process, an experimental platform for attack and defense, is developed to verify the theoretical results. The experiments indicate that the proposed attack strategy can fulfill both the attack performance and stealthiness conditions. MDPI 2023-02-09 /pmc/articles/PMC9959309/ /pubmed/36850552 http://dx.doi.org/10.3390/s23041957 Text en © 2023 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Chen, Jingzhao
Liu, Bin
Li, Tengfei
Hu, Yong
Multiplicative Attacks with Essential Stealthiness in Sensor and Actuator Loops against Cyber-Physical Systems
title Multiplicative Attacks with Essential Stealthiness in Sensor and Actuator Loops against Cyber-Physical Systems
title_full Multiplicative Attacks with Essential Stealthiness in Sensor and Actuator Loops against Cyber-Physical Systems
title_fullStr Multiplicative Attacks with Essential Stealthiness in Sensor and Actuator Loops against Cyber-Physical Systems
title_full_unstemmed Multiplicative Attacks with Essential Stealthiness in Sensor and Actuator Loops against Cyber-Physical Systems
title_short Multiplicative Attacks with Essential Stealthiness in Sensor and Actuator Loops against Cyber-Physical Systems
title_sort multiplicative attacks with essential stealthiness in sensor and actuator loops against cyber-physical systems
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9959309/
https://www.ncbi.nlm.nih.gov/pubmed/36850552
http://dx.doi.org/10.3390/s23041957
work_keys_str_mv AT chenjingzhao multiplicativeattackswithessentialstealthinessinsensorandactuatorloopsagainstcyberphysicalsystems
AT liubin multiplicativeattackswithessentialstealthinessinsensorandactuatorloopsagainstcyberphysicalsystems
AT litengfei multiplicativeattackswithessentialstealthinessinsensorandactuatorloopsagainstcyberphysicalsystems
AT huyong multiplicativeattackswithessentialstealthinessinsensorandactuatorloopsagainstcyberphysicalsystems