Cargando…
Multiplicative Attacks with Essential Stealthiness in Sensor and Actuator Loops against Cyber-Physical Systems
Stealthy attacks in sensor and actuator loops are the research priorities in the security of cyber-physical systems. Existing attacks define the stealthiness conditions against the Chi-square or Kullback-Leibler divergence detectors and parameterize the attack model based on additive signals. Such c...
Autores principales: | , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2023
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9959309/ https://www.ncbi.nlm.nih.gov/pubmed/36850552 http://dx.doi.org/10.3390/s23041957 |
_version_ | 1784895243595808768 |
---|---|
author | Chen, Jingzhao Liu, Bin Li, Tengfei Hu, Yong |
author_facet | Chen, Jingzhao Liu, Bin Li, Tengfei Hu, Yong |
author_sort | Chen, Jingzhao |
collection | PubMed |
description | Stealthy attacks in sensor and actuator loops are the research priorities in the security of cyber-physical systems. Existing attacks define the stealthiness conditions against the Chi-square or Kullback-Leibler divergence detectors and parameterize the attack model based on additive signals. Such conditions ignore the potential anomalies of the vulnerable outputs in the control layer, and the attack sequences need to be generated online, increasing the hardware and software costs. This paper investigates a type of multiplicative attack with essential stealthiness where the employed model is a novel form. The advantage is that the parameters can be designed in a constant form without having to be generated online. An essential stealthiness condition is proposed for the first time and complements the existing ones. Two sufficient conditions for the existence of constant attack matrices are given in the form of theorems, where two methods for decoupling the unknown variables are particularly considered. A quadruple-tank process, an experimental platform for attack and defense, is developed to verify the theoretical results. The experiments indicate that the proposed attack strategy can fulfill both the attack performance and stealthiness conditions. |
format | Online Article Text |
id | pubmed-9959309 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2023 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-99593092023-02-26 Multiplicative Attacks with Essential Stealthiness in Sensor and Actuator Loops against Cyber-Physical Systems Chen, Jingzhao Liu, Bin Li, Tengfei Hu, Yong Sensors (Basel) Article Stealthy attacks in sensor and actuator loops are the research priorities in the security of cyber-physical systems. Existing attacks define the stealthiness conditions against the Chi-square or Kullback-Leibler divergence detectors and parameterize the attack model based on additive signals. Such conditions ignore the potential anomalies of the vulnerable outputs in the control layer, and the attack sequences need to be generated online, increasing the hardware and software costs. This paper investigates a type of multiplicative attack with essential stealthiness where the employed model is a novel form. The advantage is that the parameters can be designed in a constant form without having to be generated online. An essential stealthiness condition is proposed for the first time and complements the existing ones. Two sufficient conditions for the existence of constant attack matrices are given in the form of theorems, where two methods for decoupling the unknown variables are particularly considered. A quadruple-tank process, an experimental platform for attack and defense, is developed to verify the theoretical results. The experiments indicate that the proposed attack strategy can fulfill both the attack performance and stealthiness conditions. MDPI 2023-02-09 /pmc/articles/PMC9959309/ /pubmed/36850552 http://dx.doi.org/10.3390/s23041957 Text en © 2023 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Chen, Jingzhao Liu, Bin Li, Tengfei Hu, Yong Multiplicative Attacks with Essential Stealthiness in Sensor and Actuator Loops against Cyber-Physical Systems |
title | Multiplicative Attacks with Essential Stealthiness in Sensor and Actuator Loops against Cyber-Physical Systems |
title_full | Multiplicative Attacks with Essential Stealthiness in Sensor and Actuator Loops against Cyber-Physical Systems |
title_fullStr | Multiplicative Attacks with Essential Stealthiness in Sensor and Actuator Loops against Cyber-Physical Systems |
title_full_unstemmed | Multiplicative Attacks with Essential Stealthiness in Sensor and Actuator Loops against Cyber-Physical Systems |
title_short | Multiplicative Attacks with Essential Stealthiness in Sensor and Actuator Loops against Cyber-Physical Systems |
title_sort | multiplicative attacks with essential stealthiness in sensor and actuator loops against cyber-physical systems |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9959309/ https://www.ncbi.nlm.nih.gov/pubmed/36850552 http://dx.doi.org/10.3390/s23041957 |
work_keys_str_mv | AT chenjingzhao multiplicativeattackswithessentialstealthinessinsensorandactuatorloopsagainstcyberphysicalsystems AT liubin multiplicativeattackswithessentialstealthinessinsensorandactuatorloopsagainstcyberphysicalsystems AT litengfei multiplicativeattackswithessentialstealthinessinsensorandactuatorloopsagainstcyberphysicalsystems AT huyong multiplicativeattackswithessentialstealthinessinsensorandactuatorloopsagainstcyberphysicalsystems |