Skip to main content
Log in

Analysis of Stealthy False Data Injection Attacks Against Networked Control Systems: Three Case Studies

  • Published:
Journal of Systems Science and Complexity Aims and scope Submit manuscript

Abstract

This paper mainly investigates the security problem of a networked control system based on a Kalman filter. A false data injection attack scheme is proposed to only tamper the measurement output, and its stealthiness and effects on system performance are analyzed under three cases of system knowledge held by an attacker and a defender. Firstly, it is derived that the proposed attack scheme is stealthy for a residual-based detector when the attacker and the defender hold the same accurate system knowledge. Secondly, it is proven that the proposed attack scheme is still stealthy even if the defender actively modifies the Kalman filter gain so as to make it different from that of the attacker. Thirdly, the stealthiness condition of the proposed attack scheme based on an inaccurate model is given. Furthermore, for each case, the instability conditions of the closed-loop system under attack are derived. Finally, simulation results are provided to test the proposed attack scheme.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Pang Z, Bai C, Liu G, et al., A novel networked predictive control method for systems with random communication constraints, Journal of Systems Science and Complexity, 2021, 34(4): 1364–1378.

    Article  MathSciNet  MATH  Google Scholar 

  2. Mohammadali A, Haghighi M S, Tadayon M H, et al., A novel identity-based key establishment method for advanced metering infrastructure in smart grid, IEEE Trans. Smart Grid, 2018, 9(4): 2834–2842.

    Article  Google Scholar 

  3. Zhang X M, Han Q L, Ge X, et al., Networked control systems: A survey of trends and techniques, IEEE/CAA J. Autom. Sin., 2020, 7(1): 1–17.

    MathSciNet  Google Scholar 

  4. Farivar F, Haghighi M S, Jolfaei A, et al., On the security of networked control systems in smart vehicle and its adaptive cruise control, IEEE Trans. Intell. Transp. Syst., 2021, 22(6): 3824–3831.

    Article  Google Scholar 

  5. Wang Z, Sun J, Chen J, et al., Finite-time stability of switched nonlinear time-delay systems, Int. J. Robust Nonlinear Control, 2020, 30(7): 2906–2919.

    Article  MathSciNet  MATH  Google Scholar 

  6. Pang Z H, Luo W C, Liu G P, et al., Observer-based incremental predictive control of networked multi-agent systems with random delays and packet dropouts, IEEE Trans. Circuits Syst. II, Exp. Briefs, 2021, 68(1): 426–430.

    Google Scholar 

  7. Zheng C B, Pang Z H, Wang J X, et al., Null-space-based time-varying formation control of uncertain nonlinear second-order multi-agent systems with collision avoidance, IEEE Trans. Ind. Electron., 2022, DOI: https://doi.org/10.1109/TIE.2022.3217585.

  8. Farwell J P and Rohozinski R, Stuxnet and the future of cyber war, Survival, 2011, 53(1): 23–40.

    Article  Google Scholar 

  9. Lee C, Chen B, Chen N, et al., Lessons learned from the blackout accident at a nuclear power plant in taiwan, IEEE Trans. Power Del., 2010, 25(4): 2726–2733.

    Article  Google Scholar 

  10. Conti J P, The day the samba stopped [power blackouts], Eng. Technol., 2010, 5(4): 46–47.

    Article  Google Scholar 

  11. Mo Y, Chabukswar R, and Sinopoli B, Detecting integrity attacks on SCADA systems, IEEE Trans. Control Syst. Technol., 2014, 22(4): 1396–1407.

    Article  Google Scholar 

  12. Zhang H, Cheng P, Shi L, et al., Optimal DoS attack scheduling in wireless networked control system, IEEE Trans. Control Syst. Technol., 2016, 24(3): 843–852.

    Article  Google Scholar 

  13. Chen X and Wang Y, Event-triggered attack-tolerant tracking control design for networked non-linear control systems under DoS jamming attacks, Sci. China Inf. Sci., 2020, 63(5): 150207.

    Article  Google Scholar 

  14. Pang Z H, Fan L Z, Guo H, et al., Security of networked control systems subject to deception attacks: A survey, Int. J. Syst. Sci., 2022, 53(16): 3577–3598.

    Article  MathSciNet  MATH  Google Scholar 

  15. Hou F, Sun J, Yang Q, et al., Deep reinforcement learning for optimal denial-of-service attack scheduling, Sci. China Inf. Sci., 2022, 65: 162201.

    Article  MathSciNet  Google Scholar 

  16. Guo H, Sun J, Pang Z H, et al., Event-based optimal stealthy false data injection attacks against remote state estimation systems, IEEE Trans. Cybern., 2023, DOI: https://doi.org/10.1109/TCYB.2023.3255583.

  17. Deng R, Xiao G, Lu R, et al., False data injection on state estimation in power systems-attacks, impacts, and defense: A survey, IEEE Trans. Ind. Informat., 2017, 13(2): 411–423.

    Article  Google Scholar 

  18. Wu G Y, Wang G, Sun J, et al, Optimal partial feedback attacks in cyber-physical power systems, IEEE Trans. Autom. Control, 2020, 65(9): 3919–3926.

    Article  MathSciNet  MATH  Google Scholar 

  19. Li F and Tang Y, False data injection attack for cyber-physical systems with resource constraint, IEEE Trans. Cybern., 2020, 50(2): 729–738.

    Article  Google Scholar 

  20. Jorjani M, Seifi H, and Varjani A Y, A graph theory-based approach to detect false data injection attacks in power system AC state estimation, IEEE Trans. Ind. Informat., 2021, 17(4): 2465–2475.

    Article  Google Scholar 

  21. Pang Z H, Fan L Z, Sun J, et al., Detection of stealthy false data injection attacks against networked control systems via active data modification, Inf. Sci., 2021, 546: 192–205.

    Article  MathSciNet  Google Scholar 

  22. Guo Z, Shi D, Johansson K H, et al., Optimal linear cyber-attack on remote state estimation, IEEE Trans. Control Network Syst., 2017, 4(1): 4–13.

    Article  MathSciNet  MATH  Google Scholar 

  23. Guo Z, Shi D, Johansson K H, et al., Worst-case stealthy innovation-based linear attack on remote state estimation, Automatica, 2018, 89: 117–124.

    Article  MathSciNet  MATH  Google Scholar 

  24. Li Y G and Yang G H, Optimal stealthy false data injection attacks in cyber-physical systems, Inf. Sci., 2019, 481: 474–490.

    Article  MathSciNet  MATH  Google Scholar 

  25. Guo Z, Shi D, Johansson K H, et al., Worst-case innovation-based integrity attacks with side information on remote state estimation, IEEE Trans. Control Netw. Syst., 2019, 6(1): 48–59.

    Article  MathSciNet  MATH  Google Scholar 

  26. Shang J and Chen T, Optimal stealthy integrity attacks on remote state estimation: The maximum utilization of hHistorical data, Automatica, 2021, 128: 109555.

    Article  MATH  Google Scholar 

  27. Pang Z H, Liu G P, Zhou D, et al., Two-channel false data injection attacks against output tracking control of networked systems, IEEE Trans. Ind. Electron., 2016, 63(5): 3242–3251.

    Article  Google Scholar 

  28. Chen Y, Kar S, and Moura J M, Cyber-physical attacks with control objectives, IEEE Trans. Autom. Control, 2018, 63(5): 1418–1425.

    Article  MathSciNet  MATH  Google Scholar 

  29. Chen Y, Kar S, and Moura J M, Optimal attack strategies subject to detection constraints against cyber-physical systems, IEEE Trans. Control Netw. Syst., 2018, 5(3): 1157–1168.

    Article  MathSciNet  MATH  Google Scholar 

  30. Zhang Q, Liu K, Xia Y, et al., Optimal stealthy deception attack against cyber-physical systems, IEEE Trans. Cybern., 2020, 50(9): 3963–3972.

    Article  Google Scholar 

  31. Zhang T Y and Ye D, False data injection attacks with complete stealthiness in cyber-physical systems: A self-generated approach, Automatica, 2020, 120: 109–117.

    Article  MathSciNet  MATH  Google Scholar 

  32. Ren X X and Yang G H, Kullback-Leibler divergence-based optimal stealthy sensor attack against networked linear quadratic Gaussian systems, IEEE Trans. Cybern., 2022, 52(11): 11539–11548.

    Article  Google Scholar 

  33. Lu A Y and Yang G H, False data injection attacks against state estimation in the presence of sensor failures, Inf. Sci., 2020, 508: 92–104.

    Article  MathSciNet  Google Scholar 

  34. Hao J, Piechocki R J, Kaleshi D, et al., Sparse malicious false data injection attacks and defense mechanisms in smart grids, IEEE Trans. Ind. Informat., 2015, 11(5): 1–12.

    Article  Google Scholar 

  35. Yan J, Guo F, and Wen C, False data injection against state estimation in power systems with multiple cooperative attackers, ISA Trans., 2020, 101: 225–233.

    Article  Google Scholar 

  36. Pang Z H, Fan L Z, Dong Z, et al., False data injection attacks against partial sensor measurements of networked control systems, IEEE Trans. Circuits Syst. II, Exp. Briefs, 2022, 69(1): 149–153.

    Google Scholar 

  37. Liu X and Li Z, Local topology attacks in smart grids, IEEE Trans. Smart Grid, 2017, 8(6): 2617–2626.

    Article  Google Scholar 

  38. Pang Z H, Ma B, Liu G P, et al., Data-driven adaptive control: An incremental triangular dynamic linearization approach, IEEE Trans. Circuits Syst. II, Exp. Briefs, 2022, 69(12): 4949–4953.

    Google Scholar 

  39. Wang Z, Sun J, and Chen J, Stability analysis of switched nonlinear systems with multiple time-varying delays, IEEE Trans. Syst. Man Cybern. -Syst., 2022, 52(6): 3947–3956.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jian Sun.

Ethics declarations

SUN Jian is an editorial board member for Journal of Systems Science and Complexity and was not involved in the editorial review or the decision to publish this article. All authors declare that there are no competing interests.

Additional information

This work was supported in part by the National Natural Science Foundation of China under Grant Nos. 62173002, 61925303, 62088101, U20B2073, and 61720106011, and the Beijing Natural Science Foundation under Grant No. 4222045.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Pang, Z., Fu, Y., Guo, H. et al. Analysis of Stealthy False Data Injection Attacks Against Networked Control Systems: Three Case Studies. J Syst Sci Complex 36, 1407–1422 (2023). https://doi.org/10.1007/s11424-022-2120-6

Download citation

  • Received:

  • Revised:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11424-022-2120-6

Keywords

Navigation