JOURNAL ARTICLE

Coding Schemes for Securing Cyber-Physical Systems Against Stealthy Data Injection Attacks

Fei MiaoQuanyan ZhuMiroslav PajicGeorge J. Pappas

Year: 2016 Journal:   IEEE Transactions on Control of Network Systems Vol: 4 (1)Pages: 106-117   Publisher: Institute of Electrical and Electronics Engineers

Abstract

This paper considers a method of coding the sensor outputs in order to detect\nstealthy false data injection attacks. An intelligent attacker can design a\nsequence of data injection to sensors and actuators that pass the state\nestimator and statistical fault detector, based on knowledge of the system\nparameters. To stay undetected, the injected data should increase the state\nestimation errors while keep the estimation residues small. We employ a coding\nmatrix to change the original sensor outputs to increase the estimation\nresidues under intelligent data injection attacks. This is a low cost method\ncompared with encryption schemes over all sensor measurements in communication\nnetworks. We show the conditions of a feasible coding matrix under the\nassumption that the attacker does not have knowledge of the exact coding\nmatrix. An algorithm is developed to compute a feasible coding matrix, and, we\nshow that in general, multiple feasible coding matrices exist. To defend\nagainst attackers who estimates the coding matrix via sensor and actuator\nmeasurements, time-varying coding matrices are designed according to the\ndetection requirements. A heuristic algorithm to decide the time length of\nupdating a coding matrix is then proposed.\n

Keywords:

Metrics

205
Cited By
11.35
FWCI (Field Weighted Citation Impact)
25
Refs
0.99
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Smart Grid Security and Resilience
Physical Sciences →  Engineering →  Control and Systems Engineering
Cybersecurity and Information Systems
Physical Sciences →  Computer Science →  Computer Networks and Communications
Physical Unclonable Functions (PUFs) and Hardware Security
Physical Sciences →  Computer Science →  Hardware and Architecture

Related Documents

JOURNAL ARTICLE

Stochastic Stealthy False Data Injection Attacks Against Cyber-Physical Systems

Ruirui LiuHao YuFei Hao

Journal:   IEEE Systems Journal Year: 2022 Vol: 16 (4)Pages: 6009-6020
JOURNAL ARTICLE

Detection of Stealthy False Data Injection Attacks Against Cyber-Physical Systems: A Stochastic Coding Scheme

Haibin GuoZhong‐Hua PangJian SunJun Li

Journal:   Journal of Systems Science and Complexity Year: 2022 Vol: 35 (5)Pages: 1668-1684
JOURNAL ARTICLE

Optimal stealthy false data injection attacks in cyber-physical systems

Yi-Gang LiGuang‐Hong Yang

Journal:   Information Sciences Year: 2019 Vol: 481 Pages: 474-490
JOURNAL ARTICLE

Stealthy False Data Injection Attacks Against the Summation Detector in Cyber-Physical Systems

Yifa LiuLong ChengDan Ye

Journal:   IEEE Transactions on Industrial Cyber-Physical Systems Year: 2024 Vol: 2 Pages: 391-403
JOURNAL ARTICLE

Geometry-Based Data-Driven Complete Stealthy Attacks Against Cyber-Physical Systems

Kaiyu WangDan Ye

Journal:   IEEE Transactions on Network Science and Engineering Year: 2024 Vol: 11 (6)Pages: 5839-5849
© 2026 ScienceGate Book Chapters — All rights reserved.