首页 | 官方网站   微博 | 高级检索  
     

假数据注入攻击下信息物理融合系统的稳定性研究
引用本文:彭大天,董建敏,蔡忠闽,张长青,彭勤科.假数据注入攻击下信息物理融合系统的稳定性研究[J].自动化学报,2019,45(1):196-205.
作者姓名:彭大天  董建敏  蔡忠闽  张长青  彭勤科
作者单位:1.西安交通大学智能网络与网络安全教育部重点实验室 西安 710049
基金项目:国家自然科学基金61772415国家自然科学基金60774086国家留学基金201706280220国家留学基金20170628 0191
摘    要:假数据注入(False data injection, FDI)攻击由于其隐蔽性特点,严重威胁着信息物理融合系统(Cyber-physical systems, CPS)的安全.从攻击者角度,本文主要研究了FDI攻击对CPS稳定性的影响.首先,给出了FDI攻击模型,从前向通道和反馈通道分别注入控制假数据和测量假数据.接着,提出了FDI攻击效力模型来量化FDI攻击对CPS状态估计值和测量残差的影响.在此基础上,设计了一个攻击向量协同策略,并从理论上分析出操纵CPS稳定性的攻击条件:攻击矩阵H和系统矩阵A的稳定性及时间参数ka的选取时机.数值仿真结果表明FDI攻击协同策略能够有效操纵两类(含有稳定和不稳定受控对象)系统的稳定性.该研究进一步揭示了FDI攻击的协同性,对保护CPS安全和防御网络攻击提供了重要参考.

关 键 词:信息物理融合系统  网络空间安全  假数据注入攻击  卡尔曼滤波
收稿时间:2018-05-25

On the Stability of Cyber-physical Systems Under False Data Injection Attacks
PENG Da-Tian,DONG Jian-Min,CAI Zhong-Min,ZHANG Chang-Qing,PENG Qin-Ke.On the Stability of Cyber-physical Systems Under False Data Injection Attacks[J].Acta Automatica Sinica,2019,45(1):196-205.
Authors:PENG Da-Tian  DONG Jian-Min  CAI Zhong-Min  ZHANG Chang-Qing  PENG Qin-Ke
Affiliation:1.Ministry of Education Key Laboratory for Intelligent Networks and Network Security, Xi'an Jiaotong University, Xi'an 7100492.System Engineering Institute, School of Electronic and Information Engineering, Xi'an Jiaotong University, Xi'an 7100493.Department of Computer Science and Technology, School of Electronic and Information Engineering, Xi'an Jiaotong University, Xi'an 710049
Abstract:Due to the stealthiness behavior, false data injection (FDI) attacks severely threaten the security of cyber-physical systems (CPS). From the attackers' perspective, this paper mainly studies how FDI attacks impact the stability of CPS. First, we give the FDI attack model where the false control and measurement data are injected into the forward and feedback channels, respectively. Then, we propose an FDI effectiveness model to quantify the attack impact on the state estimation and measurement residue of CPS. On this basis, we design a coordination strategy associated with attack vector and further derive the theoretical attack conditions to manipulate the stability of CPS, which are related to the stability of attack matrix H and system matrix A and the selected moment of time parameter ka. Finally, numerical simulations indicate that FDI attacks can effectively manipulate the stability of CPS including two classes of controlled plants:stable and unstable. This study further reveals the coordination behavior of FDI attacks, which provides important reference for securing the CPS and defending cyber attacks.
Keywords:Cyber-physical systems(CPS)  cyberspace security  false data injection(FDI)attacks  Kalman filter
本文献已被 维普 等数据库收录!
点击此处可从《自动化学报》浏览原始摘要信息
点击此处可从《自动化学报》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号