2.793

                    2018影響因子

                    (CJCR)

                    • 中文核心
                    • EI
                    • 中國科技核心
                    • Scopus
                    • CSCD
                    • 英國科學文摘

                    留言板

                    尊敬的讀者、作者、審稿人, 關于本刊的投稿、審稿、編輯和出版的任何問題, 您可以本頁添加留言。我們將盡快給您答復。謝謝您的支持!

                    姓名
                    郵箱
                    手機號碼
                    標題
                    留言內容
                    驗證碼

                    基于輔助信息補償和控制信號編碼的重放攻擊檢測方法

                    張正道 楊佳佳 謝林柏

                    張正道, 楊佳佳, 謝林柏. 基于輔助信息補償和控制信號編碼的重放攻擊檢測方法. 自動化學報, 2021, x(x): 1?11 doi: 10.16383/j.aas.c210092
                    引用本文: 張正道, 楊佳佳, 謝林柏. 基于輔助信息補償和控制信號編碼的重放攻擊檢測方法. 自動化學報, 2021, x(x): 1?11 doi: 10.16383/j.aas.c210092
                    Zhang Zheng-Dao, Yang Jia-Jia, Xie Lin-Bo. Replay attack detection method based on auxiliary information compensation and control signal coding. Acta Automatica Sinica, 2021, x(x): 1?11 doi: 10.16383/j.aas.c210092
                    Citation: Zhang Zheng-Dao, Yang Jia-Jia, Xie Lin-Bo. Replay attack detection method based on auxiliary information compensation and control signal coding. Acta Automatica Sinica, 2021, x(x): 1?11 doi: 10.16383/j.aas.c210092

                    基于輔助信息補償和控制信號編碼的重放攻擊檢測方法

                    doi: 10.16383/j.aas.c210092
                    基金項目: 國家重點研發計劃課題(2018YFB1701903)資助
                    詳細信息
                      作者簡介:

                      張正道:博士, 江南大學物聯網工程學院副教授, 主要研究方向為信息物理系統安全性, 系統狀態監測與故障診斷. 本文通信作者. Email: wxzzd@jiangnan.edu.cn

                      楊佳佳:江南大學物聯網工程學院碩士研究生. 主要研究方向為信息物理系統的攻擊檢測. Email: 6181905010@stu.jiangnan.edu.cn

                      謝林柏:博士, 江南大學物聯網工程學院教授. 主要研究方向為過程建模與控制, 智能檢測與系統安全性等. Email: Xie_linbo@jiangnan.edu.cn

                    Replay Attack Detection Method Based on Auxiliary Information Compensation and Control Signal Coding

                    Funds: Supported by National Key Research and Development Program of China (No. 2018YFB1701903)
                    More Information
                      Author Bio:

                      ZHANG Zheng-Dao Ph.D., professor at the School of Internet of Things Engineering, Jiangnan University. His research interest covers security of cyber physics system, state monitoring and fault diagnosis. Corresponding author of this paper

                      YANG Jia-Jia Master student at the School of Internet of Things Engineering, Jiangnan University. Her main interest is attack detection in cyber physical systems

                      XIE Lin-Bo Ph.D., professor at the School of Internet of Things Engineering, Jiangnan University. His research interest covers process modeling and control, intelligent detection and system safety

                    • 摘要: 在最優控制信號中加入編碼信號是實現信息物理系統重放攻擊檢測的有效方法, 但會造成系統控制性能的損失. 如何在保證重放攻擊檢測率條件下降低系統的控制性能損失是一個值得研究的問題. 本文提出了一種基于輔助信息補償的控制信號編碼檢測方法, 通過向測量值添加輔助信號補償控制編碼信號對最優狀態估計的影響. 首先, 論文證明了此方案下重放攻擊的可檢測性, 導出了檢測率的上界和檢測函數閾值間的定量關系. 其次證明了加入輔助信號后系統控制信號與未添加編碼信息時相同, 之前時刻的控制編碼信號不會造成累積效應. 因此系統當前時刻的控制性能損失僅與當前時刻編碼信號的大小有關. 最后, 將編碼信號的協方差矩陣, 檢測率和檢測閾值之間的關系表示成一個最優化問題, 給出了編碼信號方差的計算方法. 仿真結果表明, 本文方法能有效地檢測重放攻擊的發生, 且系統控制的性能損失較小.
                    • 圖  1  本文所提方法下的系統框圖

                      Fig.  1  System diagram under the scheme proposed in this paper

                      圖  2  直流電機系統正常運行下的檢測函數曲線

                      Fig.  2  The detection function curve of the normal DC motor system

                      圖  3  攻擊場景1下的檢測函數曲線

                      Fig.  3  The detection function curve under attack scenario 1

                      圖  4  攻擊場景2下的檢測函數曲線

                      Fig.  4  The detection function curve under attack scenario 2

                      圖  5  攻擊場景3下的檢測函數曲線

                      Fig.  5  The detection function curve under attack scenario 3

                      圖  6  本文所提的方法和不同方法的性能損失函數曲線對比圖

                      Fig.  6  Comparison between the performance index of schemes in this paper and other papers

                      表  1  噪聲方差及性能指標比較

                      Table  1  Comparison of noise variance and performance index of different schemes

                      ADR${{\varSigma }_{\rm{u}}}$$J$
                      本文方法75%0.435323.2778
                      80%0.545029.1433
                      文[17]方法75%0.761548.9837
                      80%0.996464.0928
                      文[18]方法71.02%1.001064.3244
                      81.20%1.500096.4850
                      文[15]方法75%2.7166174.7383
                      80%3.4018218.8113
                      下載: 導出CSV
                      360彩票
                    • [1] 劉烴, 田決, 王稼舟, 吳宏宇, 孫利民, 周亞東等. 信息物理融合系統綜合安全威脅與防御研究. 自動化學報, 2019, 45(1): 5?24

                      Liu Ting, Tian Jue, Wang Jia-Zhou, Wu Hong-Yu, Sun Li-Min, Zhou Ya-Dong, et al. Integrated security threats and defense of cyber-physical systems. Acta Automatica Sinica, 2019, 45(1): 5?24
                      [2] 李洪陽, 魏慕恒, 黃潔, 邱伯華, 趙曄, 駱文城等. 信息物理系統技術綜述. 自動化學報, 2019, 45(1): 37?50

                      Li Hong-Yang, Wei Mu-Heng, Huang Jie, Qiu Bo-Hua, Zhao Ye, Luo Wen-Cheng, et al. Survey on cyber-physical systems. Acta Automatica Sinica, 2019, 45(1): 37?50
                      [3] Kumar C, Marston S, Sen R. Cyber-physical systems security: state of the art and research opportunities for information systems academics. Communications of the Association for Information Systems, 2020, 47: 678?696 doi: 10.17705/1CAIS.04731
                      [4] Dibaji S M, Pirani M, Flamholz D B, Annaswamy A M, Johansson K H, Chakrabortty A. A systems and control perspective of CPS security. Annual Reviews in Control, 2019, 47: 394?411 doi: 10.1016/j.arcontrol.2019.04.011
                      [5] Humayed A, Lin J Q, Li F J, Luo B. Cyber-physical systems security—a survey. IEEE Internet of Things Journal, 2017, 4(6): 1802?1831 doi: 10.1109/JIOT.2017.2703172
                      [6] Ding D R, Han Q L, Xiang Y, Ge X H, Zhang X M. A survey on security control and attack detection for industrial cyber-physical systems. Neurocomputing, 2018, 275: 1674?1683 doi: 10.1016/j.neucom.2017.10.009
                      [7] Mousavinejad E, Yang F W, Han Q L, Vlacic L. A novel cyber attack detection method in networked control systems. IEEE Transactions on Cybernetics, 2018, 48(11): 3254?3264 doi: 10.1109/TCYB.2018.2843358
                      [8] Teixeira A, Shames I, Sandberg H, Johansson K H. A secure control framework for resource-limited adversaries. Automatica, 2015, 51: 135?148 doi: 10.1016/j.automatica.2014.10.067
                      [9] Zhang H, Cheng P, Shi L, Chen J M. Optimal DoS attack scheduling in wireless networked control system. IEEE Transactions on Control Systems Technology, 2016, 24(3): 843?852 doi: 10.1109/TCST.2015.2462741
                      [10] 彭大天, 董建敏, 蔡忠閩, 張長青, 彭勤科. 假數據注入攻擊下信息物理融合系統的穩定性研究. 自動化學報, 2019, 45(1): 196?205

                      Peng Da-Tian, Dong Jian-Min, Cai Zhong-Min, Zhang Chang-Qing, Peng Qin-Ke. On the stability of cyber-physical systems under false data injection attacks. Acta Automatica Sinica, 2019, 45(1): 196?205
                      [11] Sargolzaei A, Yazdani K, Abbaspour A, Crane C D, Dixon W E. Detection and mitigation of false data injection attacks in networked control systems. IEEE Transactions on Industrial Informatics, 2020, 16(6): 4281?4292 doi: 10.1109/TII.2019.2952067
                      [12] Franze G, Tedesco F, Lucia W. Resilient control for cyber-physical systems subject to replay attacks. IEEE Control Systems Letters, 2019, 3(4): 984?989 doi: 10.1109/LCSYS.2019.2920507
                      [13] Dan Y, Zhang T Y, Guo G. Stochastic coding detection scheme in cyber-physical systems against replay attack. Information Sciences, 2019, 481: 432?444 doi: 10.1016/j.ins.2018.12.091
                      [14] Mo Y L, Sinopoli B. Secure control against replay attacks. In: Proceedings of the 47th Allerton Conference on Communication, Control, and Computing. Monticello, MS, USA: IEEE, 2009. 911−918
                      [15] Mo Y L, Chabukswar R, Sinopoli B. Detecting integrity attacks on SCADA systems. IEEE Transactions on Control Systems Technology, 2014, 22(4): 1396?1407 doi: 10.1109/TCST.2013.2280899
                      [16] Tran T T, Shin O S, Lee J H. Detection of replay attacks in smart grid systems. In: Proceedings of the 2013 International Conference on Computing, Management, and Telecommunications. Ho Chi Minh City, Vietnam: IEEE, 2013. 298?302
                      [17] Liu H X, Mo Y L, Yan J Q, Xie L H, Johansson K H. An online approach to physical watermark design. IEEE Transactions on Automatic Control, 2020, 65(9): 3895?3902 doi: 10.1109/TAC.2020.2971994
                      [18] Zaman A, Safarinejadian B, Birk W. Security analysis and fault detection against stealthy replay attacks. International Journal of Control, 2020 doi: 10.1080/00207179.2020.1862917
                      [19] Fang C R, Qi Y F, Cheng P, Zheng W X. Cost-effective watermark based detector for replay attacks on cyber-physical systems. In: Proceedings of the 11th Asian Control Conference. Gold Coast, Australia: IEEE, 2018. 940?945
                      [20] Fang C R, Qi Y F, Cheng P, Zheng W X. Optimal periodic watermarking schedule for replay attack detection in cyber–physical systems. Automatica, 2020, 112: 108698 doi: 10.1016/j.automatica.2019.108698
                      [21] Guan F X, Jiang Q. Experiment of Control System Simulation. Beijing: Tsinghua University Press, 2015. 122?123
                    • 加載中
                    計量
                    • 文章訪問數:  147
                    • HTML全文瀏覽量:  75
                    • 被引次數: 0
                    出版歷程
                    • 收稿日期:  2021-01-28
                    • 網絡出版日期:  2021-07-06

                    目錄

                      /

                      返回文章
                      返回