Papers
Topics
Authors
Recent
Search
2000 character limit reached

Coding Schemes for Securing Cyber-Physical Systems Against Stealthy Data Injection Attacks

Published 29 May 2016 in cs.CR and cs.SY | (1605.08962v1)

Abstract: This paper considers a method of coding the sensor outputs in order to detect stealthy false data injection attacks. An intelligent attacker can design a sequence of data injection to sensors and actuators that pass the state estimator and statistical fault detector, based on knowledge of the system parameters. To stay undetected, the injected data should increase the state estimation errors while keep the estimation residues small. We employ a coding matrix to change the original sensor outputs to increase the estimation residues under intelligent data injection attacks. This is a low cost method compared with encryption schemes over all sensor measurements in communication networks. We show the conditions of a feasible coding matrix under the assumption that the attacker does not have knowledge of the exact coding matrix. An algorithm is developed to compute a feasible coding matrix, and, we show that in general, multiple feasible coding matrices exist. To defend against attackers who estimates the coding matrix via sensor and actuator measurements, time-varying coding matrices are designed according to the detection requirements. A heuristic algorithm to decide the time length of updating a coding matrix is then proposed.

Citations (185)

Summary

An Analysis of Coding Schemes for Securing Cyber-Physical Systems Against Stealthy Data Injection Attacks

The proliferation of Cyber-Physical Systems (CPSs) in sectors such as medical devices, energy conservation, and critical infrastructure heightens the necessity of robust security frameworks. The paper, "Coding Schemes for Securing Cyber-Physical Systems Against Stealthy Data Injection Attacks," addresses the challenge of safeguarding CPSs from sophisticated false data injection attacks aimed at evading conventional detection mechanisms.

Overview and Contribution

The paper provides an innovative approach by proposing a method for coding sensor outputs, fundamentally altering the data before it is transmitted to state estimators and controllers. The primary goal is to detect stealthy false data injection attacks designed by adversaries who have a comprehensive understanding of system parameters. Unlike encryption schemes, which are computationally expensive, this method leverages a coding matrix to modify sensor outputs, increasing the estimation residues even when attacks are designed to remain undetected.

Three significant contributions are highlighted:

  1. Introduction of Coding Matrix: The paper introduces a cost-effective method of coding sensor data, thereby amplifying the changes in estimation residues during a false data injection attack. This acts as a detection mechanism even when the adversary lacks knowledge of the coding matrix.

  2. Algorithm to Compute Feasible Coding Matrices: An algorithm is formulated to determine feasible coding matrices that satisfy necessary conditions for detecting attacks. The work demonstrates that generally, multiple feasible coding matrices can exist, providing system designers with options tailored to specific security requirements.

  3. Time-Varying Coding Matrices: For scenarios where attackers might estimate the coding matrix through repeated observations, the paper proposes designing time-varying coding matrices, improving resilience against such adaptive threats. A heuristic algorithm is presented to establish an optimal schedule for updating the coding matrix.

Technical Insights

The proposed framework operates on the premise that the coding matrix should ensure that detector signals in encoded form increase beyond a given threshold when the system is attacked. This method diverges from traditional control and estimation techniques by directly altering sensor communications—a strategy likened to an inexpensive cryptographic-like safeguard without typical overheads. The core proposition is mathematically substantiated with theorems which articulate conditions under which the coding matrix successfully detects stealthy attacks.

The research further explores permutations via rotation matrices to manage computational overheads while maintaining detection potency. The use of rotation matrices offers an efficient means to generate diverse coding schemes, effectively obfuscating sensor outputs without relying extensively on encryption.

Implications and Future Directions

The implications of this research are manifold. Practically, the proposed schemes can lead to more secure CPS deployments, reducing vulnerabilities inherent in existing monitoring systems. Theoretically, this work expands the toolbox for securing LTI systems under constraint-rich environments where conventional security measures might be impractical or insufficient.

Looking forward, potential extensions of this work may include adaptation to more complex models or decentralized systems where coordinated attacks on sensor and actuator elements are more challenging. Additionally, optimizing coding matrix distribution protocols within CPSs, considering physical constraints, remains an area ripe for exploration.

In conclusion, this paper advances understanding of CPS security by offering a novel, efficient alternative to traditional encryption, promising enhanced resilience against stealthy cyber-attacks for critical systems infrastructures.

Paper to Video (Beta)

Whiteboard

No one has generated a whiteboard explanation for this paper yet.

Open Problems

We haven't generated a list of open problems mentioned in this paper yet.

Continue Learning

We haven't generated follow-up questions for this paper yet.

Collections

Sign up for free to add this paper to one or more collections.