Analysis of Stealthy False Data Injection Attacks Against Networked Control Systems: Three Case Studies
This paper mainly investigates the security problem of a networked control system based on a Kalman filter. A false data injection attack scheme is proposed to only tamper the measurement output, and its stealthiness and effects on system performance are analyzed under three cases of system knowledg...
Saved in:
Published in | Journal of systems science and complexity Vol. 36; no. 4; pp. 1407 - 1422 |
---|---|
Main Authors | , , , |
Format | Journal Article |
Language | English |
Published |
Berlin/Heidelberg
Springer Berlin Heidelberg
01.08.2023
Springer Nature B.V |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | This paper mainly investigates the security problem of a networked control system based on a Kalman filter. A false data injection attack scheme is proposed to only tamper the measurement output, and its stealthiness and effects on system performance are analyzed under three cases of system knowledge held by an attacker and a defender. Firstly, it is derived that the proposed attack scheme is stealthy for a residual-based detector when the attacker and the defender hold the same accurate system knowledge. Secondly, it is proven that the proposed attack scheme is still stealthy even if the defender actively modifies the Kalman filter gain so as to make it different from that of the attacker. Thirdly, the stealthiness condition of the proposed attack scheme based on an inaccurate model is given. Furthermore, for each case, the instability conditions of the closed-loop system under attack are derived. Finally, simulation results are provided to test the proposed attack scheme. |
---|---|
AbstractList | This paper mainly investigates the security problem of a networked control system based on a Kalman filter. A false data injection attack scheme is proposed to only tamper the measurement output, and its stealthiness and effects on system performance are analyzed under three cases of system knowledge held by an attacker and a defender. Firstly, it is derived that the proposed attack scheme is stealthy for a residual-based detector when the attacker and the defender hold the same accurate system knowledge. Secondly, it is proven that the proposed attack scheme is still stealthy even if the defender actively modifies the Kalman filter gain so as to make it different from that of the attacker. Thirdly, the stealthiness condition of the proposed attack scheme based on an inaccurate model is given. Furthermore, for each case, the instability conditions of the closed-loop system under attack are derived. Finally, simulation results are provided to test the proposed attack scheme. |
Author | Fu, Yuan Pang, Zhonghua Guo, Haibin Sun, Jian |
Author_xml | – sequence: 1 givenname: Zhonghua surname: Pang fullname: Pang, Zhonghua organization: Key Laboratory of Fieldbus Technology and Automation of Beijing, North China University of Technology – sequence: 2 givenname: Yuan surname: Fu fullname: Fu, Yuan organization: Key Laboratory of Fieldbus Technology and Automation of Beijing, North China University of Technology – sequence: 3 givenname: Haibin surname: Guo fullname: Guo, Haibin organization: National Key Laboratory of Autonomous Intelligent Unmanned Systems, School of Automation, Beijing Institute of Technology, Beijing Institute of Technology Chongqing Innovation Center – sequence: 4 givenname: Jian surname: Sun fullname: Sun, Jian email: sunjian@bit.edu.cn organization: National Key Laboratory of Autonomous Intelligent Unmanned Systems, School of Automation, Beijing Institute of Technology, Beijing Institute of Technology Chongqing Innovation Center |
BookMark | eNp9kEFLwzAUx4NMcE4_gLeA52qStknrrVSng6GHzXNI09etW9fMJEP67W2pIAh6eu_w__1573eJJq1pAaEbSu4oIeLeURqxKCCMBYwyEvAzNKVxnAaCcDHpd0LSgFMWXaBL53aEhDwlyRRtslY1nasdNhVeeVCN33Z4rhoH-FF5hRftDrSvTYsz75XeO5xtVN06j1_Bfxq7hxLnpvXWNHjVOQ8H94DXWwuAc9WXrPyprMFdofNqKL3-njP0Pn9a5y_B8u15kWfLQIeU-6AMY6BEhGXJk5DwkkdCRERpiIsyhSitRFFqKNJYibSqeFFEkKo4YVqETPBEhzN0O_Yerfk4gfNyZ062_9FJlsQ8oiEVSZ8SY0pb45yFSuraq-FLb1XdSErkYFWOVmVvVQ5WJe9J-os82vqgbPcvw0bG9dl2A_bnpr-hL7MTi-g |
CitedBy_id | crossref_primary_10_1109_TCSII_2023_3302151 crossref_primary_10_1109_JAS_2023_123441 crossref_primary_10_1007_s11424_024_4029_8 crossref_primary_10_1007_s11424_024_3466_8 crossref_primary_10_1080_00207721_2023_2196276 crossref_primary_10_1007_s11424_024_3401_z crossref_primary_10_1016_j_cnsns_2024_108423 crossref_primary_10_1016_j_segan_2024_101347 crossref_primary_10_1109_TAC_2023_3316160 crossref_primary_10_1109_LSP_2024_3353159 crossref_primary_10_3390_sym14112447 crossref_primary_10_1007_s11071_024_10374_8 crossref_primary_10_1016_j_jfranklin_2025_107594 crossref_primary_10_1080_00207721_2023_2245949 crossref_primary_10_1038_s41467_024_54626_y crossref_primary_10_1109_ACCESS_2024_3491502 crossref_primary_10_1109_TCYB_2024_3490656 crossref_primary_10_1109_TCSII_2023_3337896 crossref_primary_10_1007_s11424_024_3291_0 crossref_primary_10_1177_10775463221130819 crossref_primary_10_1109_TIFS_2023_3340098 |
Cites_doi | 10.1109/TCNS.2017.2690399 10.1002/rnc.4928 10.1007/s11432-020-3027-0 10.1109/TITS.2021.3053406 10.1109/TII.2016.2614396 10.1007/s11424-021-0160-y 10.1109/TCST.2015.2462741 10.1109/TCYB.2019.2912622 10.1080/00207721.2022.2143735 10.1016/j.automatica.2017.11.018 10.1109/TAC.2017.2741778 10.1016/j.isatra.2020.02.003 10.1080/00396338.2011.555586 10.1049/et.2010.0410 10.1109/TCST.2013.2280899 10.1109/TPWRD.2010.2050340 10.1016/j.ins.2019.01.001 10.1016/j.automatica.2020.109117 10.1109/TAC.2020.2981915 10.1109/TCNS.2018.2793664 10.1016/j.ins.2019.08.052 10.1109/TII.2020.2999571 10.1109/TSG.2016.2532347 10.1109/TCNS.2016.2570003 10.1007/s11432-019-2691-4 10.1109/TSG.2016.2620939 10.1109/TII.2015.2475695 10.1109/TCYB.2018.2871951 10.1016/j.automatica.2021.109555 10.1109/TIE.2016.2535119 10.1109/TCYB.2021.3068220 10.1109/TSMC.2021.3080278 10.1016/j.ins.2020.06.074 10.1109/TIE.2022.3217585 10.1109/JAS.2019.1911861 10.1109/TCYB.2023.3255583 |
ContentType | Journal Article |
Copyright | The Editorial Office of JSSC & Springer-Verlag GmbH Germany 2023 The Editorial Office of JSSC & Springer-Verlag GmbH Germany 2023. |
Copyright_xml | – notice: The Editorial Office of JSSC & Springer-Verlag GmbH Germany 2023 – notice: The Editorial Office of JSSC & Springer-Verlag GmbH Germany 2023. |
DBID | AAYXX CITATION |
DOI | 10.1007/s11424-022-2120-6 |
DatabaseName | CrossRef |
DatabaseTitle | CrossRef |
DatabaseTitleList | |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering Statistics Mathematics |
EISSN | 1559-7067 |
EndPage | 1422 |
ExternalDocumentID | 10_1007_s11424_022_2120_6 |
GroupedDBID | -5D -5G -BR -EM -SA -S~ -Y2 -~C .86 .VR 06D 0R~ 0VY 1N0 29L 2J2 2JN 2JY 2KG 2KM 2LR 2VQ 2~H 30V 4.4 406 408 40D 40E 5GY 5VR 5VS 5XA 5XB 6NX 8TC 95- 95. 95~ 96X AAAVM AABHQ AAHNG AAIAL AAJBT AAJKR AANZL AARHV AARTL AASML AATNV AATVU AAUYE AAWCG AAXDM AAYIU AAYQN AAYTO AAYZH ABBBX ABDZT ABECU ABFTD ABFTV ABHLI ABHQN ABJNI ABJOX ABKCH ABKTR ABMNI ABMQK ABNWP ABQBU ABQSL ABSXP ABTEG ABTHY ABTKH ABTMW ABULA ABWNU ABXPI ACBXY ACDTI ACGFS ACHSB ACHXU ACIWK ACKNC ACMDZ ACMLO ACOKC ACOMO ACSNA ACZOJ ADHHG ADHIR ADINQ ADKNI ADKPE ADRFC ADTPH ADURQ ADYFF ADZKW AEBTG AEFQL AEGAL AEGNC AEJHL AEJRE AEKMD AEMSY AENEX AEOHA AEPYU AESKC AETLH AEVLU AEXYK AFBBN AFGCZ AFLOW AFQWF AFUIB AFWTZ AFZKB AGAYW AGDGC AGJBK AGMZJ AGQEE AGQMX AGRTI AGWIL AGWZB AGYKE AHAVH AHBYD AHKAY AHSBF AHYZX AIAKS AIGIU AIIXL AILAN AITGF AJBLW AJRNO ALMA_UNASSIGNED_HOLDINGS ALWAN AMKLP AMXSW AMYLF AMYQR AOCGG ARMRJ ASPBG AVWKF AXYYD AZFZN B-. BA0 BAPOH BDATZ BGNMA BSONS CAG CAJEA CCEZO CCVFK CHBEP COF CS3 CSCUP CW9 DDRTE DNIVK DPUIP DU5 EBLON EBS EIOEI EJD ESBYG FA0 FEDTE FERAY FFXSO FIGPU FINBP FNLPD FRRFC FSGXE FWDCC GGCAI GGRSB GJIRD GNWQR GQ6 GQ7 H13 HF~ HG6 HLICF HMJXF HRMNR HVGLF HZ~ IJ- IKXTQ IWAJR IXD I~X I~Z J-C JBSCW JZLTJ KDC KOV LLZTM M4Y MA- N2Q NPVJJ NQJWS NU0 O9- O93 O9J P9R PF0 PT4 Q-- QOS R89 R9I REI ROL RPX RSV S16 S1Z S27 S3B SAP SCL SDH SHX SISQX SJYHP SMT SNE SNPRN SNX SOHCF SOJ SPISZ SRMVM SSLCW STPWE SZN T13 TSG TSK TUC U1G U2A U5K UG4 UOJIU UTJUX UZXMN VC2 VFIZW W23 W48 WK8 YLTOR Z81 Z83 Z88 ZMTXR ~A9 AAYXX ABAKF ABDBE ABFSG ACAOD ACSTC ADHKG AEZWR AFDZB AFHIU AFOHR AGQPQ AHPBZ AHWEU AIXLP ATHPR AYFIA CITATION ABRTQ |
ID | FETCH-LOGICAL-c316t-d35e1073dd68306d647740ace5bd9e49f7bdceb95a79ff6bb4e9a582c732768c3 |
IEDL.DBID | U2A |
ISSN | 1009-6124 |
IngestDate | Fri Jul 25 11:20:00 EDT 2025 Thu Apr 24 23:04:27 EDT 2025 Tue Jul 01 01:25:52 EDT 2025 Fri Feb 21 02:43:24 EST 2025 |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 4 |
Keywords | False data injection attack networked control systems (NCSs) stability stealthiness |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c316t-d35e1073dd68306d647740ace5bd9e49f7bdceb95a79ff6bb4e9a582c732768c3 |
Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
PQID | 2856413178 |
PQPubID | 2044418 |
PageCount | 16 |
ParticipantIDs | proquest_journals_2856413178 crossref_citationtrail_10_1007_s11424_022_2120_6 crossref_primary_10_1007_s11424_022_2120_6 springer_journals_10_1007_s11424_022_2120_6 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 2023-08-01 |
PublicationDateYYYYMMDD | 2023-08-01 |
PublicationDate_xml | – month: 08 year: 2023 text: 2023-08-01 day: 01 |
PublicationDecade | 2020 |
PublicationPlace | Berlin/Heidelberg |
PublicationPlace_xml | – name: Berlin/Heidelberg – name: Heidelberg |
PublicationTitle | Journal of systems science and complexity |
PublicationTitleAbbrev | J Syst Sci Complex |
PublicationYear | 2023 |
Publisher | Springer Berlin Heidelberg Springer Nature B.V |
Publisher_xml | – name: Springer Berlin Heidelberg – name: Springer Nature B.V |
References | Zhang, Han, Ge (CR3) 2020; 7 Zhang, Ye (CR31) 2020; 120 Conti (CR10) 2010; 5 Liu, Li (CR37) 2017; 8 CR16 Pang, Fan, Sun (CR21) 2021; 546 Ren, Yang (CR32) 2022; 52 Chen, Wang (CR13) 2020; 63 Chen, Kar, Moura (CR28) 2018; 63 Lee, Chen, Chen (CR9) 2010; 25 Pang, Fan, Guo (CR14) 2022; 53 Hou, Sun, Yang (CR15) 2022; 65 Wu, Wang, Sun (CR18) 2020; 65 Guo, Shi, Johansson (CR23) 2018; 89 Pang, Fan, Dong (CR36) 2022; 69 Hao, Piechocki, Kaleshi (CR34) 2015; 11 Mohammadali, Haghighi, Tadayon (CR2) 2018; 9 Wang, Sun, Chen (CR39) 2022; 52 Guo, Shi, Johansson (CR22) 2017; 4 Farwell, Rohozinski (CR8) 2011; 53 Guo, Shi, Johansson (CR25) 2019; 6 Pang, Liu, Zhou (CR27) 2016; 63 Pang, Luo, Liu (CR6) 2021; 68 CR7 Chen, Kar, Moura (CR29) 2018; 5 Zhang, Liu, Xia (CR30) 2020; 50 Farivar, Haghighi, Jolfaei (CR4) 2021; 22 Deng, Xiao, Lu (CR17) 2017; 13 Shang, Chen (CR26) 2021; 128 Lu, Yang (CR33) 2020; 508 Li, Yang (CR24) 2019; 481 Pang, Bai, Liu (CR1) 2021; 34 Mo, Chabukswar, Sinopoli (CR11) 2014; 22 Zhang, Cheng, Shi (CR12) 2016; 24 Yan, Guo, Wen (CR35) 2020; 101 Wang, Sun, Chen (CR5) 2020; 30 Jorjani, Seifi, Varjani (CR20) 2021; 17 Pang, Ma, Liu (CR38) 2022; 69 Li, Tang (CR19) 2020; 50 Y Chen (2120_CR28) 2018; 63 F Hou (2120_CR15) 2022; 65 2120_CR7 Z H Pang (2120_CR27) 2016; 63 A Y Lu (2120_CR33) 2020; 508 J Hao (2120_CR34) 2015; 11 Z H Pang (2120_CR6) 2021; 68 Z H Pang (2120_CR36) 2022; 69 Y Chen (2120_CR29) 2018; 5 R Deng (2120_CR17) 2017; 13 J Yan (2120_CR35) 2020; 101 H Zhang (2120_CR12) 2016; 24 M Jorjani (2120_CR20) 2021; 17 X Liu (2120_CR37) 2017; 8 C Lee (2120_CR9) 2010; 25 Z H Pang (2120_CR38) 2022; 69 Z Guo (2120_CR22) 2017; 4 Z Guo (2120_CR25) 2019; 6 Z Pang (2120_CR1) 2021; 34 T Y Zhang (2120_CR31) 2020; 120 Z H Pang (2120_CR21) 2021; 546 2120_CR16 Z Wang (2120_CR5) 2020; 30 X M Zhang (2120_CR3) 2020; 7 X Chen (2120_CR13) 2020; 63 Z Wang (2120_CR39) 2022; 52 Z Guo (2120_CR23) 2018; 89 F Li (2120_CR19) 2020; 50 F Farivar (2120_CR4) 2021; 22 Y Mo (2120_CR11) 2014; 22 Z H Pang (2120_CR14) 2022; 53 Y G Li (2120_CR24) 2019; 481 G Y Wu (2120_CR18) 2020; 65 J Shang (2120_CR26) 2021; 128 J P Farwell (2120_CR8) 2011; 53 A Mohammadali (2120_CR2) 2018; 9 X X Ren (2120_CR32) 2022; 52 J P Conti (2120_CR10) 2010; 5 Q Zhang (2120_CR30) 2020; 50 |
References_xml | – volume: 69 start-page: 149 issue: 1 year: 2022 end-page: 153 ident: CR36 article-title: False data injection attacks against partial sensor measurements of networked control systems publication-title: IEEE Trans. Circuits Syst. II, Exp. Briefs – volume: 5 start-page: 1157 issue: 3 year: 2018 end-page: 1168 ident: CR29 article-title: Optimal attack strategies subject to detection constraints against cyber-physical systems publication-title: IEEE Trans. Control Netw. Syst. doi: 10.1109/TCNS.2017.2690399 – volume: 30 start-page: 2906 issue: 7 year: 2020 end-page: 2919 ident: CR5 article-title: Finite-time stability of switched nonlinear time-delay systems publication-title: Int. J. Robust Nonlinear Control doi: 10.1002/rnc.4928 – volume: 65 start-page: 162201 year: 2022 ident: CR15 article-title: Deep reinforcement learning for optimal denial-of-service attack scheduling publication-title: Sci. China Inf. Sci. doi: 10.1007/s11432-020-3027-0 – volume: 22 start-page: 3824 issue: 6 year: 2021 end-page: 3831 ident: CR4 article-title: On the security of networked control systems in smart vehicle and its adaptive cruise control publication-title: IEEE Trans. Intell. Transp. Syst. doi: 10.1109/TITS.2021.3053406 – ident: CR16 – volume: 13 start-page: 411 issue: 2 year: 2017 end-page: 423 ident: CR17 article-title: False data injection on state estimation in power systems-attacks, impacts, and defense: A survey publication-title: IEEE Trans. Ind. Informat. doi: 10.1109/TII.2016.2614396 – volume: 34 start-page: 1364 issue: 4 year: 2021 end-page: 1378 ident: CR1 article-title: A novel networked predictive control method for systems with random communication constraints publication-title: Journal of Systems Science and Complexity doi: 10.1007/s11424-021-0160-y – volume: 7 start-page: 1 issue: 1 year: 2020 end-page: 17 ident: CR3 article-title: Networked control systems: A survey of trends and techniques publication-title: IEEE/CAA J. Autom. Sin. – volume: 24 start-page: 843 issue: 3 year: 2016 end-page: 852 ident: CR12 article-title: Optimal DoS attack scheduling in wireless networked control system publication-title: IEEE Trans. Control Syst. Technol. doi: 10.1109/TCST.2015.2462741 – volume: 50 start-page: 3963 issue: 9 year: 2020 end-page: 3972 ident: CR30 article-title: Optimal stealthy deception attack against cyber-physical systems publication-title: IEEE Trans. Cybern. doi: 10.1109/TCYB.2019.2912622 – volume: 53 start-page: 3577 issue: 16 year: 2022 end-page: 3598 ident: CR14 article-title: Security of networked control systems subject to deception attacks: A survey publication-title: Int. J. Syst. Sci. doi: 10.1080/00207721.2022.2143735 – volume: 69 start-page: 4949 issue: 12 year: 2022 end-page: 4953 ident: CR38 article-title: Data-driven adaptive control: An incremental triangular dynamic linearization approach publication-title: IEEE Trans. Circuits Syst. II, Exp. Briefs – volume: 89 start-page: 117 year: 2018 end-page: 124 ident: CR23 article-title: Worst-case stealthy innovation-based linear attack on remote state estimation publication-title: Automatica doi: 10.1016/j.automatica.2017.11.018 – volume: 63 start-page: 1418 issue: 5 year: 2018 end-page: 1425 ident: CR28 article-title: Cyber-physical attacks with control objectives publication-title: IEEE Trans. Autom. Control doi: 10.1109/TAC.2017.2741778 – volume: 101 start-page: 225 year: 2020 end-page: 233 ident: CR35 article-title: False data injection against state estimation in power systems with multiple cooperative attackers publication-title: ISA Trans. doi: 10.1016/j.isatra.2020.02.003 – volume: 53 start-page: 23 issue: 1 year: 2011 end-page: 40 ident: CR8 article-title: Stuxnet and the future of cyber war publication-title: Survival doi: 10.1080/00396338.2011.555586 – volume: 5 start-page: 46 issue: 4 year: 2010 end-page: 47 ident: CR10 article-title: The day the samba stopped [power blackouts] publication-title: Eng. Technol. doi: 10.1049/et.2010.0410 – volume: 22 start-page: 1396 issue: 4 year: 2014 end-page: 1407 ident: CR11 article-title: Detecting integrity attacks on SCADA systems publication-title: IEEE Trans. Control Syst. Technol. doi: 10.1109/TCST.2013.2280899 – volume: 25 start-page: 2726 issue: 4 year: 2010 end-page: 2733 ident: CR9 article-title: Lessons learned from the blackout accident at a nuclear power plant in taiwan publication-title: IEEE Trans. Power Del. doi: 10.1109/TPWRD.2010.2050340 – volume: 481 start-page: 474 year: 2019 end-page: 490 ident: CR24 article-title: Optimal stealthy false data injection attacks in cyber-physical systems publication-title: Inf. Sci. doi: 10.1016/j.ins.2019.01.001 – volume: 120 start-page: 109 year: 2020 end-page: 117 ident: CR31 article-title: False data injection attacks with complete stealthiness in cyber-physical systems: A self-generated approach publication-title: Automatica doi: 10.1016/j.automatica.2020.109117 – volume: 65 start-page: 3919 issue: 9 year: 2020 end-page: 3926 ident: CR18 article-title: Optimal partial feedback attacks in cyber-physical power systems publication-title: IEEE Trans. Autom. Control doi: 10.1109/TAC.2020.2981915 – volume: 6 start-page: 48 issue: 1 year: 2019 end-page: 59 ident: CR25 article-title: Worst-case innovation-based integrity attacks with side information on remote state estimation publication-title: IEEE Trans. Control Netw. Syst. doi: 10.1109/TCNS.2018.2793664 – volume: 508 start-page: 92 year: 2020 end-page: 104 ident: CR33 article-title: False data injection attacks against state estimation in the presence of sensor failures publication-title: Inf. Sci. doi: 10.1016/j.ins.2019.08.052 – volume: 17 start-page: 2465 issue: 4 year: 2021 end-page: 2475 ident: CR20 article-title: A graph theory-based approach to detect false data injection attacks in power system AC state estimation publication-title: IEEE Trans. Ind. Informat. doi: 10.1109/TII.2020.2999571 – volume: 8 start-page: 2617 issue: 6 year: 2017 end-page: 2626 ident: CR37 article-title: Local topology attacks in smart grids publication-title: IEEE Trans. Smart Grid doi: 10.1109/TSG.2016.2532347 – volume: 68 start-page: 426 issue: 1 year: 2021 end-page: 430 ident: CR6 article-title: Observer-based incremental predictive control of networked multi-agent systems with random delays and packet dropouts publication-title: IEEE Trans. Circuits Syst. II, Exp. Briefs – volume: 4 start-page: 4 issue: 1 year: 2017 end-page: 13 ident: CR22 article-title: Optimal linear cyber-attack on remote state estimation publication-title: IEEE Trans. Control Network Syst. doi: 10.1109/TCNS.2016.2570003 – volume: 63 start-page: 150207 issue: 5 year: 2020 ident: CR13 article-title: Event-triggered attack-tolerant tracking control design for networked non-linear control systems under DoS jamming attacks publication-title: Sci. China Inf. Sci. doi: 10.1007/s11432-019-2691-4 – volume: 9 start-page: 2834 issue: 4 year: 2018 end-page: 2842 ident: CR2 article-title: A novel identity-based key establishment method for advanced metering infrastructure in smart grid publication-title: IEEE Trans. Smart Grid doi: 10.1109/TSG.2016.2620939 – volume: 11 start-page: 1 issue: 5 year: 2015 end-page: 12 ident: CR34 article-title: Sparse malicious false data injection attacks and defense mechanisms in smart grids publication-title: IEEE Trans. Ind. Informat. doi: 10.1109/TII.2015.2475695 – volume: 50 start-page: 729 issue: 2 year: 2020 end-page: 738 ident: CR19 article-title: False data injection attack for cyber-physical systems with resource constraint publication-title: IEEE Trans. Cybern. doi: 10.1109/TCYB.2018.2871951 – volume: 128 start-page: 109555 year: 2021 ident: CR26 article-title: Optimal stealthy integrity attacks on remote state estimation: The maximum utilization of hHistorical data publication-title: Automatica doi: 10.1016/j.automatica.2021.109555 – volume: 63 start-page: 3242 issue: 5 year: 2016 end-page: 3251 ident: CR27 article-title: Two-channel false data injection attacks against output tracking control of networked systems publication-title: IEEE Trans. Ind. Electron. doi: 10.1109/TIE.2016.2535119 – ident: CR7 – volume: 52 start-page: 11539 issue: 11 year: 2022 end-page: 11548 ident: CR32 article-title: Kullback-Leibler divergence-based optimal stealthy sensor attack against networked linear quadratic Gaussian systems publication-title: IEEE Trans. Cybern. doi: 10.1109/TCYB.2021.3068220 – volume: 52 start-page: 3947 issue: 6 year: 2022 end-page: 3956 ident: CR39 article-title: Stability analysis of switched nonlinear systems with multiple time-varying delays publication-title: IEEE Trans. Syst. Man Cybern. -Syst. doi: 10.1109/TSMC.2021.3080278 – volume: 546 start-page: 192 year: 2021 end-page: 205 ident: CR21 article-title: Detection of stealthy false data injection attacks against networked control systems via active data modification publication-title: Inf. Sci. doi: 10.1016/j.ins.2020.06.074 – volume: 68 start-page: 426 issue: 1 year: 2021 ident: 2120_CR6 publication-title: IEEE Trans. Circuits Syst. II, Exp. Briefs – volume: 53 start-page: 23 issue: 1 year: 2011 ident: 2120_CR8 publication-title: Survival doi: 10.1080/00396338.2011.555586 – volume: 50 start-page: 729 issue: 2 year: 2020 ident: 2120_CR19 publication-title: IEEE Trans. Cybern. doi: 10.1109/TCYB.2018.2871951 – volume: 63 start-page: 3242 issue: 5 year: 2016 ident: 2120_CR27 publication-title: IEEE Trans. Ind. Electron. doi: 10.1109/TIE.2016.2535119 – volume: 17 start-page: 2465 issue: 4 year: 2021 ident: 2120_CR20 publication-title: IEEE Trans. Ind. Informat. doi: 10.1109/TII.2020.2999571 – volume: 120 start-page: 109 year: 2020 ident: 2120_CR31 publication-title: Automatica doi: 10.1016/j.automatica.2020.109117 – volume: 34 start-page: 1364 issue: 4 year: 2021 ident: 2120_CR1 publication-title: Journal of Systems Science and Complexity doi: 10.1007/s11424-021-0160-y – ident: 2120_CR7 doi: 10.1109/TIE.2022.3217585 – volume: 22 start-page: 1396 issue: 4 year: 2014 ident: 2120_CR11 publication-title: IEEE Trans. Control Syst. Technol. doi: 10.1109/TCST.2013.2280899 – volume: 53 start-page: 3577 issue: 16 year: 2022 ident: 2120_CR14 publication-title: Int. J. Syst. Sci. doi: 10.1080/00207721.2022.2143735 – volume: 5 start-page: 46 issue: 4 year: 2010 ident: 2120_CR10 publication-title: Eng. Technol. doi: 10.1049/et.2010.0410 – volume: 4 start-page: 4 issue: 1 year: 2017 ident: 2120_CR22 publication-title: IEEE Trans. Control Network Syst. doi: 10.1109/TCNS.2016.2570003 – volume: 63 start-page: 150207 issue: 5 year: 2020 ident: 2120_CR13 publication-title: Sci. China Inf. Sci. doi: 10.1007/s11432-019-2691-4 – volume: 546 start-page: 192 year: 2021 ident: 2120_CR21 publication-title: Inf. Sci. doi: 10.1016/j.ins.2020.06.074 – volume: 13 start-page: 411 issue: 2 year: 2017 ident: 2120_CR17 publication-title: IEEE Trans. Ind. Informat. doi: 10.1109/TII.2016.2614396 – volume: 6 start-page: 48 issue: 1 year: 2019 ident: 2120_CR25 publication-title: IEEE Trans. Control Netw. Syst. doi: 10.1109/TCNS.2018.2793664 – volume: 101 start-page: 225 year: 2020 ident: 2120_CR35 publication-title: ISA Trans. doi: 10.1016/j.isatra.2020.02.003 – volume: 30 start-page: 2906 issue: 7 year: 2020 ident: 2120_CR5 publication-title: Int. J. Robust Nonlinear Control doi: 10.1002/rnc.4928 – volume: 5 start-page: 1157 issue: 3 year: 2018 ident: 2120_CR29 publication-title: IEEE Trans. Control Netw. Syst. doi: 10.1109/TCNS.2017.2690399 – volume: 52 start-page: 3947 issue: 6 year: 2022 ident: 2120_CR39 publication-title: IEEE Trans. Syst. Man Cybern. -Syst. doi: 10.1109/TSMC.2021.3080278 – volume: 22 start-page: 3824 issue: 6 year: 2021 ident: 2120_CR4 publication-title: IEEE Trans. Intell. Transp. Syst. doi: 10.1109/TITS.2021.3053406 – volume: 8 start-page: 2617 issue: 6 year: 2017 ident: 2120_CR37 publication-title: IEEE Trans. Smart Grid doi: 10.1109/TSG.2016.2532347 – volume: 69 start-page: 4949 issue: 12 year: 2022 ident: 2120_CR38 publication-title: IEEE Trans. Circuits Syst. II, Exp. Briefs – volume: 25 start-page: 2726 issue: 4 year: 2010 ident: 2120_CR9 publication-title: IEEE Trans. Power Del. doi: 10.1109/TPWRD.2010.2050340 – volume: 63 start-page: 1418 issue: 5 year: 2018 ident: 2120_CR28 publication-title: IEEE Trans. Autom. Control doi: 10.1109/TAC.2017.2741778 – volume: 11 start-page: 1 issue: 5 year: 2015 ident: 2120_CR34 publication-title: IEEE Trans. Ind. Informat. doi: 10.1109/TII.2015.2475695 – volume: 24 start-page: 843 issue: 3 year: 2016 ident: 2120_CR12 publication-title: IEEE Trans. Control Syst. Technol. doi: 10.1109/TCST.2015.2462741 – volume: 128 start-page: 109555 year: 2021 ident: 2120_CR26 publication-title: Automatica doi: 10.1016/j.automatica.2021.109555 – volume: 65 start-page: 3919 issue: 9 year: 2020 ident: 2120_CR18 publication-title: IEEE Trans. Autom. Control doi: 10.1109/TAC.2020.2981915 – volume: 69 start-page: 149 issue: 1 year: 2022 ident: 2120_CR36 publication-title: IEEE Trans. Circuits Syst. II, Exp. Briefs – volume: 508 start-page: 92 year: 2020 ident: 2120_CR33 publication-title: Inf. Sci. doi: 10.1016/j.ins.2019.08.052 – volume: 89 start-page: 117 year: 2018 ident: 2120_CR23 publication-title: Automatica doi: 10.1016/j.automatica.2017.11.018 – volume: 7 start-page: 1 issue: 1 year: 2020 ident: 2120_CR3 publication-title: IEEE/CAA J. Autom. Sin. doi: 10.1109/JAS.2019.1911861 – ident: 2120_CR16 doi: 10.1109/TCYB.2023.3255583 – volume: 50 start-page: 3963 issue: 9 year: 2020 ident: 2120_CR30 publication-title: IEEE Trans. Cybern. doi: 10.1109/TCYB.2019.2912622 – volume: 52 start-page: 11539 issue: 11 year: 2022 ident: 2120_CR32 publication-title: IEEE Trans. Cybern. doi: 10.1109/TCYB.2021.3068220 – volume: 481 start-page: 474 year: 2019 ident: 2120_CR24 publication-title: Inf. Sci. doi: 10.1016/j.ins.2019.01.001 – volume: 9 start-page: 2834 issue: 4 year: 2018 ident: 2120_CR2 publication-title: IEEE Trans. Smart Grid doi: 10.1109/TSG.2016.2620939 – volume: 65 start-page: 162201 year: 2022 ident: 2120_CR15 publication-title: Sci. China Inf. Sci. doi: 10.1007/s11432-020-3027-0 |
SSID | ssj0036908 |
Score | 2.4468465 |
Snippet | This paper mainly investigates the security problem of a networked control system based on a Kalman filter. A false data injection attack scheme is proposed to... |
SourceID | proquest crossref springer |
SourceType | Aggregation Database Enrichment Source Index Database Publisher |
StartPage | 1407 |
SubjectTerms | Closed loops Complex Systems Control Control systems Feedback control Kalman filters Mathematics Mathematics and Statistics Mathematics of Computing Network control Operations Research/Decision Theory Statistics Systems Theory |
Title | Analysis of Stealthy False Data Injection Attacks Against Networked Control Systems: Three Case Studies |
URI | https://link.springer.com/article/10.1007/s11424-022-2120-6 https://www.proquest.com/docview/2856413178 |
Volume | 36 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1NT8JAEJ0oXPBgFDWiSPbgSdME2u3HemsQRA2cIMFTs59EQ4qR-v-d7QeoUROPTds99G1n5mXfvAG41JS6RkrmGK6ZgylAOkwi51FcRVILxYtZBONJMJrRh7k_L_u415XavTqSzCP1ttnNNmU5Vn2O4RY5zy7UfUvdcRPP3LgKvx7SvaL_rcuQF7m0Osr8aYmvyWhbYX47FM1zzfAA9ssikcQFqoewo9Mm7H2yDsSr8cZvdd2Ehq0ZC8vlI1hURiNkZYjV6y4RDDLEfabJLc84uU9fcgFWSuIssz32JF7wZ6wTyaQQhWtF-oWEnZSO5jdkiqBr0sekR0rt4THMhoNpf-SU8xQc6fWCzFGer5HteUoFETIFZXtQaZdL7QvFNGUmFArxYT4PmTGBEFQz7keuDD0XWYn0TqCWrlJ9CkT0dBgYjAaBK2iX8oiZnsJgIY1LI6FpC7rVh01kaTZuZ14sk61NssUiQSwSi0UStOBq88pr4bTx18PtCq2k_OnWiRv5AebkXhi14LpCcHv718XO_vX0OTTsyPlCBNiGWvb2ri-wMMlEB-rx3dPjoJNvyA-kytsU |
linkProvider | Springer Nature |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1NT8JAEJ0oHsSDUdSIou7Bk6ZJabcf642gBBQ4QcKt2U-iIcVI_f_O0paqUROPTds99G1n5mXfvAG41pR6RkrmGK6ZgylAOkwi51FcxVILxfNZBKNx2J_Sx1kwK_q4V6XavTySXEfqqtnNNmU5Vn2O4RY5zzbsYC0QWx3X1OuU4ddHupf3v7kMeZFHy6PMn5b4moyqCvPboeg61_QOYL8oEkknR_UQtnTagL1P1oF4Ndr4ra4aULc1Y265fATz0miELA2xet0FgkF6uM80uecZJ4P0ZS3ASkkny2yPPenM-TPWiWSci8K1It1cwk4KR_M7MkHQNeli0iOF9vAYpr2HSbfvFPMUHOm3w8xRfqCR7flKhTEyBWV7UKnLpQ6EYpoyEwmF-LCAR8yYUAiqGQ9iT0a-h6xE-idQS5epPgUi2joKDUaD0BPUpTxmpq0wWEjj0Vho2gS3_LCJLMzG7cyLRVLZJFssEsQisVgkYRNuNq-85k4bfz3cKtFKip9ulXhxEGJObkdxE25LBKvbvy529q-nr2C3PxkNk-Fg_HQOdTt-PhcEtqCWvb3rCyxSMnG53pQfPMfccw |
linkToPdf | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1JS8NAFH64gNSDuGJd5-BJCW2TyTLeQmtxa_HQQm9h1qKUKDb-f990EqOigseQyRzyvXkL873vAZxpSn0jJfMM18zDECA9JrHmUVwlUgvF3SyCwTC6HtPbSTgp55zOK7Z7dSXpehqsSlNetF6UadWNb7ZBy7NMdHS9WP8swyp6444167GfVq44wNLP9cK1GdZIPq2uNX_a4mtgqrPNbxeki7jT34SNMmEkqUN4C5Z0vg3rn2QE8Wnwob0634aGzR-d_PIOTCvREfJsiOXuzhAY0keb06THC05u8qcFGSsnaVHYfnuSTvkj5oxk6AjiWpGuo7OTUt38kozQADTpYgAkJQ9xF8b9q1H32itnK3gy6ESFp4JQY-UXKBUlWDUo249K21zqUCimKTOxUIgVC3nMjImEoJrxMPFlHPhYochgD1by51zvAxEdHUcGPUPkC9qmPGGmo9BxSOPTRGjahHb1YzNZCo_b-RezrJZMtlhkiEVmsciiJpx_fPLiVDf-WnxUoZWVB3Ce-UkYWYuIkyZcVAjWr3_d7OBfq09h7aHXz-5vhneH0LCT6B038AhWitc3fYz5SiFOFjb5Dh_n4K8 |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Analysis+of+Stealthy+False+Data+Injection+Attacks+Against+Networked+Control+Systems%3A+Three+Case+Studies&rft.jtitle=Journal+of+systems+science+and+complexity&rft.au=Pang+Zhonghua&rft.au=Fu%2C+Yuan&rft.au=Guo+Haibin&rft.au=Sun%2C+Jian&rft.date=2023-08-01&rft.pub=Springer+Nature+B.V&rft.issn=1009-6124&rft.eissn=1559-7067&rft.volume=36&rft.issue=4&rft.spage=1407&rft.epage=1422&rft_id=info:doi/10.1007%2Fs11424-022-2120-6&rft.externalDBID=NO_FULL_TEXT |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1009-6124&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1009-6124&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1009-6124&client=summon |