Next Article in Journal
Min–Max Optimal Control of Robot Manipulators Affected by Sensor Faults
Previous Article in Journal
Decoupling Transmission and Transduction for Improved Durability of Highly Stretchable, Soft Strain Sensing: Applications in Human Health Monitoring
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Multiplicative Attacks with Essential Stealthiness in Sensor and Actuator Loops against Cyber-Physical Systems

1
Engineering Research Center of Metallurgical Automation and Measurement Technology, Ministry of Education, Wuhan University of Science and Technology, Wuhan 430081, China
2
School of Information Science and Engineering, Wuhan University of Science and Technology, Wuhan 430081, China
3
Science and Technology on Space Intelligent Control Laboratory, Bei**g Institute of Control Engineering, Bei**g 100190, China
*
Author to whom correspondence should be addressed.
Sensors 2023, 23(4), 1957; https://doi.org/10.3390/s23041957
Submission received: 31 December 2022 / Revised: 24 January 2023 / Accepted: 6 February 2023 / Published: 9 February 2023
(This article belongs to the Topic Cyber-Physical Security for IoT Systems)

Abstract

:
Stealthy attacks in sensor and actuator loops are the research priorities in the security of cyber-physical systems. Existing attacks define the stealthiness conditions against the Chi-square or Kullback-Leibler divergence detectors and parameterize the attack model based on additive signals. Such conditions ignore the potential anomalies of the vulnerable outputs in the control layer, and the attack sequences need to be generated online, increasing the hardware and software costs. This paper investigates a type of multiplicative attack with essential stealthiness where the employed model is a novel form. The advantage is that the parameters can be designed in a constant form without having to be generated online. An essential stealthiness condition is proposed for the first time and complements the existing ones. Two sufficient conditions for the existence of constant attack matrices are given in the form of theorems, where two methods for decoupling the unknown variables are particularly considered. A quadruple-tank process, an experimental platform for attack and defense, is developed to verify the theoretical results. The experiments indicate that the proposed attack strategy can fulfill both the attack performance and stealthiness conditions.

1. Introduction

As the core and driving force of information technology in the past four decades, computers, communication, and control have caused a huge change in human social life. In this context, the concept of cyber-physical systems (CPSs) is proposed and widely valued. The CPSs involve most of the important industries that affect people’s livelihoods, making it important to study their key technologies [1].
The high integration of computing, physical plants, and communication networks increases the flexibility, reliability, and productivity of CPSs. However, it also extends the information security issues from the network layer to the computational and physical layers, resulting in serious safety problems [2]. Since the Stuxnet event in 2010 [3], more and more security incidents involving CPSs have appeared in the limelight. For example, the Flame virus suffered by the oil industry in the Middle East in 2012 [4], the advanced persistent threat cyber-attacks on a German steel company in 2014 [5], the Triton attacks on Schneider Triconex security instruments in 2017 [6], and the Watering Hole attacks on a municipal water treatment company in America in 2021 [7] can be easily listed. To address the security threats to CPSs, researchers focus on both attack and defense strategies. These studies are categorized into four types: attack methods [8,9], prevention of attacks [10], resilient control [11,12], and detection of attacks [13,14].
To cope with the potential stealth attacks in cyber-physical multi-agent systems, Nozari et al. [10] investigate the differential privacy issue of average consistency. The authors suggest that the differential privacy of communication information and the average consistency of multi-agents is a trade-off between them. To achieve differential privacy and thus prevent potential attacks, the agent states cannot be weakly converged to the exact average of their initial values. Abhinav et al. [11] studied a trust-based cooperative control strategy to counteract dual-channel false data injection (FDI) attacks in direct current (DC) microgrids. Sun et al. [12] suggest that a higher level of resilience can be obtained by improving the event-trigger mechanism to cope with denial-of-service attacks in networked control systems. The above studies consider the prevention and response to a single type of attack. For multi-class ones, such as stealthy FDI attacks and integrity and availability attacks, refs. [13] and [14] are two typical examples. Zhang et al. and Liu et al. propose a summation-based and a mode division-based detector, respectively. These methods are proven to be effective in the detection of stealthy attacks including, Stuxnet-like attacks.
In terms of attack strategies, an attacker attempts to deviate the actual output of the CPS from the defender’s desired reference trajectory. The extent of the deviation is termed the attack performance. The greater the deviation, the better the attack performance. However, the attacker cannot compromise a physical plant without recklessness. If a stealthiness condition cannot be satisfied, the attack will be detected, leading to its failure. Therefore, stealthiness is a necessary condition, and attack performance is the attacker’s goal. Existing work focuses on FDI attacks with particular stealth performance metrics, such as stealthy attacks [15,16,17], covert attacks [18,19], zero-dynamics attacks [20], optimal stealthy attacks [21], perfect stealthy attacks [22], and unpredictable attacks [23]. These attack strategies have a common design idea, that is, maximizing the attack impacts of the physical plant while ensuring the attacks cannot be detected by some specific detectors.
The Chi-square ( χ 2 ) detector is usually the object to be targeted when designing a stealthy FDI attack strategy. Mo et al. [24] propose a stealthy attack method in a linear CPS and analyze the relationship between the stability of the state matrix and the attackability of attack sequences. The authors also quantify the effects caused by the attacks in terms of the variation in the estimation error. In ref. [13], Ye et al. introduce two variable parameters ( ρ 1 , ρ 2 ) for the attack strategy in ref. [24] that can adjust the attack strength. After that, the authors further propose a self-generated approach in [8] for such kinds of attacks in refs. [13] and [24]. Since the χ 2 detector only determines the anomalies of the state estimation residuals generated at the current detection instant, Mo et al. [25] present a method to construct a detector by measuring the difference of residuals in terms of Kullback-Leibler divergence (KLD). Li et al. [26] investigate a stealthy attack strategy acting in the actuator loop by solving an optimization problem to maximize the difference in residuals’ KLD before and after the attacks, under the constraint that the detection variable is lower than its threshold. Guo et al. [16] study a worst-case stealthy attack strategy in a remote state estimation scenario, where the KLD is chosen as the stealthiness metric. The authors present an innovation-based linear stealth attack, where the worst-case attack sequences are proved to obey a Gaussian distribution with a zero mean. In addition, the trade-off between the stealthiness of the attack and the impact on the system performance is discussed in [16]. Shang et al. [27] also investigate the worst-case stealthy attacks. The authors indicate the reasons for the method given in ref. [16] being a suboptimal solution and give an algorithm to obtain the optimal attack sequences without solving a semidefinite programming problem. Li et al. [21] present a stealthy attack strategy with an arbitrary mean Gaussian noise form, whose attack sequences are also obtained by solving an optimization problem.
All the above stealthy attack strategies against the KLD detector are designed in the context of remote state estimation scenarios for autonomous systems. In terms of attack strategies for generally controlled CPSs, Bai et al. [28] study an attack method acting in the actuator loop against the KLD detector with strict-stealthiness as well as a defined ε -stealthiness. Further, the solutions of optimal and suboptimal attack sequences are given for right-reversible and non-right-reversible systems, respectively. Furthermore, for the controlled CPSs, Ren et al. [9] investigate the stealthy KLD attacks operating in the sensor loop. The authors analyze the attack performance when the attack sequences satisfy the strict- and ε -stealthiness, as well as give the optimal solutions for the attack strategies.
It can be seen from the above that the existing attack strategies focus on the statistical properties of the state estimation residual z ( k ) , and the attack sequences are in the form of time-varying additive signals generated online, whether for the χ 2 or the KLD stealthiness. The residual z ( k ) can be expressed as z ( k ) = y ( k ) C x ^ ( k ) , where y ( k ) denotes the output of the physical plant received by the control layer, x ^ ( k ) stands for the estimation of the plant state x ( k ) , and C refers to the output matrix of the physical plant. In practice, however, the process data supervision of CPSs is mainly dependent on the host PC’s configuration screen in the control layer. The unbiased statistical properties of z ( k ) cannot enable the anomaly-free display of the compromised sensor data y ( k ) . See, for example, refs. [16,17]. This fact implies that the anomalies occurring in y ( k ) can lead to an immediate exposure of the so-called stealthy attacks. Therefore, making the compromised y ( k ) remain stealthy should be a necessary condition for all of the stealthy attacks, and it is obvious that the existing results ignore this critical issue. Moreover, the attack strategies with forms y ( k ) = y p ( k ) + y a ( k ) and u p ( k ) = u ( k ) + u a ( k ) depend on specific hardware and software environments to implement the real-time computation and data injection of the attack sequences in the sensor and actuator loops. These will undoubtedly increase the attack costs and the exposure risks. In the two formulas above, y ( k ) and u ( k ) denote the physical layer output received by the control layer and the control input to be sent to the physical layer, y p ( k ) and u p ( k ) represent the actual output and the received control input of the physical layer, respectively. The subscript “p” denotes “plant”. y a ( k ) and u a ( k ) refer to the attack signals injected by the attacker in the sensor and actuator loops, respectively, where the subscript “a” stands for “attack”.
Motivated by the above two concerns, this paper investigates a novel class of stealthy attack strategies with multiplicative constant attack matrix parameters. Two sufficient conditions for the existence of the attack matrices are given in the form of theorems. One of them is dominated by the stealthiness condition, and the other takes into account both attack performance and stealthiness. The contributions of this paper are as follows.
(1)
A novel attack model with multiplicative attack matrices is proposed, which models the cyber-attacks as changes in the parameters of the generalized system consisting of physical and network layers instead of tampering with process data as given in existing literature.
(2)
The proposed attack matrices can be designed in a constant form, which can avoid the online operation of the attack parameters, thus reducing the costs and exposure risks of the attacks.
(3)
A definition of essential stealthiness is presented as a complement for the existing χ 2 and KLD stealthiness conditions. Two sufficient conditions are given for the existence of constant attack matrices satisfying the essential stealthiness.
(4)
An attack and defense experimental platform is developed for CPSs, in which the physical plant is chosen as the classic quadruple-tank process. The platform can provide some experimental guidelines for related research in the field of CPSs security. The evaluations of the suggested strategies are performed in the form of hardware-in-the-loop experiments instead of simulations only, as in the existing work.
The subsequent sections of this paper are organized as follows. Section 2 introduces the basic model information of the CPS under consideration. Section 3 presents an attack model, gives a definition of essential stealthiness, and then analyzes the basic properties of the attack matrices. In Section 4, the methods for designing attack matrices are given in two theorems as the main results of this paper. In Section 5, the CPS attack and defense experimental platform are detailed, and the experimental results are analyzed, followed by conclusions and future work in Section 6.

2. Problem Formulation and Preliminaries

Consider the typical CPS illustrated in Figure 1, which consists of three parts: the control layer, the network layer, and the physical layer. The controlled plant lies in the physical layer, and its mathematical model can be represented as a discrete-time linear time-invariant (LTI) stochastic system:
x p ( k + 1 ) = A x p ( k ) + B u p ( k ) + w x ( k ) , y p ( k ) = C x p ( k ) + w y ( k ) ,
where x p ( k ) n x , u p ( k ) n u , and y p ( k ) n y denote the system state, control input, and measurement output, respectively. The subscript ‘p’ denotes ‘plant’. A , B , and C are known model parameters, w x ( k ) and w y ( k ) are process and measurement noise, respectively.
Assume that the inherent controller of the CPS is employed in the control layer and has a form of dynamic output feedback:
x c ( k + 1 ) = A c x c ( k ) + B c y e ( k ) + E c y r 0 , u ( k ) = C c x c ( k ) + D c y e ( k ) + F c y r 0 ,
where x c ( k ) is the controller’s state, A c ,   B c ,   ... ,   F c are the known controller parameters, where the subscript ‘c’ means ‘controller’. y e ( k ) : = y ( k ) y r ( k ) denotes the output error in the control layer, y r ( k ) n y and y r 0 denote the output reference trajectory and the desired output stabilized value, respectively.
The output reference y r ( k ) is given by
x r ( k + 1 ) = A r x r ( k ) + B r x r 0 , y r ( k ) = C r x r ( k ) .
y ( k ) in y e ( k ) and u ( k ) in Equation (2) denote the physical layer output received in the control layer and the control input that is to be sent to the physical layer, respectively; see Figure 1. Note that the studied CPS is a tracking control system, and that in practice the desired output reference is not always at the modeling equilibrium point of the physical plant. Without loss of generality, we assume that the desired output stabilized value satisfies y r 0 0 .
Attacks on CPSs may either occur in the physical layer or in the network layer. See, for example, refs. [1] and [29]. Since the attack sequences acting in the former can always be equivalently represented by the attack signals in the latter, Figure 1 simply gives the general form of the attack acting in the network layer. In particular, equations u ( k ) = u p ( k ) and y ( k ) = y p ( k ) hold under the assumption of an ideal communication network when the CPS is not under attack [20].

3. Modeling the Attacks

The attacker attempts to drive the state of the actual physical plant into the insecure regions by tampering with y p ( k ) and u ( k ) which are exposed to the communication network while satisfying the predefined stealthiness conditions. In this respect, existing stealthy attack strategies are mostly based on the two-channel FDI attack model [30] to implement the attack parameters design:
  u p ( k ) = u ( k ) + u a ( k ) , y ( k ) = y p ( k ) + y a ( k ) ,
where u a ( k ) and y a ( k ) are the attack sequences to be determined.
Notice that the attack sequences are usually time-varying to satisfy the stealthiness condition. This implies that the attack strategies with the form of Equation (4) in practice need to rely on some hardware and software settings to enable the real-time computation and data injection of the attack parameters. The necessary computing environments and the frequent interaction of network data increase the costs of attacks and their exposure risks. To this end, a new attack model is considered below.
According to the assumption of the desired output steady state y r 0 0 in the previous section, the physical layer process data satisfying u p ( k ) 0 and y p ( k ) 0 . Then a novel attack model can be formulated as
u p ( k ) = A a ( k )   u ( k ) , y ( k ) = A s ( k )   y p ( k ) ,
where A a ( k ) and A s ( k ) are the multiplicative attack matrices in the actuator and sensor loops, respectively.
Compared with the FDI model (4), the advantage of Equation (5) is that A a ( k ) and A s ( k ) can be designed as constant matrices A a and A s to avoid the online computational requirements of the existing attack parameters. At the same time, the numerical degrees of freedom for the two matrices can satisfy the stealthy attack design. The attack strategies in the form of A a and A s will be detailed in the next section. Before that, we begin with the analysis of the basic properties of the attack matrices in Equation (5).
Definition 1.
(Essential stealthiness of attacks.) For a CPS consisting of Equations (1)–(3) and the compromised communication network, an attack is said to satisfy the essential stealthiness with parameter γ > 0 , if its attack sequences make
y e ( k ) 2 < γ 2 ω ( k ) 2
holds, where y e ( k ) refers to the output tracking error shown in the control layer, and ω ( k ) denotes the augmented disturbance in the closed-loop CPS affected by the attack sequences.
Under Definition 1, the attack matrices of a stealth attack strategy with the form of Equation (5) should fulfill the following proposition.
Proposition 1.
(Non-singular properties of attack matrices.) For a CPS consisting of Equations (1)–(3) and the compromised network, a necessary condition for any attack strategy represented by Equation (5) to satisfy the essential stealthiness is that the attack matrices A a ( k ) and A s ( k ) are full rank.
Proof of Proposition 1.
Consider the contrapositive of Proposition 1. When A a ( k ) and A s ( k ) have at least one set of dissatisfied ranks, the output controllability of the generalized system consisting of Equations (1) and (5) is not guaranteed. Then, for any desired trajectory y r ( k ) and generalized system output y ( k ) , we have the tracking error y e ( k ) 0 . At this point, the considered attack strategy does not satisfy the essential stealthiness. The proposition is proved. □
Remark 1.
The essential stealthiness condition given in Definition 1 is a complement to the existing ones defined based on the χ 2 and the KLD detectors. The declared Equation (6) is founded on the fact that the operating data in the control layer should not be significantly abnormal when any attack is performed on the CPS; otherwise, it can be intuitively detected by the defender, making it difficult to achieve the intended attack purpose. The condition above is an essential requirement for a successful attack strategy and is therefore referred to as the essential stealthiness.
Attack performance refers to the extent of deviation that the actual output of the physical plant causes from the defender’s desired reference trajectory. It can be defined as κ : = y ¯ p y r 0 , where y ¯ p denotes the steady-state value of y p ( k ) in Equation (1). In particular, if the attack matrices are constant, κ can be expressed as κ = A s 1 y ¯ e + ( A s 1 I ) y r 0 , where y ¯ e denotes the steady-state value of y e ( k ) in Equation (6). For attacks with essential stealthiness, y ¯ e has a small value, and thus the attack performance κ is mainly determined by the attack matrix A s based on the assumption of y r 0 0 in Equations (2) and (3).

4. Attack Matrices Design for Stealthy Attacks

Consider the attack model Equation (5) with its constant matrices A a and A s . This section gives two sufficient conditions for the existence of these matrices satisfying the essential stealthiness in a theoretical form. In particular, attackers aim to design the two matrices such that the compromised CPS fulfills both of the following two conditions. First, the physical plant state x p ( k ) deviates from its operation and causes the actual tracking error of the physical layer satisfying κ = y ¯ p y r 0 0 . Second, the attack sequences meet the essential stealthiness with parameter γ > 0 , i.e., Equation (6) holds.
For condition one, the attacker considers an auxiliary perturbation signal d on x p ( k ) . It can be represented as
d + x ^ p ( 0 ) = 0 ,
where x ^ p ( 0 ) denotes the attacker’s estimation of x p ( k ) before the attacks are initiated, i.e., in the instant k = 0 . For the sake of exposition, we define the instant k ( ,   0 ] , similar to ref. [25], as the regular operation stage of the CPS and assume that the intended attack strategy is launched from the instant k = 1 .
Define x ( k ) : = x p ( k ) + d and rewrite Equation (1) as
x ( k + 1 ) = A x ( k ) + B u p ( k ) + A d d + w x ( k ) , y p ( k ) = C x ( k ) C d + w y ( k ) ,
where A d : = I A . The physical plant model (from u p ( k ) to y p ( k ) ) in the attackers’ perspective is obtained.
Remark 2.
Notice that the closed-loop CPS without attack is stable and satisfies a definite static-error-free tracking control performance, i.e., y ( 0 ) = y p ( 0 ) y r 0 holds. Hence, we have E x ( 0 ) = 0 when Equation (7) holds. It means that the auxiliary perturbation d gives Equation (8) a zero initial state in the statistical sense. This condition is easily neglected in the subsequent derivations.
To satisfy the stealthiness conditions, the attacker introduces the following control layer output reference model
x r ( k + 1 ) = A r x r ( k ) + B r x r 0 , y r ( k ) = C r x r ( k ) .
This model has the same structure as the inherent output reference Equation (3) of the CPS, but A r , B r , and C r are determined by the attacker with x r ( 0 ) = 0 . x r 0 needs to satisfy C r ( I A r ) 1 B r x r 0 = y r 0 to ensure that the steady output of Equation (9) is equal to y r 0 . Here, y r 0 0 denotes the desired output of the CPS before the instant of attack initiation (i.e., k = 0 ), and y r 0 is constant around the attacks.
The following lemmas are introduced before giving our theorems. In the derivations of theoretical results based on the Lyapunov stability theory, the coupling of pending variables will lead to the corresponding matrices without the form of linear matrix inequalities. The following Lemma 1 is an important result of eliminating coupling terms, which will be used in the proof of Theorem 1.
Lemma 1.
[31] For matrices T , S , M , N with appropriate dimensions, and a non-zero scalar β , the inequality T + S M + M S < 0 holds if the following inequality is true.
T β M + N S β N β N < 0 .
The Schur’s lemma can combine matrix polynomials into a global matrix for convenience in subsequent derivation, but this process will introduce matrix inverse terms. The following Lemma 2 is used to perform the reduction in the nonlinear matrix inverse terms, after the main matrix is left and right multiplied a full rank square matrix.
Lemma 2.
[32] For matrices X , Y , and J > 0 with appropriate dimensions, the following inequality is true.
X Y + Y X X J X + Y J 1 Y .
Similar to Lemma 1, Lemma 3 below also deals with the coupling of the pending terms. Lemma 1 is more concise. However, Lemma 3 is a necessary and sufficient condition. It introduces an extra matrix F that can increase the degrees of freedom in solving linear matrix inequalities under some circumstances. Lemma 3 will be used in the subsequent derivation of Theorem 2.
Lemma 3.
[33] For matrices F , S , M , N , T with appropriate dimensions, and a non-zero scalar β , the following two inequalities are equivalent.
T + F S + S F β M β F + N S β N β N < 0 ,
T + S M + M S < 0 .
Theorem 1.
For the CPS given by Equations (1)–(3), if there exist matrices U , V , G , G i , P i = P i > 0 , i = 1 ,   ,   4 , and a scalar β > 0 , such that
T 1 T 2 T 3 < 0 ,
holds, the attack determined by A a ,   A s ,   d ,   γ satisfies the essential stealthiness with parameter γ , i.e., the Equation (6) holds.
Remark 3.
In the literature related to stealthy attacks, it is typically assumed that the attackers have the complete model information of the CPS. See, for example, refs. [9,16,17]. For the attacker, a dynamic model with the closed-loop CPS information along with the attack parameters is employed in Theorem 1 (see Equation (A5) in Appendix A). This enables the attack matrices design can be turned into an H control problem. An unstable physical plant state can easily lead to significant anomalies in the sensor measurements and causes the attack to be detected by the defender. The attacker has to take into account that the physical layer state should be driven to a new steady state, regardless of whether this steady state is technologically safe.
Remark 4.
When the augmented system is stable from the attacker’s perspective, one has A s y p ( k ) y r 0 , i.e., a new desired output y r 0 = A s 1 y r 0 holds. Therefore, the physical sense of the sensor attack matrix A s can be reinterpreted. The injected A s can indirectly tamper with the desired steady output of the physical plant (from y r 0 to y r 0 ), making it possible for the attacker to manipulate the actual output of the physical system by simulating the sensor dead zone faults.
In practice, attackers usually consider driving the output of the actual physical plant to a particular level while satisfying the essential stealthiness. The following theorem gives an implementation of this practical attack strategy.
Theorem 2.
Consider a CPS given by Equations (1)–(3). For a given attack target y r 0 0 for physical plant output y p ( k ) and a stealthiness parameter γ ˜ = y e th ω ( k ) 1 with k > 0 , where y e th = sup ( y e ( k ) ) , k , 0 , if there exist matrices F , U ˜ , V ˜ , G ˜ i , P ˜ i = P ˜ i > 0 , i = 1 , , 4 , and a scalar β ˜ > 0 , such that
T ˜ 1 T ˜ 2 T ˜ 3 < 0 ,
holds, the attack determined by A a ,   A s ,   d ,   γ ˜ satisfies the essential stealthiness with parameter γ ˜ , where T ˜ 1 , T ˜ 2 , and T ˜ 3 are denoted as
T ˜ 1 = T 1 + F S + S F ,
T ˜ 2 = T 2 β ˜ F ,
T ˜ 3 = β ˜   diag { U ˜ + U ˜ , U ˜ + U ˜ } ,
T 1 and T 2 have the same structure as T 1 and T 2 in Equation (14), respectively, except for the different symbolic representations of V ˜ , G ˜ i , and P ˜ i . A a and A s can be obtained by A a = U ˜ 1 V ˜ and A s = diag y r 0 ( 1 ) / y r 0 ( 1 ) ,   , y r 0 ( n y ) / y r 0 ( n y ) , respectively.
Proof of Theorem 2.
The proof can be followed by Lemma 3 and Theorem 1, so it is omitted here. □
Remark 5.
Different from Theorem 1, here the sensor attack matrix A s is a predefined diagonal matrix based on the attack target y r 0 . Since the full-rank square matrix satisfying y r 0 = A s y r 0 is not unique, the predefined diagonal form reduces the degree of freedom for the results. Therefore, in the derivation of the decoupling terms, Theorem 2 considers the inequalities given by Lemma 3. The conservation of the result is reduced by introducing the new pending matrix F .

5. Hardware Experiments and Results Analysis

In this section, a CPS attack and defense experiment platform is developed by employing the classic quadruple-tank process as the physical plant. Furthermore, the effectiveness of the proposed attack strategy is verified and analyzed in a hardware-in-the-loop (HIL) experiment.

5.1. Configuration of the CPS Experiment Platform

The developed experimental platform is shown in Figure 2. The plant consists of four components: a quadruple-tank process (QTP) [34], a defender’s industrial PC (IPC) equipped with a data acquisition board, an attacker’s PC, and the private Ethernet communication network.
The QTP is a representative type of coupled system in the process industry, where the controlled outputs are the liquid levels of the two lower tanks ( h 1 and h 2 ), and the inputs are the control voltages acting on the two pump drive units ( v 1 and v 2 ). The modeling method of the QTP can be referred to in refs. [14,34], and the model parameters of our experimental platform are
A = 0 . 9918 0 0 . 0036 0 0 0 . 9918 0 0 . 0038 0 0 0 . 9963 0 0 0 0 0 . 9961 ,   B = 0.0354 0 0 0.0374 0 0.0115 0.0122 0 ,   C = 1 0 0 0 0 1 0 0 ,
where the sampling period is T s = 0.1   s , and the equilibrium point is selected as h ¯ 1 = 19.2   cm , h ¯ 2 = 19.5   cm , h ¯ 3 = 11.2   cm , h ¯ 4 = 10.1   cm , v ¯ 1 = 6.1   V , v ¯ 2 = 6.3   V .
As the hardware component of the control layer in CPS, the defender’s IPC is connected to the QTP through a data acquisition board and a wiring terminal board. The detailed hardware configuration of the platform is given in Table 1 for readers to replicate. Specifically, the controlled plant is composed of four cylindrical tanks in acrylic and six hoses in silicone. The two pumps and their drivers in Table 1 are the actuator part of the physical plant. They change the water flow in the hose in response to the received control signal. Two gas pressure sensors with model number HEYO-24V916PWM are chosen for real-time liquid level measurement. The readers can easily see such sensors in a blood pressure meter. The data acquisition board and the wiring terminal board are used together to transfer the collected liquid level signals to Simulink in real-time, while the latter’s control signals are processed by digital-to-analog conversion and then the control voltage can be output to the pump drivers.
The software components are based on the Real-Time Windows Target environment of the Matlab/Simulink to realize the HIL control of the QTP, as shown in Figure 3. The parameters of the employed dynamic output feedback controller (2) are
A c = 0.4701 0.1972 0.2548 0.2608 0.2046 0.3359 0.3612 0.3587 0.0736 0.2557 0.3799 0.1067 0.1093 0.3661 0.1772 0.9371 , B c = 0.0867 0.0240 0.1465 0.0121 0.1462 0.0217 0.0416 0.0614 , C c = 0.3921 0.0333 0.1629 0.1501 0.1740 0.2754 0.0628 0.0092 , E c = 0.0295 0.2416 2.9535 0.6866 0.6632 0.1423 5.1465 0.7280 , D c = 0.6333 0.0003 0.0015 0.5508 , F c = 0.2442 0.2035 0.0082 0.1244 .
The desired steady state output in the control layer is preset to be y r 0 = 3 ,   5 (indicating the actual levels 22.2 cm and 24.5 cm) and remains constant during the attacks.
The attacker uses the user datagram protocol (UDP) to tamper with the process data of the CPS through the private communication network to achieve the attack goal. Another typical protocol is the transmission control protocol (TCP), and a platform based on this protocol can be found in ref. [15]. To reduce the hardware investment, the input and output signal acquisition part of the physical layer of the experimental platform is designed on the IPC, while its software is separated from the controller. This idea is consistent with the basic principle of CPS and is able to meet the demand for attack data injection.

5.2. Experimental Results and Analysis

The attacker sets the attack target value of y p ( k ) as y r 0 = 6 ,   8.3 , which corresponds to the actual levels 25.2 cm and 27.8 cm. The sensor attack matrix can be determined according to Theorem 2 as follows:
A s = 0 . 5 0 0 0 . 6 .
In addition, the stealthiness parameter is set to γ = 0 . 0162 , and the auxiliary perturbation d is:
d = 3 . 00 5 . 00 3 . 26 0 . 96 .
The parameters in the output reference (9) are set as follows:
A r = diag 0.25 ,   0.5 ,   B r = C r = I ,   x r 0 = 2.25 2.5 .
A feasible actuator attack matrix A a is obtained according to Theorem 2 as follows:
A a = 1 . 127 0 . 667 0 . 206 0 . 893 .
The total running time of the experiment is set to 1000   s . The attacker implements the attack strategy with parameters (19) and (22) from the 750th second to the end. The experiment results are shown in Figure 4, Figure 5 and Figure 6. To emphasize the attack process, these figures omit the first 500 s of irrelevant data.
Figure 4 shows the variation curves of the actual output y p ( k ) in the physical layer for the CPS. It can be seen that the physical system operates in a static-error-free tracking mode before the attack is launched. Once the attack starts, the two liquid levels deviate from the previous output reference 3 ,   5 , and then stabilize at the attacker’s targets 6 cm and 8.3 cm, respectively. Thus, the attack performance can be obtained as
κ = 6 ,   8 . 3 3 ,   5 = 4.46   .
The facts indicate that the attacker achieves the desired attack effect.
It should be noted that the actual outputs of the physical plant under attack have larger steady-state errors compared with those not under attack. This is because the injection of the sensor attack matrix A s indirectly tampers with the input gains B c and D c in CPS’s inherent controller Equation (2), resulting in a change in the dynamic relationship between the nominal output u ( k ) and input y e ( k ) in the control layer. Moreover, the actuator attack matrix A a can be considered as the tampering of the control gain for the physical plant in Equation (1), that is, B is altered to B A a . Almost all existing studies treat the attack process as the operating data being compromised. It is important to analyze both the attack and defense issues of CPSs from the perspective of model parameters under attack because the attack model essentially raises open questions.
In addition, Figure 5 and Figure 6 give the curves displayed in the control layer before and after the attacks. They present the output y ( k ) , tracking error y e ( k ) (the norm form of y e ( k ) ), and the implicit metrics of tracking control performance γ ω ( k ) in the defender’s perspective. It can be seen that although the actual output of the physical plant deviates from the predefined reference when the CPS is subjected to attacks (as shown in Figure 4), the received data in the control layer are not significantly abnormal and only present a phenomenon similar to a short-time exogenous perturbation. From the perspective of the process data received in the control layer, the Equation (6) holds after a limited tuning time (about 29.1   s ), which indicates that the designed attack matrices satisfy the desired stealthiness.

5.3. Discussions and Limitations

As we can see from the experiments in Section 5.2, the attacker can simply obtain the attack matrices in constant form by solving the linear matrix inequalities offline in a one-time process. Thanks to the constant form of the attack matrices, the attacker can, in practice, diagonalize the attack matrices and then implement the attack by adjusting the gain knobs of the sensors and actuators in the physical layer. This physical attack does not require any data injection in the communication network and is strictly stealthy for most anomaly detectors based on network traffic monitoring. In addition, the phenomenon, such as the short-time exogenous perturbation that appears in Figure 6, is essentially caused by the change in the potential desired trajectory due to the sensor attack matrix. This phenomenon can be weakened when the attacker tries to target the stepped desired trajectory as the attack goal.
It is important to note that the proposed attack strategies also have some limitations. On the one hand, we assume that the attacker has complete information on the CPS model. This assumption is common in the research of stealth attacks (e.g., in ref. [9,16,17]), but it is worth being concerned to weaken this assumption in order to further improve the practical value of the attack programs. This paper does not make a breakthrough in this regard. On the other hand, the two proposed theorems assume that the attacker tries to drive the output of the physical plant to an unsafe constant value. This linearized attack goal remains somewhat homogeneous due to the constraints of the stealthiness conditions. More flexible forms of attack targets should be considered in the future.

6. Conclusions and Future Work

In this paper, we studied a class of stealthy attack strategies in the form of multiplicative matrices against CPSs. Two theorems are given for designing attacks with constant matrices. The model of multiplicative attack matrices is proposed for the first time. The attack strategies based on this model transform the attack parameter designs into controller design issues, which may raise a new research trend in the field of stealthy attack strategies. Moreover, a CPS attack and defense experimental platform is developed. The platform has the characteristics of low cost and high openness, which promotes the practicalization of stealthy attack research.
In the future, our research will be extended to stealthy attack methods under the unknown model information. The emphasis should be on data-driven multiplicative stealthy attacks. In addition, the relationship between the proposed stealthiness conditions with the existing χ 2 and KLD ones should also be investigated.

Author Contributions

Conceptualization, J.C. and B.L.; methodology, J.C. and T.L.; software, J.C.; validation, B.L. and T.L.; formal analysis, B.L.; investigation, J.C.; resources, B.L.; data curation, J.C. and T.L.; writing—original draft preparation, J.C. and B.L.; writing—review and editing, T.L. and Y.H.; visualization, J.C.; supervision, B.L. and Y.H.; funding acquisition, B.L. and Y.H. All authors have read and agreed to the published version of the manuscript.

Funding

This research was partially funded by the Key Program of the National Natural Science Foundation of China under grant number 61333008 and the Key Discipline Construction Projects of Henan Provincial Education Department in the ninth batch (Detection Technology and Automation Device) under grant number JG2018-119.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Acknowledgments

The authors would like to thank the SIAS University for the help with the experimental platform.

Conflicts of Interest

The authors declare no conflict of interest.

Appendix A

In Equation (14), T 1 , T 2 , and T 3 are denoted as
T 1 = Ω 1 * * * * * * * * * * * 0 Ω 2 * * * * * * * * * * 0 0 Ω 3 * * * * * * * * * 0 0 0 Ω 4 * * * * * * * * 0 0 0 0 Ω 5 * * * * * * * 0 0 0 0 0 Ω 6 * * * * * * 0 0 0 0 0 0 Ω 7 * * * * * 0 0 0 0 0 0 0 Ω 8 * * * * T 11 T 12 T 13 0 T 15 T 16 T 17 0 Ω 9 * * * 0 T 22 T 23 0 0 T 26 0 0 0 Ω 10 * * T 31 T 32 T 33 T 34 T 35 T 36 T 37 T 38 0 0 Ω 11 * 0 0 0 T 44 0 T 46 0 0 0 0 0 Ω 12 ,
T 2 = 0 V C c V D c 0 0 V F c H r 0 0 β   Ξ 1 0 0 0 0 V C c V D c 0 0 V F c H r 0 0 0 0 β   Ξ 2 0 ,
T 3 = β   diag { U + U , U + U } ,
where Ω 1 = P 1 , Ω 2 = P 2 , Ω 3 = P 3 I , Ω 4 = P 4 , Ω 5 = γ 2 I , Ω 6 = γ 2 I , Ω 7 = γ 2 I , Ω 8 = γ 2 I , Ω 9 = G ¯ 1 , Ω 10 = G ¯ 2 , Ω 11 = G ¯ 3 , Ω 12 = G ¯ 4 , G ¯ i = G i + G i P i , i = 1 , , 4 . T 11 = G 1 A , T 12 = B V C c , T 13 = B V D c , T 15 = G 1 A d , T 16 = B V F c H r , T 17 = G 1 , T 22 = G 2 A c , T 23 = G 2 B c , T 26 = G 2 E c H r , T 31 = G C A , T 32 = C B V C c , T 33 = C B V D c , T 34 = G 3 C r A r , T 35 = G C A , T 36 = C B V F c H r G 3 C r B r , T 37 = G C , T 38 = G , T 44 = G 4 A r , T 46 = G 4 B r , G = G 3 A s , A a = U 1 V , Ξ 1 = G 1 B B U , Ξ 2 = G C B C B U , H r = C r ( I A r ) 1 B r , and
ω ( k ) = d x r 0 w x ( k ) w y ( k ) .
Proof of Theorem 1.
Consider the controller (2), the physical plant with the auxiliary perturbation d in (8), the attacker’s reference model in Equation (9), and the attack model in Equation (5). The closed-loop CPS is represented as
x ( k + 1 ) = A x ( k ) + B A a C c x c ( k ) + B A a D c y e ( k ) + B A a F c H r x r 0 + A d d + w x ( k ) , y e ( k ) = A s C x ( k ) C r x r ( k ) A s C d + A s w y ( k ) .
Define the augmented state X ( k ) as
X ( k ) : = x ( k ) x c ( k ) y e ( k ) x r ( k )
and define the augmented perturbation ω ( k ) according to Equation (A4).
Construct the following Lyapunov candidate function
V ( k ) = i = 1 4 V i ( k ) ,
where V 1 ( k ) = x ( k ) P 1 x ( k ) , V 2 ( k ) = x c ( k ) P 2 x c ( k ) , V 3 ( k ) = y e ( k ) P 3 y e ( k ) , V 4 ( k ) = x r ( k ) P 4 x r ( k ) . P 1 , P 2 , P 3 , and P 4 are positive definite symmetric matrices to be determined.
We begin with the stability of the closed-loop CPS (A5). Let ω ( k ) = 0 , the following equations hold
Δ V 1 ( k ) = V 1 ( k + 1 ) V 1 ( k ) = x ( k + 1 ) P 1 x ( k + 1 ) x ( k ) P 1 x ( k ) = [ Φ 1 X ( k ) ] P 1 Φ 1 X ( k ) x ( k ) P 1 x ( k ) = X ( k ) Φ 1 P 1 Φ 1 I 1 , 4 P 1 I 1 , 4 X ( k ) ,
Δ V 2 ( k ) = [ Φ 2 X ( k ) ] P 2 Φ 2 X ( k ) x c ( k ) P 2 x c ( k ) = X ( k ) Φ 2 P 2 Φ 2 I 2 , 4 P 2 I 2 , 4 X ( k ) ,
Δ V 3 ( k ) = [ Φ 3 X ( k ) ] P 3 Φ 3 X ( k ) y e ( k ) P 3 y e ( k ) = X ( k ) Φ 3 P 3 Φ 3 I 3 , 4 P 3 I 3 , 4 X ( k ) ,
Δ V 4 ( k ) = [ Φ 4 X ( k ) ] P 4 Φ 4 X ( k ) x r ( k ) P 3 x r ( k ) = X ( k ) Φ 4 P 4 Φ 4 I 4 , 4 P 4 I 4 , 4 X ( k ) ,
where Φ 1 = A B A a C c B A a D c 0 , Φ 2 = 0 A c B c 0 , Φ 3 = A s C A A s C B A a C c   A s C B A a D c C r A r , Φ 4 = 0 0 0 A r . I m , n denotes a column-wise block matrix which consists of n matrices, where the m th matrix block is a unit matrix and the other blocks are zero ones.
Further arrange Δ V ( k ) as Δ V ( k ) = X ( k ) Π ˜ X ( k ) , Π ˜ = Φ diag { P 1 , P 2 , P 3 , P 4 } Φ   diag { P 1 , P 2 , P 3 , P 4 } , and
Φ = Φ 1 Φ 2 Φ 3 Φ 4 .
One can see that the system (A5) is asymptotically stable if Π ˜ < 0 holds.
For ω ( k ) 0 , the following stealthiness cost function is defined to design the attack matrices
J ( n ) = k = 1 n y e ( k ) y e ( k ) γ 2 ω ( k ) ω ( k ) .
For any instant k , one has
J ( k ) = y e ( k ) y e ( k ) γ 2 ω ( k ) ω ( k ) + E Δ V ( k ) E Δ V ( k ) = ζ ( k ) Π ζ ( k ) E Δ V ( k ) ,
Π = Φ diag { P 1 , P 2 , P 3 , P 4 } Φ diag { P 1 , P 2 , P 3 I , P 4 , γ 2 I } ,   Φ = Φ Ψ ,
ζ ( k ) = X ( k ) ω ( k ) ,   Ψ = Ψ 1 Ψ 2 Ψ 3 Ψ 4 ,
where Ψ 1 = A d B A a F c H r I 0 , H r = C r ( I A r ) 1 B r , Ψ 2 = 0 E c H r 0 0 , Ψ 3 = A s C A A s C B A a F c H r C r B r A s C A s , Ψ 4 = 0 B r 0 0 .
Notice that when Π < 0 holds, one can obtain J ( k ) < E Δ V ( k ) , which yields y e ( k ) 2 < γ 2 ω ( k ) 2 E Δ V ( k ) . Let n , accumulate the Equation (A10), and utilize the zero initial condition E X ( 0 ) = 0 as well as lim n X ( n ) = 0 , we get the stealthiness condition (6). However, the inequality Π < 0 cannot be solved directly. We next consider a corresponding linear matrix inequality result.
According to the Schur complement lemma, Π < 0 is equivalent to the inequality
diag { P 1 , P 2 , P 3 I , P 4 , γ 2 I } Φ diag { P 1 1 , P 2 1 , P 3 1 , P 4 1 } < 0 .
Left and right multiplication by diag { I ,   ,   I ,   G 1 , G 2 ,   G 3 ,   G 4 } and its transposition for the matrix in inequality (A12) yield
Π = diag { P 1 , P 2 , P 3 I , P 4 , γ 2 I } * L 11 L 12 L 13 0 L 15 L 16 L 17 0 0 L 22 L 23 0 0 L 26 0 0 L 31 L 32 L 33 L 34 L 35 L 36 L 37 L 38 0 0 0 L 44 0 L 46 0 0 G ¯ 1 * * * 0 G ¯ 2 * * 0 0 G ¯ 3 * 0 0 0 G ¯ 4 ,
where L 11 = G 1 A , L 12 = G 1 B A a C c , L 13 = G 1 B A a D c , L 15 = G 1 A d , L 16 = G 1 B A a F c H r , L 17 = G 1 , L 22 = G 2 A c , L 23 = G 2 B c , L 26 = G 2 E c H r , L 31 = G C A , L 32 = G C B A a C c , L 33 = G C B A a D c , L 34 = G 3 C r A r , L 35 = G C A , L 36 = G C B A a F c H r G 3 C r B r , L 37 = G C , L 38   = G , L 44 = G 4 A r , L 46 = G 4 B r , G = G 3 A s , G ¯ i = G i P i 1 G i , i = 1 , , 4 .
Notice that Π contains the inverse of the matrices to be determined (e.g., G ¯ i , i = 1 , , 4 ) and several coupled terms of the pending matrices (such as L 12 ). For the former, we can utilize Lemma 2. Let X = I in this lemma yields Y J 1 Y Y + Y J and use the resulting inequality to eliminate the matrix inverse terms. For the coupled pending matrices, we next use the full-rank decomposition combined with the decoupling method given in Lemma 1 to deal with them.
Considering the coupled terms in (A13), introduce the definition A a = U 1 V , where U is a pending invertible matrix. Thus, the coupled terms can be represented as
L 12 = Ξ 1 U 1 V C c + B V C c ,   L 13 = Ξ 1 U 1 V D c + B V D c , L 16 = Ξ 1 U 1 V F c H r + B V F c H r ,   L 32 = Ξ 2 U 1 V C c + C B V C c , L 33 = Ξ 2 U 1 V D c + C B V D c ,   L 36 = Ξ 2 U 1 V F c H r + C B V F c H r G 3 C r B r
where Ξ 1 = G 1 B B U and Ξ 2 = G C B C B U .
Next, consider the inequality
Π < T 1 + M S + S M ,
where T 1 is given by Equation (A1), and the matrices M and S are denoted as
M = 0 0 Ξ 1 0 0 0 0 0 0 0 Ξ 2 0 ,
S = 0 U 1 V C c U 1 V D c 0 0 U 1 V F c H r 0 0 0 0 0 U 1 V C c U 1 V D c 0 0 U 1 V F c H r 0 0 0 0 .
Let N = diag { U ,   U } , T 2 = β M + N S , T 3 = β ( N + N ) . According to Lemma 1, we have T 1 + M S + ( M S ) < 0 and thus Π < 0 when Equation (14) holds. The theorem is proved. □

References

  1. Dibaji, S.M.; Pirani, M.; Flamholz, D.B.; Annaswamy, A.M.; Johansson, K.H.; Chakrabortty, A. A systems and control perspective of CPS security. Annu. Rev. Control 2019, 47, 394–411. [Google Scholar] [CrossRef]
  2. Zhang, D.; Wang, Q.G.; Feng, G.; Shi, Y.; Vasilakos, A.V. A survey on attack detection, estimation and control of industrial cyber–physical systems. ISA Trans. 2021, 116, 1–16. [Google Scholar] [CrossRef]
  3. Falliere, N.; Murchu, L.O.; Chien, E. W32. Stuxnet Dossier. White Paper, Symantec Corp., Security Response. 2011, Volume 5, pp. 1–69. Available online: https://pax0r.com/hh/stuxnet/Symantec-Stuxnet-Update-Feb-2011.pdf (accessed on 1 December 2022).
  4. Knowles, W.; Prince, D.; Hutchison, D.; Disso, J.F.P.; Jones, K. A survey of cyber security management in industrial control systems. Int. J. Crit. Infrastruct. Prot. 2015, 9, 52–80. [Google Scholar] [CrossRef]
  5. Pajic, M.; Weimer, J.; Bezzo, N.; Sokolsky, O.; Pappas, G.J.; Lee, I. Design and implementation of attack-resilient cyber-physical systems: With a focus on attack-resilient state estimators. IEEE Control Syst. Mag. 2017, 37, 66–81. [Google Scholar] [CrossRef]
  6. Bernieri, G.; Conti, M.; Pascucci, F. A novel architecture for cyber-physical security in industrial control networks. In Proceedings of the 4th International Forum on Research and Technology for Society and Industry (RTSI), Palermo, Italy, 10–13 September 2018; pp. 1–6. [Google Scholar] [CrossRef]
  7. Cervini, J.; Rubin, A.; Watkins, L. Don’t drink the cyber: Extrapolating the possibilities of Oldsmar’s water treatment cyberattack. In Proceedings of the International Conference on Cyber Warfare and Security, Albany, NY, USA, 17–18 March 2022; pp. 19–25. [Google Scholar] [CrossRef]
  8. Zhang, T.Y.; Ye, D. False data injection attacks with complete stealthiness in cyber–physical systems: A self-generated approach. Automatica 2020, 120, 109117. [Google Scholar] [CrossRef]
  9. Ren, X.X.; Yang, G.H. Kullback-Leibler divergence-based optimal stealthy sensor attack against networked linear quadratic Gaussian systems. IEEE Trans. Cybern. 2021, 52, 11539–11548. [Google Scholar] [CrossRef]
  10. Nozari, E.; Tallapragada, P.; Cortés, J. Differentially private average consensus: Obstructions, trade-offs, and optimal algorithm design. Automatica 2017, 81, 221–231. [Google Scholar] [CrossRef]
  11. Abhinav, S.; Modares, H.; Lewis, F.L.; Davoudi, A. Resilient cooperative control of DC microgrids. IEEE Trans. Smart Grid 2018, 10, 1083–1085. [Google Scholar] [CrossRef]
  12. Sun, H.; Peng, C.; Zhang, W.; Yang, T.; Wang, Z. Security-based resilient event-triggered control of networked control systems under denial of service attacks. J. Franklin Inst. 2019, 356, 10277–10295. [Google Scholar] [CrossRef]
  13. Ye, D.; Zhang, T.Y. Summation detector for false data-injection attack in cyber-physical systems. IEEE Trans. Cybern. 2019, 50, 2338–2345. [Google Scholar] [CrossRef]
  14. Liu, B.; Chen, J.; Hu, Y. Mode division-based anomaly detection against integrity and availability attacks in industrial cyber-physical systems. Comput. Ind. 2022, 137, 103609. [Google Scholar] [CrossRef]
  15. Wang, J.S.; Yang, G.H. Data-driven methods for stealthy attacks on TCP/IP-based networked control systems equipped with attack detectors. IEEE Trans. Cybern. 2018, 49, 3020–3031. [Google Scholar] [CrossRef]
  16. Guo, Z.; Shi, D.; Johansson, K.H.; Shi, L. Worst-case stealthy innovation-based linear attack on remote state estimation. Automatica 2018, 89, 117–124. [Google Scholar] [CrossRef]
  17. Kim, S.; Eun, Y.; Park, K.J. Stealthy sensor attack detection and real-time performance recovery for resilient CPS. IEEE Trans. Ind. Inf. 2021, 17, 7412–7422. [Google Scholar] [CrossRef]
  18. De Sa, A.O.; Rust da Costa Carmo, L.F.; Machado, R.C.S. Covert attacks in cyber-physical control systems. IEEE Trans. Ind. Inf. 2017, 13, 1641–1651. [Google Scholar] [CrossRef]
  19. Li, Z.; Yang, G. A data-driven covert attack strategy in the closed-loop cyber-physical systems. J. Franklin Inst. 2018, 355, 6454–6468. [Google Scholar] [CrossRef]
  20. Teixeira, A.; Shames, I.; Sandberg, H.; Johansson, K.H. A secure control framework for resource-limited adversaries. Automatica 2015, 51, 135–148. [Google Scholar] [CrossRef]
  21. Li, Y.G.; Yang, G.H. Optimal stealthy false data injection attacks in cyber-physical systems. Inf. Sci. 2019, 481, 474–490. [Google Scholar] [CrossRef]
  22. Lu, A.Y.; Yang, G.H. Malicious attacks on state estimation against distributed control systems. IEEE Trans. Autom. Control 2019, 65, 3911–3918. [Google Scholar] [CrossRef]
  23. Lima, P.M.; Carvalho, L.K.; Moreira, M.V. Detectable and undetectable network attack security of cyber-physical systems. IFAC-PapersOnLine 2018, 51, 179–185. [Google Scholar] [CrossRef]
  24. Mo, Y.; Sinopoli, B. False data injection attacks in control systems. In Proceedings of the 1st Workshop on Secure Control Systems, Stockholm, Sweden, 12 April 2010; pp. 1–6. Available online: https://ptolemy.berkeley.edu/projects/truststc/conferences/10/CPSWeek/papers/scs1_paper_7.pdf (accessed on 1 October 2022).
  25. Mo, Y.; Weerakkody, S.; Sinopoli, B. Physical authentication of control systems: Designing watermarked control inputs to detect counterfeit sensor outputs. IEEE Control Syst. Mag. 2015, 35, 93–109. [Google Scholar] [CrossRef]
  26. Li, H.; Zhang, J.; He, X. Design of data-injection attacks for cyber-physical systems based on Kullback–Leibler divergence. Neurocomputing 2019, 361, 77–84. [Google Scholar] [CrossRef]
  27. Shang, J.; Yu, H.; Chen, T. Worst-case stealthy innovation-based linear attacks on remote state estimation under Kullback-Leibler divergence. IEEE Trans. Autom. Control 2021, 67, 6082–6089. [Google Scholar] [CrossRef]
  28. Bai, C.Z.; Pasqualetti, F.; Gupta, V. Data-injection attacks in stochastic control systems: Detectability and performance tradeoffs. Automatica 2017, 82, 251–260. [Google Scholar] [CrossRef]
  29. Kang, L.; Shen, H. Detection and mitigation of sensor and CAN bus attacks in vehicle anti-lock braking systems. ACM Trans. on Cyber-Phys. Syst. 2022, 6, 1–24. [Google Scholar] [CrossRef]
  30. Pang, Z.H.; Liu, G.P.; Zhou, D.H.; Hou, F.Y.; Sun, D.H. Two-channel false data injection attacks against output tracking control of networked systems. IEEE Trans. Ind. Electron. 2016, 63, 3242–3251. [Google Scholar] [CrossRef]
  31. Chang, X.H.; Park, J.H.; Zhou, J. Robust static output feedback H control design for linear systems with polytopic uncertainties. Syst. Control Lett. 2015, 85, 23–32. [Google Scholar] [CrossRef]
  32. Su, L.; Ye, D. Observer-based output feedback H control for cyber–physical systems under randomly occurring packet dropout and periodic DoS attacks. ISA Trans. 2019, 95, 58–67. [Google Scholar] [CrossRef]
  33. Tian, Y.; Wang, Z. Finite-time extended dissipative filtering for singular T-S fuzzy systems with nonhomogeneous Markov jumps. IEEE Trans. Cybern. 2020, 52, 4574–4584. [Google Scholar] [CrossRef]
  34. Li, Z.M.; Chang, X.H. Robust H control for networked control systems with randomly occurring uncertainties: Observer-based case. ISA Trans. 2018, 83, 13–24. [Google Scholar] [CrossRef]
Figure 1. Block diagram of a CPS subject to attacks.
Figure 1. Block diagram of a CPS subject to attacks.
Sensors 23 01957 g001
Figure 2. The structure of the experimental platform and a photo in operation.
Figure 2. The structure of the experimental platform and a photo in operation.
Sensors 23 01957 g002
Figure 3. Software implements for HIL experiments in Matlab/Simulink: (a) The physical layer; (b) The first part of control layer; (c) The second part of control layer; (d) The network layer and attacks therein.
Figure 3. Software implements for HIL experiments in Matlab/Simulink: (a) The physical layer; (b) The first part of control layer; (c) The second part of control layer; (d) The network layer and attacks therein.
Sensors 23 01957 g003aSensors 23 01957 g003bSensors 23 01957 g003c
Figure 4. Actual output curves of the physical plant: the attack initiation time is 750 s, see the magenta vertical dotted line.
Figure 4. Actual output curves of the physical plant: the attack initiation time is 750 s, see the magenta vertical dotted line.
Sensors 23 01957 g004
Figure 5. Output curves displayed in the control layer.
Figure 5. Output curves displayed in the control layer.
Sensors 23 01957 g005
Figure 6. The curves of y e ( k ) and γ ω ( k ) before and after the attacks.
Figure 6. The curves of y e ( k ) and γ ω ( k ) before and after the attacks.
Sensors 23 01957 g006
Table 1. Hardware configuration of the experimental system.
Table 1. Hardware configuration of the experimental system.
ComponentsAttributeDescription
Water TanksQuantity4
MaterialAcrylic
Depth350 mm
Inner Diameter44 mm
PumpsQuantity2
TypeDiaphragm
Rated Voltage24 V DC
Load Current0.8–1.5 A DC
Rated Flow2.2 L/min
Head10 m
DriversQuantity2
Model NumberHEYO-24V916PWM
Control Voltage0–10 V DC
Output Voltage0–24 V DC
Static Current0.01 A
SensorsQuantity2
Model NumberXGZP6887
Range0–5 kPa
Output Voltage0.5–4.5 V DC
Accuracy1.5 %Span
Compensation Temperature0–60 °C
Data Acquisition BoardProducerAdvantech
Model NumberPCI-1710U
Input/Output TypeAnalog
Input Quantity16
Output Quantity2
Sampling RateMax. 100 kHz
Accuracy16 bit
OthersDigital I/O & Counters
Wiring Terminal BoardProducerAdvantech
Model NumberADAM-3968
General68-pin/DIN-rail Mounting
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Chen, J.; Liu, B.; Li, T.; Hu, Y. Multiplicative Attacks with Essential Stealthiness in Sensor and Actuator Loops against Cyber-Physical Systems. Sensors 2023, 23, 1957. https://doi.org/10.3390/s23041957

AMA Style

Chen J, Liu B, Li T, Hu Y. Multiplicative Attacks with Essential Stealthiness in Sensor and Actuator Loops against Cyber-Physical Systems. Sensors. 2023; 23(4):1957. https://doi.org/10.3390/s23041957

Chicago/Turabian Style

Chen, **gzhao, Bin Liu, Tengfei Li, and Yong Hu. 2023. "Multiplicative Attacks with Essential Stealthiness in Sensor and Actuator Loops against Cyber-Physical Systems" Sensors 23, no. 4: 1957. https://doi.org/10.3390/s23041957

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop