Professional Documents
Culture Documents
Abstract—In this paper, the security issue is investigated for networks and information systems, the attacks on NCSs are
networked control systems (NCSs) where the physical plant is aimed at deteriorating the system performance in the physical
controlled by a remote observer-based controller. The commu- layer. As such, existing information security methods (e.g.
nication channel from system measurement to remote control
centre is vulnerable to attacks from malicious adversaries. Here, authentication, access control, message integrity) which do
false data injection (FDI) attacks are considered. The aim is not explicitly exploit the system dynamics of the underlying
to find the so-called insecurity conditions under which the NCS physical process, are unsuitable since system dynamics is
is insecure in the sense that there exist FDI attacks that can often the target for cyber-attacks. This situation motivates the
bypass the anomaly detector but still destabilize the overall current investigation in this paper.
system. In particular, a new necessary and sufficient condition
for the insecurity is derived when the communication channel is The false data injection (FDI) attack is the most common
compromised by the adversary. Moreover, a specific algorithm one among all kinds of cyber-attacks. Through modifying
is proposed with which the NCS is shown to be insecure. A the data packets, the FDI attack violates data integrity of
simulation example is utilized to demonstrate the usefulness of the communication networks. Compared with other cyber-
the proposed conditions/algorithms in the secure control problem. attacks such as denial-of-service attacks, FDI attacks are more
Index Terms—False data injection attacks, Security analysis,
difficult to detect because the adversary could keep the attacks
Networked control systems stealthy to the anomaly detector in NCSs through deliberately
designing the attack sequences. Based on a static system
I. I NTRODUCTION model, the FDI attacks have been considered in [9], [11], [17]
for the state estimation problems of power systems.
In the past two decades, the study of networked control In addition, the cyber-security of dynamical systems has
systems (NCSs) has been a focus of research due to its wide also been investigated. Specifically, for deterministic systems
applications in many fields such as automotive industry and without noises, fundamental issues such as detectability and
process control engineering [7]. The components of NCSs are identifiability for FDI attacks have been analysed and efficient
connected through wired or wireless networks, and therefore control algorithms have been developed against FDI attacks in
possess several advantages over traditional control systems [4], [16]. In [14], [15], the data encryption scheme (together
such as low cost, reduced weight and power requirements. with time-stamp techniques) has been adopted to detect the
However, inserting a network to a control loop may cause deception attacks and compensate the side-effects. However, as
new problems that will deteriorate the system performance. highlighted in [8], the detection task of malicious behaviors for
So far, the networked-induced phenomena (e.g. signal trans- stochastic systems (with external noise) is more difficult than
mission delay, packet dropout and data quantization) have that for deterministic (without stochastic noise) because of the
been extensively investigated [5], [18]. Additionally, the use fact that the injected attack by the adversary could be mistaken
of communication networks makes the system vulnerable to as a type of noises by the protection devices. Noting the fact
cyber-attacks, and the possible malicious attacks on NCSs that in practice most of NCSs work in noisy environments, it
may cause negative impact on the economy, the environment is important yet challenging to analyse the cyber-security for
and the national security. Despite its clear engineering insight stochastic NCSs.
and societal significance, the security issue of NCSs has not In this paper, the aim is to propose a new insecurity
attracted adequate research attention yet mainly due to the condition for stochastic NCS under FDI attacks. Specifically,
complexities in modelling cyber-attacks. when the communication channel from the sensor to the state
The first-ever cyber-attack in real-world control systems estimator in the remote control centre is compromised by the
called Stuxnet was reported in 2010 [3]. Since then, the adversary, a new necessary and sufficient condition is proposed
cyber-security issue in NCSs has been a hot topic of re- under which the system is insecure in the sense that the
search that stirs considerable interest. Unlike the traditional FDI attacks can bypass the anomaly detector but destabilize
cyber-attacks that primarily cause damages in the computer the NCS. Such a new condition is shown to be concise that
where block matrices Λ1 = diag{J1 , . . . , Jl } ∈Cl̄×l̄ , Λ2 = From Lemma 3, the following lemma can be easily ob-
diag{Jl+1 , . . . , Jp } ∈ C(n−l̄)×(n−l̄) , Po = P1 , . . . , Pl , tained.
T Lemma 4: For the system (1)-(2), let ρ(A) ≥ 1 and Es,t
P = Pl+1 , . . . , Pp , Qo = Q1 , . . . , QTl
T
and Qc =
cT T
T represent the element of matrix E in the sth row and tth
Ql+1 , . . . , Qp are of appropriate dimensions.
column. Define matrix E = P −1 K. Then, there exists at
To introduce the main results, the following lemmas are
least one non-zero component in matrix E, that is, there Pl exist
needed.
integers s ∈ {1, . . . , ¯l} and t ∈ {1, . . . , m} with ¯l , i=1 ni
Lemma 2: [2] For two matrices M, N ∈ Cn×n , det(M N ) = such that Es,t 6= 0.
det(M )det(N ). Moreover, matrices M N and N M have the Proof: Let us prove the lemma by contradiction. Assume
same non-zero eigenvalues. that Es,t = 0, ∀s ∈ {1, . . . , ¯l}, ∀t ∈ {1, . . . , m}. That is,
Lemma 3: For the NCS (1)-(2), if ρ(A) ≥ 1, the following 0
matrix equation E = where Ē ∈ C(n−l̄)×m is the sub-matrix forming
Ē
Pc X = K (16) by the last n − ¯l rows of E. Then, the equation K = P E can
be rewritten as follows:
has no solution, where matrix K is the estimator gain of state 0
K = P E = Po Pc = Pc Ē.
estimator (2) and matrix Pc is given in (15). Ē
Proof: It is known from Lemma 2 that the matrices (I −
KC)A and A(I − KC) have the same eigenvalues. Then, it The above equation implies that Ē is the solution of equation
follows from ρ((I − KC)A) < 1 that the inequality ρ(A(I − (16), which contradicts the statement in Lemma 3 that equation
KC)) < 1 holds. (16) has no solution. The proof is now complete.
Before presenting the necessary and sufficient condition
Let us prove the lemma by contradiction. Assume that there
under which the NCS (1)-(2) is insecure, a procedure for
exists a matrix solution X̃ to equation (16), then it follows that
generating a certain sequence of FDI attacks is outlined in
" # Algorithm 1.
Qo
Λ1 0 Theorem 1: Under the cyber-attack (4), the NCS (1)-(2) is
A(I − KC) = Po Pc (I − Pc X̃C),
0 Λ2 Qc insecure if and only if ρ(A) ≥ 1.
Proof: (Sufficiency) Start by proving that, if ρ(A) ≥ 1,
and it follows from Qo Pc = 0 and Qc Pc = I that the NCS (1)-(2) is insecure under the cyber-attack (4). Ac-
cording to Definition 2, it is needed to prove that there exists
" Qo
#
at least one FDI attack sequence satisfying both (12) and (13)
Λ1 0
A(I − KC) = Po Pc . if ρ(A) ≥ 1. In the following, it is to be proved that (12) and
0 Λ2 Qc − X̃C
(13) are true under the attacks generated by Algorithm 1.
According to Algorithm 1, it is known that
Accordingly, the characteristic polynomial of matrix A(I −
t
KC), denoted by det (λI − A(I − KC)), can be given as a(k + 1) = −CA∆e(k) + σ(k + 1)M Im (17)
Algorithm 1 The algorithm for generating FDI attacks It follows from (20) that
1: Initialize: λ
Decompose matrix A in (1) as the Jordan normal
t̄r (k + 1) q 1 t̄r (k)
form (14), Choose arbitrarily a scalar σ ∈ (0, 1) t̄r+1 (k + 1) .. t̄r+1 (k)
and the positive scalar M ; λq .
=
2: Determine the integers t, r and q according to Lemma 4, (21)
.. ..
..
. .
and (22), respectively;
. 1
3: Set t̄r (0) = 0;
t̄nq (k + 1) λq t̄ nq (k)
4: while k ≥ 0 do
1
5: if Re{λq t̄r (k)} ≥ 0 then
6: Set σ(k + 1) = σ;
0
+ σ(k + 1)M .. ,
t
7: Set attack a(k + 1) = −CA∆e(k) + σ(k + 1)M Im ; .
8: else
9: Set σ(k + 1) = −σ; 0
10: Set attack a(k + 1) = −CA∆e(k) + σ(k + 1)M Im t
; (23)
11: end if
12: Calculate ∆ex(k + 1) according to (8); where t̄j (k) is the jth element of vector t̄(k), j ∈ {r, r +
13: Calculate t̄r (k + 1) according to (24); 1, . . . , nq }.
14: k = k + 1; Noting the initial condition t̄r+1 (0) = 0, it can be easily
15: end while derived from (23) that t̄i+1 (k) = 0 and
t̄r (k + 1) = λq t̄r (k) + σ(k + 1)M, (24)
where σ(k + 1) takes value on either σ or −σ with σ ∈ (0, 1). and therefore
It follows from (9) and (17) that
|t̄r (k + 1)|2 =|λq |2 |t̄r (k)|2 + σ 2 (k + 1)M 2
t
(25)
∆z(k + 1) = σ(k + 1)M Im , (18) + 2σ(k + 1)M Re{λq t̄r (k)}.
According to Algorithm 1, it is known that σ(k +
from which it can easily seen that k∆z(k + 1)k = σM < M ,
1)Re{λq t̄i (k)} ≥ 0 and σ 2 (k+1) = σ 2 . Furthermore, noticing
and this implies that condition (13) is satisfied.
that |λq | ≥ 1, it is derived that
To show that the condition (12) is satisfied, define vector
t(k) = Q∆e(k) where t(k) = [tT1 (k), . . . , tTp (k)]T with |t̄r (k+1)|2 ≥ |λq |2 |t̄r (k)|2 +σ 2 M 2 ≥ |t̄r (k)|2 +σ 2 M 2 . (26)
ti (k) ∈ Cni (i ∈ {1, 2, . . . , p}). Based on (8), (15) and Lemma
4, the dynamics of t(k) can be derived as follows: Based on the inequality |t̄r (k + 1)|2 ≥ |t̄r (k)|2 + σ 2 M 2 and
the initial condition t̄r (0) = 0, it can be inferred that |t̄r (k +
t(k + 1) = Jt(k) + QK∆z(k + 1) = Jt(k) + E∆z(k + 1). 1)|2 ≥ (k+1)σ 2 M 2 , which implies that limk→∞ |t̄r (k+1)| =
(19) ∞ and therefore limk→∞ t(k + 1) = ∞. Since t(k + 1) =
Substituting (18) into (19) gives Q∆e(k + 1), it can be deduced that at least one component of
vector ∆e(k + 1) is unbounded, and limk→∞ k∆e(k + 1)k =
t
t(k + 1) = Jt(k) + σ(k + 1)M EIm . ∞. To this end, the condition (12) is satisfied and finally it
can be concluded that the system is insecure under the attacks
Define t̄(k) =
T
t1 (k), . . . , tTl (k)
T
and t(k) = generated by Algorithm 1 if ρ(A) ≥ 1.
(Necessity). To prove the necessity, it is needed to show
T T Λ 1 0
tl+1 (k), . . . , tTp (k) . Noting that J =
, one has that the system (1)-(2) is secure if matrix ρ(A) < 1. Again,
0 Λ2
let us prove by contradiction. Assume that the system (1)-
t̄(k + 1) = Λ1 t̄(k) + σ(k + 1)M d, (20) (2) is insecure, that is, there exist attack sequences satisfying
(12) and (13). It follows from (13) that ∆z(k + 1) is norm-
bounded. Since ρ(A) < 1, based on the equation ∆e(k + 1) =
t
where d = Il̄ , 0l̄×(n−l̄) EIm , i.e., vector d is formed by the
first ¯l elements of the tth column of matrix E. From Lemma A∆e(k) + K∆z(k + 1), it can be inferred that ∆e(k + 1) is
4, it is known that d 6= 0. norm-bounded as well. That is, condition (12) is violated and
T
Define d = d1 , . . . , dl̄ and the proof is now complete.
Remark 1: In the main results of [10], [12], it has been
r = argmax (dj 6= 0), (21) stated that the necessary and sufficient conditions for the state
1≤j≤l̄ error by FDI attacks to be unbounded are that a) the system
matrix A should be unstable; and b) at least one eigenvector v
that is, dr is the non-zero element of vector d with the maximal corresponding to the unstable system mode satisfies v ∈ Qoa
index. Since 1 ≤ r ≤ ¯l, there exists an integer q (1 ≤ q ≤ l) where Qoa is the controllability matrix associated with the pair
such that (A − KCA, KBa ). Note that when Ba = Im , condition b) is
q q
X X actually unnecessary and has been removed in Theorem 1 of
ni − nq < r ≤ ni . (22) this paper.
i=1 i=1
2000
V. C ONCLUSION
0
In this paper, the cyber-security of networked control sys-
tems has been considered, where the adversary can inject
-2000
false data into the communication channel from the physical
-4000
plant to the remote control centre. Using the techniques from
matrix analysis and linear system theory, a necessary and
-6000
sufficient condition has been derived under which the system
-8000 x1(k)
state caused by the attack is divergent to infinity. Furthermore,
x2(k) a specific algorithm has been developed for generating attack
-10000
0 10 20 30 40 50 sequences with which the networked control system is inse-
cure. A simulation example has been proposed to verify the
(a) system state.
usefulness of the developed result and algorithm.
0.25
R EFERENCES
0.2
[1] B. D. Anderson and J. B. Moore, Optimal Filtering. Courier Dover
Publications, 2005.
0.15 [2] D. S. Bernstein, Matrix Mathematics: Theory, Facts, and Formulas.
Princeton University Press, 2009.
0.1 [3] T. Chen, “Stuxnet, the real start of cyber warfare?[editor’s note],” IEEE
Network, vol. 24, no. 6, pp. 2–3, 2010.
[4] H. Fawzi, P. Tabuada, and S. Diggavi, “Secure estimation and control for
0.05
cyber-physical systems under adversarial attacks,” IEEE Transactions on
∆ z(k)
Automatic Control, vol. 59, no. 6, pp. 1454–146, 2014.
0 [5] H. Gao and T. Chen, “H∞ estimation for uncertain systems with limited
0 10 20 30 40 50
communication capacity,” IEEE Transactions on Automatic Control,
vol. 52, no. 11, pp. 2070–2084, 2007.
(b) residual difference. [6] J. P. Hespanha, Linear Systems Theory. Princeton university press,
2009.
Fig. 2. The system state and estimation residual difference under FDI attacks [7] J. P. Hespanha, P. Naghshtabrizi, and Y. Xu, “A survey of recent results
in networked control systems,” Proceedings-IEEE, vol. 95, no. 1, p. 138,
2007.
[8] O. Kosut, “Malicious data attacks against dynamic state estimation in
IV. N UMERICAL EXAMPLE the presence of random noise,” in Proc. Global Conference on Signal
and Information Processing, 2013, pp. 261–264.
Consider the physical plant P given in (2) with the follow- [9] O. Kosut, L. Jia, R. J. Thomas, and L. Tong, “Malicious data attacks
ing system matrices, on the smart grid,” IEEE Transactions on Smart Grid, vol. 2, no. 4, pp.
645–658, 2011.
[10] C. Kwon, W. Liu, and I. Hwang, “Security analysis for cyber-physical
1.2 1 −1
A= , B= systems against stealthy deception attacks,” in Proc. American Control
0 0.5 1 Conference (ACC), 2013, pp. 3344–3349.
[11] Y. Liu, P. Ning, and M. K. Reiter, “False data injection attacks against
C = 1 0 , W = diag{0.1, 0.1}, R = 0.1.
state estimation in electric power grids,” in Proc. 16th ACM conference
on Computer and Communications Security, 2009, pp. 21–32.
It can be verified that with the above parameters, the physical [12] Y. Mo and B. Sinopoli, “False data injection attacks in cyber physical
plant P is both controllable and observable. Suppose that the systems,” in First Workshop on Secure Control Systems, 2010.
proposed controller (2) is employed, where gains K and L are [13] ——, “On the performance degradation of cyber-physical systems under
stealthy integrity attacks,” IEEE Transactions on Automatic Control, in
chosen as the steady-state Kalman filter gain and LQG control press.
gain as follows: [14] Z.-H. Pang and G.-P. Liu, “Design and implementation of secure
networked predictive control systems under deception attacks,” IEEE
0.7865 Transactions on Control Systems Technology, vol. 20, no. 5, pp. 1334–
K= , L = −1.6551 −2.4795 . 1342, 2012.
0.1468 [15] Z.-H. Pang, G. Zheng, G.-P. Liu, and C.-X. Luo, “Secure transmission
mechanism for networked control systems under deception attacks,” in
It can be computed that the eigenvalues of system matrix Proc. International Conference on Cyber Technology in Automation,
A are 1.2 and 0.5. According to Theorem 1, the system is Control, and Intelligent Systems, 2011, pp. 27–32.
[16] F. Pasqualetti, F. Dorfler, and F. Bullo, “Attack detection and identi-
insecure. To confirm this conclusion via simulation, a specific fication in cyber-physical systems,” IEEE Transactions on Automatic
deceptive FDI attack sequence is generated according to Algo- Control, vol. 58, no. 11, pp. 2715–2729, 2013.
rithm 1 where the parameters are chosen as σ = 0.1, M = 2. [17] A. Teixeira, S. Amin, H. Sandberg, K. H. Johansson, and S. S. Sastry,
“Cyber security analysis of state estimators in electric power systems,”
Fig. 2 depicts the system state x(k) and the the estimation in Proc. IEEE Conference on Decision and Control (CDC), 2010, pp.
residual difference ∆ẑ(k) under the designed attack sequences 5991–5998.
{ad (k)}. From Fig. 2, it can be seen that the sequence [18] Z. Wang, H. Dong, B. Shen, and H. Gao, “Finite-horizon H∞ filtering
with missing measurements and quantization effects,” IEEE Transactions
{kx(k)k} diverges to ∞ while the sequence {k∆z(k)k} is on Automatic Control, vol. 58, no. 7, pp. 1707–1718, 2013.
always less the prescribed scalar M . Here, the closed-loop
system is destabilized by the designed FDI attacks but this
cannot be detected by the χ2 anomaly detector.