Recursive Watermarking-Based Transient Covert Attack Detection for the Industrial CPS | IEEE Journals & Magazine | IEEE Xplore

Recursive Watermarking-Based Transient Covert Attack Detection for the Industrial CPS


Abstract:

The subject of attack detection for industrial cyber-physical systems (IPCSs) is covered in this paper, which addresses threats from transient covert attacks (TCAs), also...Show More

Abstract:

The subject of attack detection for industrial cyber-physical systems (IPCSs) is covered in this paper, which addresses threats from transient covert attacks (TCAs), also referred to as the second version of replay attacks with a specific frequency and short duration. A comprehensive model of the TCAs is built using the active instant and period of the attacks, as well as the dynamics of a virtual system to replicate IPCS function and produce attack signals. Though watermarking-based detection algorithms have been shown to be effective in detecting TCAs, the induced system performance loss is too significant, and as such, our primary goal is to minimize system performance degradation while maintaining the detection rate. Because the active periods of TCAs are substantially shorter than their sleep ones, or even because they are practically always silent, it makes sense that reducing superfluous watermarking will facilitate system performance. So, using an “event-triggered” strategy, a unique recursive watermarking-based detection algorithm is proposed. Here, the trigger modes of watermarking are divided into three types: forced, high probability, and low probability. The design principles are proven via algorithms and criteria, and a theoretical analysis of the detection rate and the system performance loss is also supplied. The advantages of the suggested algorithms are finally demonstrated by numerical simulations of a quadruple-water-tank system and experiments with a permanent magnet synchronous motor on the dSpace platform.
Page(s): 1709 - 1719
Date of Publication: 02 March 2023

ISSN Information:

Funding Agency:

No metrics found for this document.

I. Introduction

The industrial cyber-physical systems (ICPSs), which tightly integrate physical and cyber-spaces with communication, computation, and control techniques, are made possible via the widespread application to the industrial field [15]. By fusing network technology with physical systems, such systems significantly boost system efficiency, but it also renders ICPSs vulnerable [3], [17]. As in the well-known Stuxnet attacks, attackers might seize control of sensors and actuators and alter the data to carry out their malicious intents [1], [8].

Usage
Select a Year
2025

View as

Total usage sinceMar 2023:1,144
01020304050JanFebMarAprMayJunJulAugSepOctNovDec43194431190000000
Year Total:156
Data is updated monthly. Usage includes PDF downloads and HTML views.
Contact IEEE to Subscribe

References

References is not available for this document.