Adaptive robust FDI attack detection for cyber–physical systems with
Adaptive robust FDI attack detection for cyber–physical systems with
com
ScienceDirect
ICT Express 9 (2023) 656–663
www.elsevier.com/locate/icte
Abstract
This paper investigates the problem of attack detection for cyber–physical systems (CPSs) with disturbances, measurement noises, and
false data injection (FDI) attacks. A classical linear discrete-time system attack model is constructed and a robust attack detector based on the
mixed H_/H∞ is designed. Firstly, a system with an actuator that suffered a malicious attack is modeled. Then, a robust attack detector based
on the mixed H_/H∞ is designed in which the H_ index and H∞ index are used to characterize the sensitivity to attacks and robustness
to disturbances and measurement noises, respectively. And an adaptive detection threshold with a compensation term is proposed. Besides,
the designed robust attack detector enables the attack detection dynamic system to be asymptotically stable and to guarantee the H_/H∞
performance, and the robust attack detector gains are solved from a convex optimization. Finally, the obtained theoretical results are validated
through a numerical simulation and a three-area power system simulation.
© 2022 The Authors. Published by Elsevier B.V. on behalf of The Korean Institute of Communications and Information Sciences. This is an open
access article under the CC BY license (http://creativecommons.org/licenses/by/4.0/).
Keywords: Cyber–physical systems; Attack detection; False data injection attack; Linear matrix inequality; H_/H∞
Wei Ao et al. proposed sufficient conditions for detecting and security control of multi-area power systems with com-
state attack and sensor attack. Then two adaptive sliding munication delay and aperiodic DoS attacks. They proposed a
mode observers are designed and appropriate residual signals detection mechanism to identify DoS attacks occurred at the
are constructed to approximate the attacks. In [12], a finite actuator and a resilient control mechanism with a preserving
time attack detection and secure state estimation scheme is weighted H∞ performance. In [26], a robust fault detec-
proposed. Considering the detectability of the attack which tion method is proposed, and for the sake of making robust
is s-sparse, a new criterion of CPS detectability and dis- residual generators to be sensitive to faults and insensitive
criminability is proposed. Then, simulation results show that to unknown disturbances, a mixed H∞/H∞ performance is
the proposed detector and estimator can detect the attack given. Therein, the sensitivities evaluation of the residual to
and estimate the state in the specified finite time, respec- fault is characterized by the H∞ performance. It is known
tively. In [13], an effective event-triggered detection scheme that, the H performance can significantly improve diagnostic
based on event-triggered generalized extended state observer performance compared to the H∞ performance. In [27], Li
is proposed. In [14], a distributed detection method based
et al. proposed a residual generator based on the H /H∞ mixed
on nonlinear unknown input observer is proposed to detect
optimization technique and transform the H performance into
FDI attacks in large-scale smart grid systems. In [15], Li
an H∞ constraint to deal with the data-driven attack detection
et al. propose three sequential data verification and fusion
problem.
programs for different detection information scenes. However,
it requires a subset of safe sensors, which is difficult to However, there are some limitations to be aware of. First,
obtain. In [16], without an additional subset of safe sensors, the above literatures only consider the robustness to unknown
an FDI attack detection algorithm is designed using anomaly inputs such as noise and external interference, or use H∞
detection between the estimates of different sensor subsets performance rather than H performance to characterize sen-
under a small false alarm constraint. Moreover, in general, sitivity. Second, most of the residual evaluation functions
FDI attacks can remain invisible to the χ 2 detector. In [17], are constructed using all residual signals, which will waste
Ye et al. proposed a summation detector that considered the the storage resources of the computer. Third, the traditional
current information and previous information to detect the threshold is a precomputed constant, and it may lead to false
FDI attacks of CPSs with white noise. In [18], an online detection.
anomaly detection algorithm of power systems is proposed to Motivated by the above limitations, this paper investigates
detect abnormal measurement. In [19], to detect sensor attacks the problem of the detection of FDI attacks in CPS, and a
for the continuous-time systems, a detection and recognition scheme of attack detection on H /H∞ is proposed in the case
scheme based on distributed and decentralized observers is of false data injection attacks occurring at actuators. The main
proposed. In [20], considering a networked CPS with actuator contributions of this paper can be summarized:
attacks, sensor attacks and measurement noises, resilient attack (i) A robust attack detector based on H /H∞ is designed
detection estimators are proposed to detect FDI attacks that for the problem of attack detection. Different from the H∞
occurred at the physical system layer, and jamming attacks that detection filter ([23,25], et al.) in the above literatures, the de-
occurred when the measurement output transport wirelessly signed robust attack detector integrates H /H∞ index. Specif-
from sensors to remote estimators at the cyber layer. In [21], ically, the H index and H∞ index are used to characterize
by constructing an augmented system where the attacks are the sensitivity to attack and robustness to disturbances and
seen as part of the augmented state vector, a novel secure measurement, respectively.
Luenberger-like observer is proposed to estimate the state (ii) Compare with the traditional residual evaluation func-
and reconstruct the attacks according to their observability tion and the residual threshold ([20,27], et al.), a residual
automatically. Further, in [22], considering a CPS with the
evaluation function of finite time window and an adaptive
sensor attack which is s-sparse, event-triggered observers are
detection threshold with a compensation term is proposed to
proposed to deal with the problem of secure state reconstruc-
improve the detection efficiency.
tion and attack reconstruction, utilizing the augmented state
(iii) The Lyapunov function of the attack detection dynamic
and the notion of sparse observability.
When detecting the occurrence of attacks, the classical H2 , system is constructed and considering the H /H∞ performance
H and H∞ performance indices are used in many litera- index, the robust attack detector gains are solved from a
ture [23–27]. In [23], Gao et al. studied the problem of attack convex optimization.
detection and alarm response of CPSs with FDI attacks and Finally, two examples are given to show the effectiveness
noises. Considering the limited communication bandwidth and of the proposed robust attack detector.
H∞ disturbance attenuation level bound, they proposed the The rest of this paper is organized as follows. Section 2 for-
local detector and a distributed fusion strategy. A residual mulates the problem and proposed a classical linear discrete-
evaluation function and a traditional precomputed residual time system attack model. The robust attack detector based
threshold is constructed to determine whether an attack has on H /H∞ is designed and the gain matrixes are calculated in
occurred. Therein, a H∞ disturbance attenuation level bound Section 5. Section 4 validates the effectiveness of the designed
is used to represent the suppression to attack and noise, simul- robust attack detector. In Section 5, the conclusions of this
taneously. In [24], Cheng et al. studied the attack detection paper are summarized.
657
L. Li, Y. Chen, M. Li et al. ICT Express 9 (2023) 656–663
Table 1
Table of notations.
I The identity matrix with appropriate dimension.
AT The transpose of the matrix A.
B −1 The inverse of the matrix B.
X < (>)0 A positive-definite (negative-definite) matrix.
l2 [0, ∞) The space of square integrable functions on [0, ∞).
* The symmetric term in symmetric entries.
diag{a11 , a22 , . . . ann } A diagonal matrix.
Fig. 1. The framework of actuator attack detection for CPS. In this section, first of all, a robust attack detector based
on H /H∞ is designed to detect the cyber attack. Then, by
constructing a convex optimization, the gains of the attack
2. Problem formulation detector will be calculated.
Considering the measurement output y(k), a H /H∞-based
For the sake of convenience, the notations used in this paper
robust attack detector is proposed as follows:
are listed in Table 1.
σ (k + 1) = Ω σ (k) + Ξ ya (k)
{
Consider a class of CPSs described in the linear discrete-
time form: (3)
r (k) = Γ σ (k)
x(k + 1) = Ax(k) + Bu(k) + ω(k)
{
(1) where σ (k) ∈ R n is the attack detector state vector, r (k) ∈ R p
y(k) = C x(k) + d(k) is a residual signal, and matrixes Ω , Ξ and Γ are the attack
where x(k) ∈ R n is the system state, u(k) ∈ R p is the detector gains to be designed. Define χ(k) = [xaT (k), σ T (k)]T ,
control input, y(k) ∈ R m is the system output, ω(k) ∈ R n e(k) = r (k) − a(k), v(k) = [ω T (k), d T (k)]T . Then, the
and d(k) ∈ R m are the energy-bounded disturbances and following attack detection dynamic system can be obtained:
measurement noises. A, B, C represent the system matrixes
with appropriate dimensions. The system matrix pair (A, B) χ (k + 1) = Aχ(k) + Bv(k) + B̂a(k)
{
is assumed to be controllable. Moreover, a feedback controller (4)
e(k) = Cχ(k) + Da(k)
u(k) = K x(k) in which the gain matrix K ∈ R p×n satisfy
[ ] [ ] [ ]
matrix Φ ≜ A + B K is Schur is applied. Φ 0 I 0 B
where A = , B = , B̂ = , C =
Ξ C Ω 0 Ξ 0
Remark 1. In [28], a decentralized output feedback sampled- [ ]
data control strategy is designed to make the system insensitive 0 Γ , D = −I .
to DOS attacks. In other words, regardless of whether the To formulate a successful attack detection, the signal e(k)
attack occurs or not, it adopts a constant controller to ensure should be robust to disturbances and measurement noises and
that closed-loop system is robust to the attack and there is no sensitive to attack as much as can be designed. Here, we
need to design an attack detector. In this paper, an attack detec- employ the following H∞ and H− performance to indicate
tion scheme is proposed to detect the occurrence of malicious the robustness to disturbances and measurement noises and
attacks, which is more flexible and has more application value. sensitivities to attacks [27], respectively.
∞ ∞
In CPS, as depicted in Fig. 1, data exchange via a wired
∑ ∑
e T (k)e(k) ≤ γ 2 v T (k)v(k) (5)
or wireless network suffers from malicious FDI attack. Then, k=0 k=0
658
L. Li, Y. Chen, M. Li et al. ICT Express 9 (2023) 656–663
∞ ∞
⎡ ⎤
∑ ∑ −I 0 Ξ1 −I
e T (k)e(k) ≥ β 2 a T (k)a(k) (6) ⎢ ⎥
k=0 k=0
⎢∗ Ξ2 Ξ3 Ξ6 ⎥
⎥<0 (10)
⎢ ⎥
where positive scalar γ is the H∞ performance index, and
⎢
⎢∗ ∗ Ξ5 0 ⎥
positive scalar β is the H− performance index. Therein, γ
⎣ ⎦
reflects the robustness evaluation of the influence of v(k) on ∗ ∗ ∗ (β ∗ − 2)I
the error e(k) in the worst case. β reflects the sensitivities where
evaluation of the error e(k) to attack a(k). The smaller the γ , P1 − RT − R
[ ]
P2 − T − S
the stronger the error e(k) suppresses the unknown input v(k), Y , Ξ2 = ,
[ ]
Ξ1 = 0
and the smaller the false detection rate. On the contrary, the ∗ P3 − T − T T
larger the β, the more sensitive the error e(k) is to attack a(k),
R T Φ + XC RT
[ ] [ ]
and the greater the missing detection rate. Z X
Ξ3 = , Ξ4 = ,
To detect whether the FDI attack has occurred, a residual S T Φ + XC Z ST X
evaluation function of finite time window is proposed as [ ]
−P 1 −P 2
follows: Ξ5 = ,
k ∗ −P 3
∑
θ (k) = √ r T (i)r (i) (7)
RT B
[ ]
i=k−τ +1 Ξ6 = , γ ∗ = γ 2, β ∗ = β 2.
where τ is the length of the window. In (7), when constructing ST B
a residual evaluation function, a finite time window is applied Then the attack detection dynamic system (4) is asymptoti-
to save the resources of computer storage, and r (k) = r (0) cally stable and satisfies the H− /H∞ performance. The robust
when k = −τ + 1, −τ + 2, . . . , −1. attack detector gain matrixes Ω , Ξ and Γ can be calculated
The attack detection method proposed in this paper is based as Ω = T −1 Z , Ξ = T −1 X , Γ = Y .
on threshold discrimination, which can determine whether an
attack has occurred. It is well known that detection threshold Proof. Construct a Lyapunov function for the attack detec-
can affect the accuracy of attack detection, then an adaptive tion dynamic system (4): V (k) = χ T (k)Pχ (k), where the
residual threshold θth in this paper is chosen as follows when symmetric matrix P > 0.
there is no attack: One has
λ ∆V (k) = V (k + 1) − V (k)
θth = sup θ (k) + sign(∆θ (k)) −α|∆θ (k)|
(8)
v(k)∈l2 ,a(k)=0 1+e = χ T (k + 1)Pχ(k + 1) − χ T (k)Pχ(k)
where ∆θ(k) = θ (k) − θ (k − 1), λ and α are two adjustable T
= χ T (k)(A P A − P)χ(k) + 2χ T (k)A P Bv(k) (11)
T
References [15] Y. Li, L. Shi, T. Chen, Detection against linear deception attacks on
multi-sensor remote state estimation, IEEE Trans. Control Netw. Syst.
[1] R. Cao, L. Hao, Q. Gao, J. Deng, J. Chen, Modeling and decision- 5 (3) (2018) 846–856.
making methods for a class of cyber–physical systems based on [16] A. Chattopadhyay, U. Mitra, Security against false data-injection attack
modified hybrid stochastic timed Petri net, IEEE Syst. J. 14 (4) (2020) in cyber-physical systems, IEEE Trans. Control Netw. Syst. 7 (2)
4684–4693. (2020) 1015–1027.
[2] R. Meira-Góes, et al., Synthesis of sensor deception attacks at the [17] D. Ye, T.-Y. Zhang, Summation detector for false data-injection
supervisory layer of cyber–physical systems, Automatica 121 (2020) attack in cyber-physical systems, IEEE Trans. Cybern. 50 (6) (2020)
109172. 2338–2345.
[3] M. Li, Y. Chen, Y. Liu, Sliding-mode secure control for jump cyber– [18] A. Ashok, M. Govindarasu, V. Ajjarapu, Online detection of stealthy
physical systems with malicious attacks, J. Franklin Inst. B 358 (7) false data injection attacks in power system state estimation, IEEE
(2021) 3424–3440. Trans. Smart Grid 9 (3) (2018) 1636–1646.
[4] D. Ding, et al., A survey on security control and attack detection for [19] N. Chowdhury, J. Belikov, D. Baimel, et al., Observer-based detection
industrial cyber-physical systems, Neurocomputing 275 (31) (2018) and identification of sensor attacks in networked CPSs, Automatica
1674–1683. 121 (2020) 109166.
[5] L. An, G. Yang, Decentralized adaptive fuzzy secure control for [20] Y. Guan, X. Ge, Distributed attack detection and secure estimation of
nonlinear uncertain interconnected systems against intermittent DoS networked cyber-physical systems against false data injection attacks
attacks, IEEE Trans. Cybern. 49 (3) (2019) 827–838. and jamming attacks, IEEE Trans. Signal Inf. Process. over Netw. 4
[6] Y.A. Li, P. Zhang, L.A. Ma, Denial of service attack and defense (1) (2018) 48–59.
method on load frequency control system, J. Franklin Inst. B 356 [21] A.Y. Lu, G.H. Yang, Secure luenberger-like observers for cyber–
(15) (2019) 8625–8645. physical systems under sparse actuator and sensor attacks, Automatica
[7] M. Li, Y. Chen, Wide-area robust sliding mode controller for power 98 (2018) 124–129.
systems with false data injection attacks, IEEE Trans. Smart Grid 11 [22] Y. Shoukry, P. Tabuada, Event-triggered state observers for sparse
(2) (2020) 922–930. sensor noise/attacks, IEEE Trans. Automat. Control 61 (8) (2016)
[8] B. Xie, et al., A novel trust-based false data detection method for 2079–2091.
power systems under false data injection attacks, J. Franklin Inst. B [23] L. Gao, B. Chen, L. Yu, Fusion-based FDI attack detection in cyber-
358 (1) (2021) 56–73. physical systems, IEEE Trans. Circuits Syst. II Express Briefs 67 (8)
[9] B. Chen, Y. Niu, Y. Zou, Security control for Markov jump system (2020) 1487–1491.
with adversarial attacks and unknown transition rates via adap- [24] Z. Cheng, et al., Detection-based weighted H∞ LFC for multi-area
tive sliding mode technique, J. Franklin Inst. B 356 (6) (2019) power systems under DoS attacks, IET Control Theory Appl. 13 (12)
3333–3352. (2019) 1909–1919.
[10] B. Chen, D.W.C. Ho, G. Hu, L. Yu, Secure fusion estimation for [25] X. He, Z. Wang, Y.D. Ji, D.H. Zhou, Robust fault detection for
bandwidth constrained cyber-physical systems under replay attacks, networked systems with distributed sensors, IEEE Trans. Aerosp.
IEEE Trans. Cybern. 48 (6) (2018) 1862–1876. Electron. Syst. 47 (1) (2011) 166–177.
[11] W. Ao, Y. Song, C. Wen, Adaptive cyber-physical system attack [26] S. Yin, G. Wang, H.R. Karimi, Data-driven design of robust fault
detection and reconstruction with application to power systems, IET detection system for wind turbines, Mechatronics 24 (4) (2014)
Control Theory Appl. 10 (12) (2016) 1458–1468. 298–306.
[12] W. Ao, Y. Song, C. Wen, et al., Finite time attack detection and [27] X. Li, X. Shen, A data-driven attack detection approach for DC servo
supervised secure state estimation for cpss with malicious adversaries, motor systems based on mixed optimization strategy, IEEE Trans. Ind.
Inf. Sci. 451–452 (2018) 67–82. Inform. 16 (9) (2020) 5806–5813.
[13] A. Patel, S. Purwar, Event triggered detection of cyber attacks on load [28] S. Li, C.K. Ahn, Z. Xiang, Decentralized sampled-data control for
frequency control, IET Cyber-Phys. Syst. Theory Appl. 5 (3) (2020) cyber-physical systems subject to DoS attacks, IEEE Syst. J. 15 (4)
263–273. (2021) 5126–5134.
[14] X. Wang, X. Luo, Y. Zhang, X. Guan, Detection and isolation of false [29] Y. Liu, Y. Chen, M. Li, Dynamic event-based model predictive load
data injection attacks in smart grids via nonlinear interval observer, frequency control for power systems under cyber attacks, IEEE Trans.
IEEE Internet Things J. 6 (4) (2019) 6498–6512. Smart Grid 12 (1) (2021) 715–725.
663