Skip to main content

False Data Injection Attacks Against Networked Predictive Output Tracking Control Systems

  • Chapter
  • First Online:
Networked Predictive Control of Systems with Communication Constraints and Cyber Attacks
  • 419 Accesses

Abstract

This chapter discusses the design problem of stealthy FDI attacks against NCSs from the viewpoint of malicious attackers. A Kalman filter-based networked predictive output tracking control method is proposed for networked MIMO stochastic linear systems, where random network-induced delays, packet disorders, and packet dropouts in the feedback and forward channels are considered. To destroy the stability of the resulting closed-loop networked system without being detected by a detector based on an output residual, stealthy FDI attacks are designed against the measurement data in the feedback channel and the control commands in the forward channel, respectively, and the corresponding attack conditions are derived. Both simulation and experimental results are given to show the effectiveness of the proposed methods.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Kwon, C., Liu, W., Hwang, I.: Security analysis for cyber-physical systems against stealthy deception attacks. In: Proceedings of the American Control Conference, pp. 3344–3349 (2013)

    Google Scholar 

  2. Liberzon, D.: Switching in Systems and Control. Birkhäuser, Boston (2003)

    Book  Google Scholar 

  3. Manandhar, K., Cao, X., Hu, F., Liu, Y.: Detection of faults and attacks including false data injection attack in smart grid using kalman filter. IEEE Trans. Control Netw. Syst. 1(4), 370–379 (2014)

    Article  MathSciNet  Google Scholar 

  4. Matni, N., Oishi, M.: Stability of switched block upper-triangular linear systems with switching delay: application to large distributed systems. In: Proceedings of the American Control Conference, pp. 1440–1445 (2011)

    Google Scholar 

  5. Mo, Y., Sinopoli, B.: False data injection attacks in control systems. In: Preprints of the 1st Workshop on Secure Control Systems, pp. 1–6 (2010)

    Google Scholar 

  6. Mo, Y., Chabukswar, R., Sinopoli, B.: Detecting integrity attacks on SCADA systems. IEEE Trans. Control Syst. Technol. 22(4), 1396–1407 (2014)

    Article  Google Scholar 

  7. Niu, R., Huie, L.: System state estimation in the presence of false information injection. In: Proceedings of the IEEE Statistical Signal Processing Workshop, pp. 385–388 (2012)

    Google Scholar 

  8. Pang, Z.H., Liu, G.P., Zhou, D., Hou, F., Sun, D.: Two-channel false data injection attacks against output tracking control of networked systems. IEEE Trans. Ind. Electron. 63(5), 3242–3251 (2016)

    Article  Google Scholar 

  9. Teixeira, A., Amin, S., Sandberg, H., Johansson, K.H., Sastry, S.S.: Cyber security analysis of state estimators in electric power systems. In: Proceedings of the 49th IEEE Conference on Decision and Control, pp. 5991–5998 (2010)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zhong-Hua Pang .

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Pang, ZH., Liu, GP., Zhou, D., Sun, D. (2019). False Data Injection Attacks Against Networked Predictive Output Tracking Control Systems. In: Networked Predictive Control of Systems with Communication Constraints and Cyber Attacks. Springer, Singapore. https://doi.org/10.1007/978-981-13-0520-7_11

Download citation

Publish with us

Policies and ethics