Coding sensor outputs for injection attacks detection

Fei Miao, Quanyan Zhu, Miroslav Pajic, George J. Pappas

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

This paper considers a method of coding the sensor outputs in order to detect stealthy false data injection attacks. An intelligent attacker can design a sequence of data injection to sensors that pass the state estimator and statistical fault detector, based on knowledge of the system parameters. To stay undetected, the injected data should increase the state estimation errors while keep the estimation residues in a small range.We employ a coding matrix to the original sensor outputs to increase the estimation residues, such that the alarm will be triggered by the detector even under intelligent data injection attacks. This is a low cost method compared with encryption over sensor communication networks. We prove the conditions the coding matrix should satisfy under the assumption that the attacker does not know the coding matrix yet. An iterative optimization algorithm is developed to compute a feasible coding matrix, and, we show that in general, multiple feasible coding matrices exist.

Original languageEnglish (US)
Title of host publicationProceedings of the IEEE Conference on Decision and Control
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages5776-5781
Number of pages6
Volume2015-February
EditionFebruary
DOIs
StatePublished - Feb 11 2015
Event2014 53rd IEEE Annual Conference on Decision and Control, CDC 2014 - Los Angeles, United States
Duration: Dec 15 2014Dec 17 2014

Other

Other2014 53rd IEEE Annual Conference on Decision and Control, CDC 2014
CountryUnited States
CityLos Angeles
Period12/15/1412/17/14

Fingerprint

Injection
Coding
Attack
Sensor
Output
Sensors
Detectors
Detector
State estimation
Telecommunication networks
Cryptography
State Estimation
Estimation Error
Communication Networks
Encryption
Iterative Algorithm
Sensor Networks
Optimization Algorithm
Fault
Estimator

ASJC Scopus subject areas

  • Control and Systems Engineering
  • Modeling and Simulation
  • Control and Optimization

Cite this

Miao, F., Zhu, Q., Pajic, M., & Pappas, G. J. (2015). Coding sensor outputs for injection attacks detection. In Proceedings of the IEEE Conference on Decision and Control (February ed., Vol. 2015-February, pp. 5776-5781). [7040293] Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/CDC.2014.7040293

Coding sensor outputs for injection attacks detection. / Miao, Fei; Zhu, Quanyan; Pajic, Miroslav; Pappas, George J.

Proceedings of the IEEE Conference on Decision and Control. Vol. 2015-February February. ed. Institute of Electrical and Electronics Engineers Inc., 2015. p. 5776-5781 7040293.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Miao, F, Zhu, Q, Pajic, M & Pappas, GJ 2015, Coding sensor outputs for injection attacks detection. in Proceedings of the IEEE Conference on Decision and Control. February edn, vol. 2015-February, 7040293, Institute of Electrical and Electronics Engineers Inc., pp. 5776-5781, 2014 53rd IEEE Annual Conference on Decision and Control, CDC 2014, Los Angeles, United States, 12/15/14. https://doi.org/10.1109/CDC.2014.7040293
Miao F, Zhu Q, Pajic M, Pappas GJ. Coding sensor outputs for injection attacks detection. In Proceedings of the IEEE Conference on Decision and Control. February ed. Vol. 2015-February. Institute of Electrical and Electronics Engineers Inc. 2015. p. 5776-5781. 7040293 https://doi.org/10.1109/CDC.2014.7040293
Miao, Fei ; Zhu, Quanyan ; Pajic, Miroslav ; Pappas, George J. / Coding sensor outputs for injection attacks detection. Proceedings of the IEEE Conference on Decision and Control. Vol. 2015-February February. ed. Institute of Electrical and Electronics Engineers Inc., 2015. pp. 5776-5781
@inproceedings{3cc93e9438784033a83aea664937dc9d,
title = "Coding sensor outputs for injection attacks detection",
abstract = "This paper considers a method of coding the sensor outputs in order to detect stealthy false data injection attacks. An intelligent attacker can design a sequence of data injection to sensors that pass the state estimator and statistical fault detector, based on knowledge of the system parameters. To stay undetected, the injected data should increase the state estimation errors while keep the estimation residues in a small range.We employ a coding matrix to the original sensor outputs to increase the estimation residues, such that the alarm will be triggered by the detector even under intelligent data injection attacks. This is a low cost method compared with encryption over sensor communication networks. We prove the conditions the coding matrix should satisfy under the assumption that the attacker does not know the coding matrix yet. An iterative optimization algorithm is developed to compute a feasible coding matrix, and, we show that in general, multiple feasible coding matrices exist.",
author = "Fei Miao and Quanyan Zhu and Miroslav Pajic and Pappas, {George J.}",
year = "2015",
month = "2",
day = "11",
doi = "10.1109/CDC.2014.7040293",
language = "English (US)",
volume = "2015-February",
pages = "5776--5781",
booktitle = "Proceedings of the IEEE Conference on Decision and Control",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
edition = "February",

}

TY - GEN

T1 - Coding sensor outputs for injection attacks detection

AU - Miao, Fei

AU - Zhu, Quanyan

AU - Pajic, Miroslav

AU - Pappas, George J.

PY - 2015/2/11

Y1 - 2015/2/11

N2 - This paper considers a method of coding the sensor outputs in order to detect stealthy false data injection attacks. An intelligent attacker can design a sequence of data injection to sensors that pass the state estimator and statistical fault detector, based on knowledge of the system parameters. To stay undetected, the injected data should increase the state estimation errors while keep the estimation residues in a small range.We employ a coding matrix to the original sensor outputs to increase the estimation residues, such that the alarm will be triggered by the detector even under intelligent data injection attacks. This is a low cost method compared with encryption over sensor communication networks. We prove the conditions the coding matrix should satisfy under the assumption that the attacker does not know the coding matrix yet. An iterative optimization algorithm is developed to compute a feasible coding matrix, and, we show that in general, multiple feasible coding matrices exist.

AB - This paper considers a method of coding the sensor outputs in order to detect stealthy false data injection attacks. An intelligent attacker can design a sequence of data injection to sensors that pass the state estimator and statistical fault detector, based on knowledge of the system parameters. To stay undetected, the injected data should increase the state estimation errors while keep the estimation residues in a small range.We employ a coding matrix to the original sensor outputs to increase the estimation residues, such that the alarm will be triggered by the detector even under intelligent data injection attacks. This is a low cost method compared with encryption over sensor communication networks. We prove the conditions the coding matrix should satisfy under the assumption that the attacker does not know the coding matrix yet. An iterative optimization algorithm is developed to compute a feasible coding matrix, and, we show that in general, multiple feasible coding matrices exist.

UR - http://www.scopus.com/inward/record.url?scp=84931846645&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84931846645&partnerID=8YFLogxK

U2 - 10.1109/CDC.2014.7040293

DO - 10.1109/CDC.2014.7040293

M3 - Conference contribution

VL - 2015-February

SP - 5776

EP - 5781

BT - Proceedings of the IEEE Conference on Decision and Control

PB - Institute of Electrical and Electronics Engineers Inc.

ER -