False data injection attack method based on imprecise mathematical model

A mathematical model and injection attack technology, which is applied to instruments, adaptive control, control/regulation systems, etc., can solve problems such as it is difficult for attackers to establish mathematical models

Inactive Publication Date: 2018-06-22
BEIJING INSTITUTE OF TECHNOLOGYGY
View PDF5 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in modern control systems usually have high-dimensional, random noise and other characteristics, it is difficult for an attacker to establish an accurate mathematical model

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • False data injection attack method based on imprecise mathematical model
  • False data injection attack method based on imprecise mathematical model
  • False data injection attack method based on imprecise mathematical model

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0016] The present invention will be described in detail below with reference to the accompanying drawings and examples.

[0017] The invention provides a false data injection attack method based on an imprecise mathematical model. The design principle of the method is: from the perspective of the attacker, design a false data attack sequence according to the identified imprecise mathematical model, aiming at destroying the control system. performance without being detected by the detector.

[0018] First of all, it needs to be explained that the controlled object model in the present invention is a linear discrete time-invariant system

[0019]

[0020] where x(k)∈R n is the state vector, u(k)∈R m is the input vector, y(k)∈R q is the output vector, ω(k) and υ(k) are independent Gaussian white noise with zero mean covariance Q and R respectively, n, m, q represent the dimensions of the state vector, input vector, and output vector, respectively, A, B, C are the model pa...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a false data injection attack method based on an imprecise mathematical model, which can successfully destroy the performance of a control system without being detected by a detector. Sensor readings and control commands are stolen from network channels; imprecise mathematical model parameters for a controlled object are recognized; a false data attack sequence is designed according to the recognized imprecise mathematical model parameters and the sensor readings and control commands; the false data attack sequence is injected into the sensor readings to form false sensor readings; the false sensor readings are transmitted to a controller; the controller detects whether a system is abnormal according to the false sensor readings; control commands are generated according to the false sensor readings and transmitted to the controlled object. The false data injection attack method based on the imprecise mathematical model is applicable to testing the defense effectof a control system for false data injection attacks, and a test means is provided for the design of defense methods.

Description

technical field [0001] The invention relates to a false data injection attack method based on an imprecise mathematical model, belongs to the field of control system security, is suitable for testing the defense effect of a cyber physics system against false data injection attacks, and provides testing means for the design of the defense method. Background technique [0002] Cyber-physical system is the close integration and in-depth cooperation of computing resources and physical resources, and has a wide range of application fields, such as: smart grid, intelligent transportation, chemical process control, medical and health care, etc. With the widespread application of cyber-physical systems, especially in critical infrastructure, security issues have become a key issue restricting the development of cyber-physical systems. The controller in the cyber-physical system and the controlled object transmit information through the network, and the attacker can steal sensor read...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G05B13/04
CPCG05B13/042
Inventor 孙健侯方圆陈杰
Owner BEIJING INSTITUTE OF TECHNOLOGYGY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products