Next Article in Journal
Dynamic Response of a Polyvinylidene Fluoride (PVDF) Sensor Embedded in a Metal Structure Using Ultrasonic Additive Manufacturing
Previous Article in Journal
Feasibility of Hydrostatic Transmission in Community Wind Turbines
Previous Article in Special Issue
Observer-Based Active Control Strategy for Networked Switched Systems against Two-Channel Asynchronous DoS Attacks
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Research on Secure State Estimation and Recovery Control for CPS under Stealthy Attacks

College of Intelligence Science and Technology, National University of Defense Technology, Changsha 410073, China
*
Author to whom correspondence should be addressed.
Actuators 2023, 12(11), 427; https://doi.org/10.3390/act12110427
Submission received: 26 September 2023 / Revised: 10 November 2023 / Accepted: 13 November 2023 / Published: 17 November 2023
(This article belongs to the Special Issue Sensor and Actuator Attacks of Cyber-Physical Systems)

Abstract

:
As the application of cyber-physical systems (CPSs) becomes more and more widespread, its security is becoming a focus of attention. Currently, there has been much research on the security defense of the physical layer of the CPS. However, most of the research only focuses on one of the aspects, for example, attack detection, security state estimation, or recovery control. Obviously, the effectiveness of security defense targeting only one aspect is limited. Therefore, in this paper, a set of security defense processes is proposed for the case that a CPS containing multiple sensors is subject to three kinds of stealthy attacks (i.e., zero-dynamics attack, covert attack, and replay attack). Firstly, the existing attack detection method based on improved residuals is used to detect stealthy attacks. Secondly, based on the detection results, an optimal state estimation method based on improved Kalman filtering is proposed to estimate the actual state of the system. Then, based on the optimal state, internal model control (IMC) is introduced to complete the recovery control of the system. Finally, the proposed methods are integrated to give a complete security defense process, and the simulation is verified for three kinds of stealthy attacks. The simulation results show that the proposed methods are effective.

1. Introduction

Cyber-physical systems (CPSs) refer to the integration of cyber components (computing and communication) and physical components (sensors and actuators) that interact in a feedback loop, allowing for potential human intervention, interaction, and exploitation [1]. The widespread utilization of CPSs in diverse sectors such as power transmission, healthcare, communication, military, transportation, automotive, entertainment, and others has a direct and profound impact on everyday life, underscoring their immense importance [2,3]. Nonetheless, the growing integration of the cyber and physical domains has given rise to novel and perilous security challenges. Notably, previous occurrences have illustrated the susceptibility of CPSs. The Sapphire worm, which emerged in 2003, resulted in substantial disruption to websites and internet services [4]. In the year 2010, the Stuxnet virus was specifically designed to attack Iran’s nuclear power plant, causing significant damage to its centrifuges and resulting in the reactor being non-functional for a prolonged duration [5]. Similarly, the WannaCry ransomware attack on the National Health Service in 2017 had severe consequences in terms of both human casualties and financial losses [6]. These instances highlight the potential ramifications of attacks on CPSs, which can significantly impact individuals’ lives. Consequently, the study of CPS security holds significant importance.
The security defense challenges in CPSs can be classified into two distinct layers: the cyber layer and the physical layer. The defense mechanisms employed in the cyber layer bear a striking resemblance to those utilized in safeguarding information networks. For example, safeguarding against network attacks can be accomplished by employing encryption keys [7], detecting watermarks [8], and imposing access rights restrictions [9]. The tight integration of CPSs with physical devices introduces a distinctive aspect wherein attacks on the cyber layer can extend their impact to the physical processes themselves. This phenomenon is particularly conspicuous in the realm of automatic control systems, resulting in compromised control performance. Consequently, the protection of the physical layer assumes paramount importance due to its role as the final barrier of defense and its ability to offer substantial defensive benefits.
The security defense problem for the physical layer of CPS can be divided into several stages: attack detection, secure state estimation, and secure control [10]. Among them, each of them has a different and necessary function. However, most of the studies focus on one of these phases for analysis and discussion only.
To tackle the issue of detecting attacks, a proposed solution in [11] suggests a blended detection approach. This approach combines two established detection methods to effectively identify a broad spectrum of false data injection attacks. In a recent study [12], a novel strategy for moving target defense is introduced. This strategy involves the integration of random and time-varying parameters into the control system, with the aim of obstructing attackers from devising stealthy attack sequences. Moreover, a novel control architecture is presented in reference [13], which employs watermark signals and auxiliary systems to identify spoofing attacks that have an adverse effect on the network control system, while simultaneously maintaining control performance. Another method proposed in reference [14] introduces an improved residual-based detection technique that is specifically tailored for the identification of stealthy attacks on omnidirectional mobile robots (OMRs). Additionally, there has been significant research conducted on observer-based detection methods for identifying integrity attacks, including replay attacks, zero-dynamics attacks, covert attacks, and others [15,16,17].
Various methods have been proposed to ensure secure state estimation in CPSs. One method that can be employed to address switching signals and spurious measurement attacks, and to ensure resilient state estimation, is the utilization of a Bayesian approach based on random sets [18]. In reference [19], a robust asymptotic fault estimation technique is developed specifically for CPSs that experience sensor faults. This technique enables accurate estimation of the system state. Addressing the problem of secure reconstruction in linear CPSs that encounter sparse attacks on both actuators and sensors, a descriptor-switched sliding mode observer is proposed in [20]. This observer is designed to effectively reconstruct the sparse false data injection (FDI) attacks and the system state. In reference [21], a comprehensive solution is presented which combines detection and fusion techniques. This solution is based on the utilization of Kullback–Leibler divergences (KLD) between local posteriors. By employing this approach, the exchange of raw sensor data is eliminated, while simultaneously ensuring secure state estimation. In the study conducted by [22], the distributed dynamic state estimation algorithm was designed. This algorithm utilizes optimal filters and graph theory to obtain local and neighboring gains, thereby improving the accuracy of state estimation. Additionally, a novel approach is presented in [23] for constructing two detection variables that do not rely on the invertibility of the covariance matrix. Subsequently, a multiple information fusion algorithm is developed based on the obtained detection results.
Several approaches have been proposed to ensure secure control in CPS. One potential strategy involves implementing an architectural framework for resilient CPS through the utilization of stochastic model predictive control (MPC). This framework is designed with the objective of attaining robustness in the presence of stochastic uncertainty and ensuring resilient control against cyber attacks [24]. In reference [25], a comprehensive system model incorporating uncertainty is constructed through the analysis of diverse cyber attacks. Subsequently, robust control theory is employed to ensure secure control of the system following an attack. A model predictive switching control strategy is proposed in [26] to address the issue of untrusted data sequences resulting from false data injection attacks. This strategy is based on attack perception and aims to compensate for the impact of such attacks. The paper [27] centers its attention on the utilization of network-based modeling and proportional–integral (PI) control techniques for a continuous-time direct-drive-wheel system that operates within a wireless network environment. Additionally, the problem of event-triggered synchronization of master–slave neural networks under deception attacks is investigated in [28]. The study proposes appropriate output feedback controllers using the Lyapunov–Krasovskii functional method. Additionally, a novel approach to the analysis of the H∞ performance in discrete-time networked systems, considering network-induced delays and malicious packet dropouts, is presented in reference [29]. The effectiveness of this approach is demonstrated through the application of an inverted pendulum system.
The growing utilization of CPSs has resulted in a heightened emphasis on the security aspects associated with it. Nevertheless, it is worth noting that current research endeavors in the field of CPS security defense tend to focus on isolated facets, thereby neglecting a holistic and all-encompassing approach. In this paper, we examine a particular scenario in which a CPS with multiple sensors is susceptible to stealthy cyber attacks, including zero-dynamics attacks, covert attacks, and replay attacks [30]. To tackle this issue, we present a comprehensive framework for the process of security defense. This framework incorporates an attack detection method that relies on enhanced residuals [31], an optimal state estimation utilizing improved Kalman filtering, and a recovery control strategy based on the optimal state. By integrating these components, a comprehensive security defense process is established, encompassing attack detection and recovery control. The validity of the proposed framework is established through the utilization of design simulations, which demonstrate the feasibility and effectiveness of our method in addressing the security challenges encountered by CPSs. This comprehensive approach addresses the existing research gap by considering the entire security defense process, thereby making a significant contribution to the enhancement of CPS security.
The main contributions of this paper can be summarized as follows.
(1)
For the case of attacks on a CPS containing multiple sensors, an optimal state estimation method based on improved Kalman filtering is proposed, which can achieve the estimation of the actual state of the CPS after the attack.
(2)
Based on the estimated optimal state, a recovery control strategy is designed. And, combined with the detection method based on improved residuals, a framework for the security defense process is given.
The rest of this paper is organized as follows. In Section 2, the CPS structure and stealthy attacks are described, and the improved residual-based attack detection method is presented. In Section 3, the optimal state estimation based on the improved Kalman filter and the recovery control strategy based on the optimal state are proposed, and a complete framework of the security defense process is given. Simulation experiments are designed in Section 4, and the results are analyzed and illustrated. Section 5 summarizes the full work and provides an outlook for future work.

2. Model Building and Detection Methods

2.1. System Modelling

The block diagram of the CPS structure with multiple actuators and sensors considering the case of sensor attacks, actuator attacks, and process attacks is shown in Figure 1. The CPS structure consists of two main components: the plant side and the monitoring side. The plant side includes physical devices, actuators, and sensors. The monitoring side utilizes data from measurement channels to remotely control physical devices. The monitoring side controls the actuators by sending control commands to enable desired functions or actions. On the plant side, multiple sensors independently measure the state of the system and transmit this information to the monitoring side, which then generates control commands. Each sensor can provide a partial or complete system state independently. A multi-sensor selection and fusion module is incorporated into the monitoring side to acquire the final system state for generating control commands. This module applies principles or methods to combine the different system states obtained from sensors. In this CPS structure, attackers primarily target the measurement and actuation channels, as well as directly attack the physical devices, which can have detrimental effects on the CPS.
The CPS model with multiple sensors, considering the case of containing attacks, is constructed as:
{ x ( k + 1 ) = A x ( k ) + B ( u ( k ) + a u ( k ) ) + E P a p ( k ) + w ( k ) , y s i , a ( k ) = C s i x ( k ) + D ( u ( k ) + a u ( k ) ) + a y i ( k ) + F P a p ( k ) + v i ( k ) , y a ( k ) = Φ ( y s 1 , a | y s 2 , a | | y s n , a ) .   i = 1 , 2 , , n
where x ( k ) R p is the state of the system, u ( k ) R m is the control command signal output from the monitoring side of the system, u a ( k ) R m ( u a ( k ) = u ( k ) + a u ( k ) ) is the control signal input to the plant side after the attack, y s i , a ( k ) R n is the measurement output of the i th sensor after the attack, y a ( k ) R n is the system output after multi-sensor selection and fusion, a u ( k ) denotes the attack against the actuation channel, a p ( k ) denotes the process attack, and a y i ( k ) denotes the attack against the i th measurement channel. Φ ( y s 1 , a | y s 2 , a | | y s n , a ) denotes some multi-sensor fusion method. E P and F P are known matrices indicating the locations of components in the system that may be subject to process attacks. A , B , C s i , and D are the parameter matrices of the system. C s i denotes the corresponding output matrix when only the i th sensor is considered. w ( k ) denotes the process noise and v i ( k ) denotes the measurement noise of the ith sensor, both obeying w ( k ) N ( 0 , Σ w ) , v i ( k ) N ( 0 , Σ v i ) .
Remark 1. 
Process attacks refer to attacks that are directly applied to physical devices, causing direct damage to the physical devices. On the other hand, actuator attacks and sensor attacks involve actions such as blocking or tampering with signal transmission channels. Given that process attacks directly cause damage to physical devices and may not require further defensive measures, this paper focuses solely on studying the security defense of CPSs when actuator attacks or sensor attacks are present.
Remark 2. 
The type of attack mentioned in (1) is of additive attack and does not change the model parameters. Here, a multiplicative attack that causes changes in the model parameters due to functional anomalies of the system, in the process or sensors and actuators due to cyber attacks, is not considered.
Consider the CPS shown in Figure 1 where the observer-based residual detector is defined at the monitoring side as follows.
r o ( k ) = y a ( k ) C x ^ ( k )
where y a ( k ) R m denotes the measurement under attack and x ^ ( k ) R n is the state estimated by the observer. r 0 ( k ) is the residual signal that satisfies r 0 ( k ) N ( 0 , Σ r 0 ) .
According to the χ 2 test, the residual evaluation function J ( ) can be written as
J ( r 0 ( k ) ) = r 0 T ( k ) Σ r 0 1 r 0 ( k ) ~ χ 2 ( m )
So, the logic law of detection to determine the presence of an attack is expressed as
{ J ( r 0 ( k ) ) J t h a t t a c k f r e e J ( r 0 ( k ) ) > J t h a t t a c k e d
When the false alarm rate α is given, the threshold J t h is set to the upper bound of χ α 2 ( m ) .

2.2. Description of Stealthy Attacks

For integrity stealthy attacks, the following definition is first given.
Definition 1. 
When there is an attack in the system, given a false alarm rate α , and the attack cannot be detected based on the residual signal r 0 ( k ) using the detection logic given in (4), then the attack is said to be stealthy from the detector given in (2).
According to the definition of stealthy attacks, three types of stealthy attacks are introduced.
(1)
Zero-dynamics attack: It requires complete knowledge of the system model to design attack signals against the actuators. It evades the detector of (3) by adding the attack signal a u ( k ) to the actuator input without affecting the sensor measurement output, i.e., a y ( k ) = 0 [32]. Therefore, the attack form can be expressed as a u ( k ) = υ k g , where the system zero υ and the corresponding input zero direction g can be calculated by solving the following equation.
[ υ I A B C 0 ] [ x 0 g ] = [ 0 0 ]
where x 0 is the initial state of the system for which the input sequence a u ( k ) results in an identically zero output.
(2)
Covert attack: It also requires complete knowledge of the system model and attacks against both actuation channels and measurement channels. In the actuation channels, the performance of the control system is affected by applying an additive signal a u ( k ) ; however, in the measurement channels, the effect of the input attack on the measurement is eliminated by carefully designing a signal a y ( k ) [33]. Given the discrete linear model in (1), a y ( k ) can be calculated by the following equation.
a y ( k ) : = C i = 0 k 1 ( A i B a u ( k 1 i ) )
(3)
Replay attack: It does not require knowledge of the system model. It only needs to be able to access the signal transmission channels, to attack the control signals, and to record and re-cover the measurement data. The replay attack can be specifically described as [34]: in the measurement channels, the measurement data in the steady-state of the system are recorded in advance, and the actual measurement values are overwritten with the recorded data when the attack is performed (i.e., y ( k ) = y ( k τ ) , τ > 0 ); while in the actuation channels, a u ( k ) is designed to affect the performance of the system. Obviously, the replay attack is stealthy in the steady-state of the system.
Remark 3. 
Zero-dynamics attack, covert attack, and replay attack are all additive attacks and satisfy the stealthy condition of Definition 1. In addition, zero-dynamics attack and covert attack require complete knowledge of the system model to evade the detection mechanism of (3), while replay attack does not require it and it is stealthy when the system is stable.

2.3. Detection Method

The analysis of stealthy attacks reveals that their core purpose is to attack the actuators to make the control performance by attacking the actuators. On the other hand, attacks against the sensors aim to evade the detection mechanism described in (3). The detection of stealthy attacks can be achieved by exploiting the differences between the states of the system on the monitoring side and the plant side [31]. The detection scheme, as shown in Figure 2, is designed for a system that contains only one sensor capable of independently measuring the full state of the system. The specific working principle is described below.
On the monitoring side, the observer is constructed in the following form:
{ x ^ M ( k + 1 ) = A x ^ M ( k ) + B u ( k ) + L ( y a ( k ) y ^ a ( k ) ) y ^ a ( k ) = C x ^ M ( k ) + D u ( k )
On the plant side, the observer is constructed in the following form:
{ x ^ P ( k + 1 ) = A x ^ P ( k ) + B u a ( k ) + L ( y ( k ) y ^ ( k ) ) y ^ ( k ) = C x ^ P ( k ) + D u a ( k )
From (7) and (8), it can be found that when there is no attack, x ^ P ( k ) = x ^ M ( k ) ; when there is an attack, x ^ P ( k ) x ^ M ( k ) . This is because the states on both sides are estimated based on different signals. Therefore, this difference can be used for the detection of stealthy attacks. Also, to avoid the attack when x P ( k ) is transmitted to the monitoring side, the following form of the transmission signal is designed:
β ( k ) = κ ( x ^ P ( k ) )
where κ ( ) indicates a certain encryption policy, which is known only to the system itself.
Therefore, the residual signal used to detect stealthy attacks can be constructed as:
r β ( k ) = β ( k ) κ ( x ^ M ( k ) )

3. State Estimation and Recovery Control

The CPS is susceptible to a range of stealthy cyber-attacks, which have a substantial impact on its control performance. Undoubtedly, the primary focus for both attackers and defenders lies in determining strategies to enhance the control performance of the control system, thereby achieving their respective attack and defense objectives. Therefore, it is imperative to have a comprehensive controller design solution that is capable of detecting, isolating, and recovering control from stealthy cyber attacks.
Consider a CPS as shown in Figure 1 containing multiple actuators as well as multiple sensors that can be independently measured to obtain the complete system output. The analysis of stealthy attacks in Section 2 shows that the key to their stealthy implementation lies in the tampering with the sensor measurement output, while the attack on the actuators is only to achieve the purpose of the attack and control the specific actions of the system. Therefore, considering n sensors Π s = { s 1 , s 2 , , s n } , there are unknown sensors suffering from the attack, and the specific attacks are described as follows.
y s i , a ( k ) = { y s i ( k ) a t t a c k f r e e y s i ( k ) + a y i ( k ) a t t a c k e d   , i = 1 , 2 , , n .
Without knowing which sensor is under attack, it is undesirable to directly fuse the sensor output data using the multi-sensor fusion method Φ ( y s 1 , a | y s 2 , a | | y s n , a ) . Therefore, each sensor must be detected in advance and the sensor detected as being under attack must be isolated, and finally, the normal sensors are selected for fusion to obtain the correct system state for recovery control.

3.1. Optimal State Estimation Based on Improved Kalman Filtering

To detect whether each sensor is under attack, the detection method described in Section 2 is used to calculate the residual signal for each sensor, allowing for the identification of stealthy attacks, assuming that the residual signals for all sensors are calculated as follows:
Θ = { r β s 1 ( k ) , r β s 2 ( k ) , , r β s n ( k ) }
According to the χ 2 detection theory [14], drawing on the detection logic of (3) and (4), the detection of stealthy attacks can be achieved for each sensor:
{ J ( r β s i ( k ) ) J t h β a t t a c k f r e e J ( r β s i ( k ) ) > J t h β a t t a c k e d   , i = 1 , 2 , , n
Assuming that the set of residual signals of the sensors that detected the attack is denoted as
Θ a = { r β s i , a ( k ) Θ | s i Π s } Θ
After detecting the sensors under attack, they need to be isolated and the remaining normal sensors are used to estimate the system state. Therefore, weighting factors are introduced to achieve isolation and fusion according to (12) and (14). That is, the fusion function Φ ( y s 1 , a | y s 2 , a | | y s n , a ) in (1) is constructed in the following form:
Φ ( y s 1 , a | y s 2 , a | | y s n , a ) = i = 1 n ε i y s i , a ( k )
where ε i is the weight value corresponding to each sensor calculated from the residual signal r β ( k ) , calculated as shown below.
ε i = { 0 , r β s i ( k ) Θ a ( r β s i ( k ) 1 r β s i ( k ) ) 1 ,   r β s i ( k ) Θ Θ a
From (16), it can be found that once a sensor detects an attack, its corresponding weighting factor is set to 0, while sensors that are not detecting an attack are weighted and fused according to the corresponding residuals. These residuals provide insights into the extent of state deviation, causing larger residuals to correspond to lower weighting factors during the calculation process.
Then, according to the explanations in Remarks 1 and 2, the model of CPS shown in (1) can be simplified to the following form without considering process attacks:
{ x ( k + 1 ) = A x ( k ) + B ( u ( k ) + a u ( k ) ) + w ( k ) y s i , a ( k ) = C s i x ( k ) + D ( u ( k ) + a u ( k ) ) + a y i ( k ) + v i ( k ) y a ( k ) = i = 1 n ε i y s i , a ( k )
where y s i , a ( k ) is the measurement output of the i th sensor after attacking and C s i is the corresponding system output matrix.
Meanwhile, on the monitoring side, the state estimation equation and the observation estimation equation for (17) are:
{ x ^ ( k + 1 | k ) = A x ^ ( k | k ) + B u ( k ) y ^ s i , a ( k + 1 | k ) = C s i x ^ ( k + 1 | k ) + D u ( k ) y ^ a ( k + 1 | k ) = i = 1 n ε i y ^ s i , a ( k + 1 | k )
where y ^ s i , a ( k + 1 | k ) is the value estimated at moment k for the measurement output of the i th attacked sensor at moment k + 1 .
Then, the state error covariance matrix P ( k + 1 | k ) can be calculated as follows:
P ( k + 1 | k ) = cov { x ( k + 1 ) x ^ ( k + 1 | k ) } = cov { A x ( k ) + B ( u ( k ) + a u ( k ) ) + w ( k ) A x ^ ( k | k ) B u ( k ) } = cov { A ( x ( k ) x ^ ( k | k ) ) + B a u ( k ) + w ( k ) } = A P ( k | k ) A T + B Σ a u B T + Σ w
where Σ a u is the covariance matrix of the attack signal a u ( k ) and Σ w is the covariance matrix of the process noise w ( k ) .
Similarly, the observation error covariance matrix S ( k + 1 ) can be calculated as follows:
S ( k + 1 ) = cov { y a ( k + 1 ) y ^ a ( k + 1 | k ) } = cov { i = 1 n ε i ( C s i ( x ( k + 1 ) x ^ ( k + 1 | k ) ) + D a u ( k ) + a y i ( k ) + v i ( k ) ) } = i = 1 n ε i 2 ( C s i P ( k + 1 | k ) C s i T + D Σ a u D T + Σ a y i + Σ v i )
where Σ a y i is the covariance matrix of the attack signal a y i ( k ) and Σ v i is the covariance matrix of the measurement noise v i ( k ) .
The goal of Kalman filtering is for an iterative estimation expression based on errors that can be continuously corrected, in the form shown below:
x ^ ( k + 1 | k + 1 ) = x ^ ( k + 1 | k ) + W e ˜ ( k + 1 )
where W is the Kalman gain matrix and e ˜ ( k + 1 ) is the observation estimation error, defined as
e ˜ ( k + 1 ) = y a ( k + 1 ) y ^ a ( k + 1 | k )
The solution procedure for W is as follows:
P ( k + 1 | k + 1 ) = cov { x ( k + 1 ) x ^ ( k + 1 | k + 1 ) } = cov { x ( k + 1 ) x ^ ( k + 1 | k ) W ( y a ( k + 1 ) y ^ a ( k + 1 | k ) ) } = cov { ( I W i = 1 n ε i C s i ) ( x ( k + 1 ) x ^ ( k + 1 | k ) ) W i = 1 n ε i ( D a u ( k ) + a y i ( k ) + v i ( k ) ) } = ( I W i = 1 n ε i C s i ) P ( k + 1 | k ) ( I W i = 1 n ε i C s i ) T + i = 1 n ε i 2 ( W D Σ a u D T W T + W Σ a y i W T + W Σ v i W T )
Expanding (23) into the form of a trace:
trace ( P ( k + 1 | k + 1 ) ) = P ( k + 1 | k ) ( W i = 1 n ε i C s i ) P ( k + 1 | k ) P ( k + 1 | k ) ( W i = 1 n ε i C s i ) T + ( W i = 1 n ε i C s i ) P ( k + 1 | k ) ( W i = 1 n ε i C s i ) T + i = 1 n ε i 2 ( W D Σ a u D T W T + W Σ a y i W T + W Σ v i W T )
trace ( P ( k + 1 | k + 1 ) ) to W by taking the partial derivative and making it equal to 0 to compute the optimal W :
W trace ( P ( k + 1 | k + 1 ) ) = 2 P ( k + 1 | k ) ( i = 1 n ε i C s i ) T + 2 W S ( k + 1 ) = 0
Finally, the optimal W can be obtained:
W = P ( k + 1 | k ) ( i = 1 n ε i C s i ) T S ( k + 1 )
Then, substituting (23) into (19) again, the iterative form of the state error covariance matrix can be obtained by simplification:
P ( k + 1 | k ) = A ( I W i = 1 n ε i C s i ) P ( k | k 1 ) A T + B Σ a u B T + Σ w
In conclusion, considering isolation and fusion of the attacked sensors, the optimal state estimation based on the improved Kalman filtering can be summarized as
{ x ^ ( k + 1 | k ) = A x ^ ( k | k ) + B u ( k ) x ^ ( k | k ) = ( I W i = 1 n ε i C s i ) x ^ ( k | k 1 ) i = 1 n ε i W D u ( k 1 ) + W y a ( k ) W = P ( k | k 1 ) ( i = 1 n ε i C s i ) T [ i = 1 n ε i 2 ( C s i P ( k | k 1 ) C s i T + D Σ a u D T + Σ a y i + Σ v i ) ] 1 P ( k + 1 | k ) = A ( I W i = 1 n ε i C s i ) P ( k | k 1 ) A T + B Σ a u B T + Σ w

3.2. The Recovery Control Strategy Based on Optimal State

In the context of security defense in CPSs, the goal is to ensure that the system can maintain normal operation even after an attack. Therefore, once an attack is detected using the method described in Section 2 and attack isolation and system state estimation are performed according to the method in Section 3, the next step is to implement recovery control for the system based on the obtained results. This section presents an optimal state-based recovery control strategy and provides a comprehensive overview of attack detection, attack isolation, state estimation, and recovery control. It outlines a complete framework for protecting CPS security, as depicted in Figure 3.
In control systems, the primary control objectives are to ensure stable tracking of the reference input and meet the control requirements. The internal model control (IMC) has a wide range of applications in the control field. It enables the system to track the reference input asymptotically with zero steady-state error. This paper proposes a solution to the recovery control problem of CPS under attacks. It introduces an integration link of the reference input signal by combining IMC with the optimal state. This approach aims to achieve stable operation of the attacked system based on the target command.
The reference input signal γ ( k ) is generated by the following model:
{ γ ( k ) = x γ γ ˙ ( k ) = 0
Also, the tracking error e ( k ) is defined:
e ( k ) = y a ( k ) γ ( k )
Then, the state space can be extended as follows:
( e ( k + 1 ) z ( k + 1 ) ) = [ 0 C 0 A ] ( e ( k ) z ( k ) ) + [ 0 B ] ( u ( k ) u ( k 1 ) )
where z ( k ) denotes the difference of the state variable x ( k ) , i.e., z ( k ) = x ( k ) x ( k 1 ) .
If the system shown in (31) is controllable, then a set of feedback control signals can be designed to make the system stable, i.e.,
u ( k ) u ( k 1 ) = [ F 1 F 2 ] ( e ( k ) z ( k ) )
This means that the tracking error e ( k ) is stable. Therefore, the system is then able to track the reference input signal with zero steady-state error. Integrating (33), the feedback control signal inside the system is obtained as
u ( k ) = F 1 i = 1 k e ( k ) F 2 x ( k )
Since the state x ( k ) of the system cannot be obtained directly, the optimal state estimate x ^ ( k | k ) is obtained by an improved Kalman filtering method and used to replace the true state x ( k ) in (34).

4. Simulation Results

In this section, a practical simulation is carried out to demonstrate the effectiveness of the proposed optimal state estimation method and recovery control strategy.

4.1. Simulation Setup

Consider a four-wheeled Omnidirectional Mobile Robot (OMR) with the system parameters shown below [14]:
A = [ 0.1759 8.0754 × 10 4 0.0000 8.0754 × 10 4 0.1759 0.0000 0.0000 0.0000 0.0675 ] ,   B = [ 0.0299 0.0299 0.0299 0.0299 0.0299 0.0299 0.0299 0.0299 0.0887 0.0887 0.0887 0.0887 ]
It is assumed that the mobile robot contains three independent sensors, each of which can independently measure partial or complete state information. So, the matrix of system output parameters corresponding to each sensor is given as
C s 1 = [ 0.9 0 0 0 0.9 0 0 0 0.9 ] ,   C s 2 = [ 0.8 0 0 0 0.8 0 0 0 0.8 ] ,   C s 3 = [ 0.6 0 0 0 0.6 0 0 0 0.6 ]
The state variables x = [ x ˙ , y ˙ , θ ˙ ] T of the OMR are the X-axis and Y-axis travel velocity and rotation angular velocity in the robot coordinate system. The process noise is set to w ( k ) N ( 0 , 0.001 ) and the measurement noise of the three sensors is set to v 1 ( k ) N ( 0 , 0.008 ) , v 2 ( k ) N ( 0 , 0.005 ) , and v 3 ( k ) N ( 0 , 0.003 ) respectively.
In the recovery control, the feedback matrix of (34) is set to:
F = [ F 1 F 2 ] = [ 0.8721 0.8356 0.2802 0.8660 0.8306 0.2839 0.8760 0.8369 0.2956 0.8700 0.8293 0.2919 4.5969 4.4453 1.8020 4.5894 4.4127 1.8089 4.6138 4.4478 1.8594 4.6064 4.4102 1.8526 ]
On the monitoring side, the expected movement strategy is set to drive forward in a straight line with a speed of x ˙ ( k ) = 0.5 from the initial state x ( k ) = [ 0 , 0 , 0 ] T , during which the output of the sensor s 1 is mainly used, i.e., the sensor fusion module is set to: Φ ( y s 1 , a | y s 2 , a | y s 3 , a ) = 0.9 y s 1 , a + 0.05 y s 2 , a + 0.05 y s 3 , a . Without considering the attack, the normal state of the mobile robot is shown in Figure 4.
Remark 4. 
In all figures of this paper, the asterisk superscript (i.e., *) indicates that the results obtained using the method proposed in this paper were used. In contrast, the absence of the asterisk superscript indicates that the results obtained by the method proposed in this paper were not used.

4.2. Results Discussion

4.2.1. Zero-Dynamics Attack

Zero-dynamics attack is mainly stealthy by designing the attack signal a u ( k ) , and there is no direct attack signal to attack the measurement channels. Therefore, in the simulation, the measurement output matrix C s 1 of the sensor s 1 is used to solve (5) and assume that the sensor s 1 does not have access to the rotational state information. The parameters related to the zero-dynamics attack design in (5) are calculated as follows and injected into the actuation channels at k > 300 .
υ = 1.008 , g = [ 0.0803 ; 0.0803 ; 0.0803 ; 0.0803 ]
The real state, estimated state, and fused measurement output of the OMR with and without taking the proposed approach in this paper after the injection attack are given in Figure 5. From Figure 5b,d, it can be found that the real state of the OMR can be basically estimated using the method proposed in this paper, and the fused measurement output can also show the real state of the system very well.
After detecting the attack and estimating the correct state of the OMR, recovery control is introduced, as shown in Figure 6, which shows the system after adding recovery control. From the figure, by taking recovery control, the rotation angular velocity of the OMR can be adjusted so that it will no longer rotate.

4.2.2. Covert Attack

The main purpose of the covert attack is the attack on the actuation channels. Therefore, at the simulation moment k > 300 , the attack target is set to x a ( k ) = [ 1 , 0 , 0 ] T , i.e., after injecting the attack, the resulting state of the OMR is straight ahead with a speed of 1 m/s. Also, to satisfy the stealthy condition, the attack signal is added to the sensor s 1 according to (6) without attacking the other two sensors.
The real state, estimated state, and fused measurement output of the OMR with and without taking the proposed approach in this paper after the injection attack are given in Figure 7. From Figure 7a, it is found that a better estimation of the system state can be achieved when the state of the OMR is estimated by adopting the method proposed in this paper. In this case, the actual state is 1 m/s, while the average value of the estimated state is 1.07 m/s. In addition, Figure 7b also demonstrates that the fused measurement output after detection is also valid.
Figure 8 illustrates the change in the system state after taking recovery control at k > 600 . The results show that the OMR can restore the normal driving state by adopting the recovery control strategy.

4.2.3. Replay Attack

According to the production conditions of the replay attack, the attacked sensor is s 1 , the target x a ( k ) = [ 0 , 0.3 , 0 ] T . The attack strategy is described as follows: collect the output data of the sensor s 1 for 100 < k < 300 , inject the attack at k > 300 , continuously overwrite the output data of the sensor s 1 with the previously collected data, and simultaneously calculate a u ( k ) injected into the actuation channels according to the attack target x a ( k ) .
The real state, estimated state, and fused measurement output of the OMR with and without taking the proposed approach in this paper after the injection attack are given in Figure 9. Figure 10 illustrates the change in the system state after taking recovery control at k > 600 . The results show that the OMR can restore the normal driving state by adopting the recovery control strategy.

5. Conclusions

This paper introduces a comprehensive framework that addresses the security defense of CPSs. The framework encompasses three key components: attack detection, secure state estimation, and recovery control. The proposed processes hold significant importance in enhancing the security of CPSs. To commence, an analysis is conducted on the structural characteristics of CPSs, resulting in the development of a state-space model that encompasses sensor attacks, actuator attacks, and process attacks. A comprehensive description of the three different categories of stealthy attacks is provided. Next, we employ an existing attack detection method that is based on improved residuals to effectively detect these stealthy attacks. Building upon the obtained detection results, this study proposes an optimal state estimation method that utilizes an improved Kalman filtering approach. This method allows for precise estimation of the true state of the system. Finally, the utilization of internal model control is proposed to enhance system recovery control through the utilization of optimal state estimation. Simulation verification showcases the exceptional efficacy of the proposed methods in achieving secure state estimation and recovery control. In our future research endeavors, our objective is to tackle the nonlinearity inherent in CPSs and investigate more advanced attack behaviors to further strengthen the defense mechanisms of CPSs. Additionally, the integration of artificial intelligence and reinforcement learning methodologies into the stage of system recovery presents promising prospects for enhancing the overall security of the system.

Author Contributions

Conceptualization, L.X., B.Y. and Z.L.; Data curation, B.Y.; Formal analysis, L.X.; Funding acquisition, Z.L.; Methodology, B.Y., L.X. and Z.L.; Writing—original draft, B.Y.; Writing—review and editing, B.Y., L.X. and Z.L. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the National Natural Science Foundation of China grant number 52232013.

Data Availability Statement

Data are contained within the article.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Ashibani, Y.; Mahmoud, Q.H. Cyber physical systems security: Analysis, challenges and solutions. Comput. Secur. 2017, 68, 81–97. [Google Scholar] [CrossRef]
  2. Yaacoub, J.P.A.; Salman, O.; Noura, H.N.; Kaaniche, N.; Chehab, A.; Malli, M. Cyber-physical systems security: Limitations, issues and future trends. Microprocess. Microsyst. 2020, 77, 103201. [Google Scholar] [CrossRef]
  3. Humayed, A.; Lin, J.; Li, F.; Luo, B. Cyber-physical systems security—A survey. IEEE Internet Things J. 2017, 4, 1802–1831. [Google Scholar] [CrossRef]
  4. Wright, A. On Sapphire and type-safe languages. Commun. ACM 2003, 46, 120. [Google Scholar] [CrossRef]
  5. Peng, Y.; Lu, T.; Liu, J.; Gao, Y.; Guo, X.; Xie, F. Cyber-physical system risk assessment. In Proceedings of the Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Beijing, China, 16–18 October 2013; pp. 442–447. [Google Scholar]
  6. Adams, C. Learning the lessons of WannaCry. Comput. Fraud Secur. 2018, 2018, 6–9. [Google Scholar] [CrossRef]
  7. Li, C.; Guan, L.; Lin, J.; Luo, B.; Cai, Q.; Jing, J.; Wang, J. Mimosa: Protecting private keys against memory disclosure attacks using hardware transactional memory. IEEE Trans. Dependable Secur. Comput. 2019, 18, 1196–1213. [Google Scholar] [CrossRef]
  8. Rubio-Hernan, J.; De Cicco, L.; Garcia-Alfaro, J. On the use of watermark-based schemes to detect cyber-physical attacks. EURASIP J. Inf. Secur. 2017, 2017, 1–25. [Google Scholar] [CrossRef]
  9. Patil, N.V.; Rama Krishna, C.; Kumar, K. Distributed frameworks for detecting distributed denial of service attacks: A comprehensive review, challenges and future directions. Concurr. Comput. Pract. Exp. 2021, 33, e6197. [Google Scholar] [CrossRef]
  10. Dibaji, S.M.; Pirani, M.; Flamholz, D.B.; Annaswamy, A.M.; Johansson, K.H.; Chakrabortty, A. A systems and control perspective of CPS security. Annu. Rev. Control 2019, 47, 394–411. [Google Scholar] [CrossRef]
  11. Ghaderi, M.; Gheitasi, K.; Lucia, W. A blended active detection strategy for false data injection attacks in cyber-physical systems. IEEE Trans. Control Netw. Syst. 2020, 8, 168–176. [Google Scholar] [CrossRef]
  12. Griffioen, P.; Weerakkody, S.; Sinopoli, B. A moving target defense for securing cyber-physical systems. IEEE Trans. Autom. Control 2020, 66, 2016–2031. [Google Scholar] [CrossRef]
  13. Ghaderi, M.; Gheitasi, K.; Lucia, W. A novel control architecture for the detection of false data injection attacks in networked control systems. In Proceedings of the 2019 American Control Conference, Philadelphia, PA, USA, 10–12 July 2019; pp. 139–144. [Google Scholar]
  14. Yang, B.; Xin, L.; Long, Z. An improved Residual-based detection method for stealthy anomalies on mobile robots. Machines 2022, 10, 446. [Google Scholar] [CrossRef]
  15. Ding, S.X.; Yang, G.; Zhang, P.; Ding, E.L.; Jeinsch, T.; Weinhold, N.; Schultalbers, M. Feedback control structures, embedded residual signals, and feedback control schemes with an integrated residual access. IEEE Trans. Control Syst. Technol. 2009, 18, 352–367. [Google Scholar] [CrossRef]
  16. Mo, Y.; Weerakkody, S.; Sinopoli, B. Physical authentication of control systems: Designing watermarked control inputs to detect counterfeit sensor outputs. IEEE Control Syst. Mag. 2015, 35, 93–109. [Google Scholar]
  17. Yang, W.; Zheng, Z.; Chen, G.; Tang, Y.; Wang, X. Security analysis of a distributed networked system under eavesdropping attacks. IEEE Trans. Circuits Syst. II Express Briefs 2019, 67, 1254–1258. [Google Scholar] [CrossRef]
  18. Forti, N.; Battistelli, G.; Chisci, L.; Sinopoli, B. A Bayesian approach to joint attack detection and resilient state estimation. In Proceedings of the 2016 IEEE 55th Conference on Decision and Control, Las Vegas, NV, USA, 12–14 December 2016; pp. 1192–1198. [Google Scholar]
  19. Zhang, K.; Jiang, B.; Ding, S.X.; Zhou, D. Robust asymptotic fault estimation of discrete-time interconnected systems with sensor faults. IEEE Trans. Cybern. 2020, 52, 1691–1700. [Google Scholar] [CrossRef]
  20. Yang, H.; Yin, S.; Han, H.; Sun, H. Sparse actuator and sensor attacks reconstruction for linear cyber-physical systems with sliding mode observer. IEEE Trans. Ind. Inform. 2021, 18, 3873–3884. [Google Scholar] [CrossRef]
  21. Liu, X.; Ngai, E.C.H.; Liu, J. Secure information fusion using local posterior for distributed cyber-physical systems. IEEE Trans. Mob. Comput. 2020, 20, 2041–2054. [Google Scholar] [CrossRef]
  22. Rana, M.M.; Bo, R.; Abdelhadi, A. Distributed grid state estimation under cyber attacks using optimal filter and Bayesian approach. IEEE Syst. J. 2020, 15, 1970–1978. [Google Scholar] [CrossRef]
  23. Chen, G.; Zhang, Y.; Gu, S.; Hu, W. Resilient state estimation and control of cyber-physical systems against false data injection attacks on both actuator and sensors. IEEE Trans. Control Netw. Syst. 2021, 9, 500–510. [Google Scholar] [CrossRef]
  24. Chen, J.; Shi, Y. Stochastic model predictive control framework for resilient cyber-physical systems: Review and perspectives. Philos. Trans. R. Soc. A 2021, 379, 20200371. [Google Scholar] [CrossRef] [PubMed]
  25. Ge, H.; Yue, D.; Xie, X.; Deng, S.; Dou, C. A unified modeling of muti-sources cyber-attacks with uncertainties for CPS security control. J. Frankl. Inst. 2021, 358, 89–113. [Google Scholar] [CrossRef]
  26. Wang, Z.; Zhang, B.; Xu, X.; Usman; Li, L. Research on cyber-physical system control strategy under false data injection attack perception. Trans. Inst. Meas. Control 2022, 01423312211069371. [Google Scholar] [CrossRef]
  27. Zhang, D.; Han, Q.L.; Zhang, X.M. Network-based modeling and proportional–integral control for direct-drive-wheel systems in wireless network environments. IEEE Trans. Cybern. 2019, 50, 2462–2474. [Google Scholar] [CrossRef] [PubMed]
  28. Kazemy, A.; Lam, J.; Zhang, X.M. Event-triggered output feedback synchronization of master–slave neural networks under deception attacks. IEEE Trans. Neural Netw. Learn. Syst. 2020, 33, 952–961. [Google Scholar] [CrossRef] [PubMed]
  29. Zhang, X.M.; Han, Q.L.; Ge, X. A novel approach to H∞ performance analysis of discrete-time networked systems subject to network-induced delays and malicious packet dropouts. Automatica 2020, 136, 110010. [Google Scholar] [CrossRef]
  30. Xin, L.; Yang, B.; Long, Z. The sensor-actuators stealthy cyber-attacks framework on networked control systems: A data-driven approach. Asian J. Control 2023. [Google Scholar] [CrossRef]
  31. Ding, S.X.; Li, L.; Zhao, D.; Louen, C.; Liu, T. Application of the unified control and detection framework to detecting stealthy integrity cyber-attacks on feedback control systems. Automatica 2022, 142, 110352. [Google Scholar] [CrossRef]
  32. Teixeira, A.; Shames, I.; Sandberg, H.; Johansson, K.H. A secure control framework for resource-limited adversaries. Automatica 2015, 51, 135–148. [Google Scholar] [CrossRef]
  33. Smith, R.S. Covert misappropriation of networked control systems: Presenting a feedback structure. IEEE Control Syst. Mag. 2015, 35, 82–92. [Google Scholar]
  34. Mo, Y.; Sinopoli, B. Secure control against replay attacks. In Proceedings of the 2009 47th Annual Allerton Conference on Communication, Control, and Computing, Monticello, IL, USA, 30 September–2 October 2009; pp. 911–918. [Google Scholar]
Figure 1. Block diagram of CPS structure with multiple actuators and sensors considering sensor attacks, actuator attacks, and process attacks.
Figure 1. Block diagram of CPS structure with multiple actuators and sensors considering sensor attacks, actuator attacks, and process attacks.
Actuators 12 00427 g001
Figure 2. The scheme of attack detection based on improved residual.
Figure 2. The scheme of attack detection based on improved residual.
Actuators 12 00427 g002
Figure 3. The security defense process of CPS includes attack detection, secure state estimation, and recovery control.
Figure 3. The security defense process of CPS includes attack detection, secure state estimation, and recovery control.
Actuators 12 00427 g003
Figure 4. The normal state and fused measurement output of the OMR when no attack is added: (a) is the normal state; (b) is the fused measurement output.
Figure 4. The normal state and fused measurement output of the OMR when no attack is added: (a) is the normal state; (b) is the fused measurement output.
Actuators 12 00427 g004
Figure 5. The real state, estimated state, and fused measured output of the OMR with and without taking the proposed approach in this paper after the injection attack: (a) is the real state and estimated state of the X-axis velocity; (b) is the real state and estimated state of the rotation angular velocity; (c) is the fused measurement output of the X-axis velocity; (d) is the fused measurement output of the rotation angular velocity.
Figure 5. The real state, estimated state, and fused measured output of the OMR with and without taking the proposed approach in this paper after the injection attack: (a) is the real state and estimated state of the X-axis velocity; (b) is the real state and estimated state of the rotation angular velocity; (c) is the fused measurement output of the X-axis velocity; (d) is the fused measurement output of the rotation angular velocity.
Actuators 12 00427 g005
Figure 6. The situation of the OMR after adding recovery control: (a) is the situation of the X-axis velocity; (b) is the situation of the rotation angular velocity.
Figure 6. The situation of the OMR after adding recovery control: (a) is the situation of the X-axis velocity; (b) is the situation of the rotation angular velocity.
Actuators 12 00427 g006
Figure 7. The real state, estimated state, and fused measured output of the OMR with and without taking the proposed approach in this paper after the injection attack: (a) is the real state and estimated state of the X-axis velocity; (b) is the fused measurement output of the X-axis velocity.
Figure 7. The real state, estimated state, and fused measured output of the OMR with and without taking the proposed approach in this paper after the injection attack: (a) is the real state and estimated state of the X-axis velocity; (b) is the fused measurement output of the X-axis velocity.
Actuators 12 00427 g007
Figure 8. The change in the system state after taking recovery control.
Figure 8. The change in the system state after taking recovery control.
Actuators 12 00427 g008
Figure 9. The real state, estimated state, and fused measured output of the OMR with and without taking the proposed approach in this paper after the injection attack: (a) is the real state and estimated state of the X-axis velocity; (b) is the real state and estimated state of the Y-axis velocity; (c) is the fused measurement output of the X-axis velocity; (d) is the fused measurement output of the Y-axis velocity.
Figure 9. The real state, estimated state, and fused measured output of the OMR with and without taking the proposed approach in this paper after the injection attack: (a) is the real state and estimated state of the X-axis velocity; (b) is the real state and estimated state of the Y-axis velocity; (c) is the fused measurement output of the X-axis velocity; (d) is the fused measurement output of the Y-axis velocity.
Actuators 12 00427 g009
Figure 10. The situation of the OMR after adding recovery control: (a) is the situation of the X-axis velocity; (b) is the situation of the Y-axis velocity.
Figure 10. The situation of the OMR after adding recovery control: (a) is the situation of the X-axis velocity; (b) is the situation of the Y-axis velocity.
Actuators 12 00427 g010
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Yang, B.; Xin, L.; Long, Z. Research on Secure State Estimation and Recovery Control for CPS under Stealthy Attacks. Actuators 2023, 12, 427. https://doi.org/10.3390/act12110427

AMA Style

Yang B, Xin L, Long Z. Research on Secure State Estimation and Recovery Control for CPS under Stealthy Attacks. Actuators. 2023; 12(11):427. https://doi.org/10.3390/act12110427

Chicago/Turabian Style

Yang, Biao, Liang Xin, and Zhiqiang Long. 2023. "Research on Secure State Estimation and Recovery Control for CPS under Stealthy Attacks" Actuators 12, no. 11: 427. https://doi.org/10.3390/act12110427

APA Style

Yang, B., Xin, L., & Long, Z. (2023). Research on Secure State Estimation and Recovery Control for CPS under Stealthy Attacks. Actuators, 12(11), 427. https://doi.org/10.3390/act12110427

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop