Next Article in Journal
Dynamic Mission Planning Framework for Collaborative Underwater Operations Using Behavior Trees
Previous Article in Journal
Efficient Modeling of Underwater Target Radiation and Propagation Sound Field in Ocean Acoustic Environments Based on Modal Equivalent Sources
Previous Article in Special Issue
Distributed Robust Predefined-Time Sliding Mode Control for AUV-USV Heterogeneous Multi-Agent Systems Based on Memory Event-Triggered Mechanism Under Input Saturation
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Fast Detection of FDI Attacks and State Estimation in Unmanned Surface Vessels Based on Dynamic Encryption

School of Computer and Artificial Intelligence, Ludong University, Yantai 264001, China
*
Authors to whom correspondence should be addressed.
J. Mar. Sci. Eng. 2025, 13(8), 1457; https://doi.org/10.3390/jmse13081457
Submission received: 17 June 2025 / Revised: 23 July 2025 / Accepted: 26 July 2025 / Published: 30 July 2025
(This article belongs to the Special Issue Control and Optimization of Ship Propulsion System)

Abstract

Wireless sensor networks (WSNs) are used for data acquisition and transmission in unmanned surface vessels (USVs). However, the openness of wireless networks makes USVs highly susceptible to false data injection (FDI) attacks during data transmission, which affects the sensors’ ability to receive real data and leads to decision-making errors in the control center. In this paper, a novel dynamic data encryption method is proposed whereby data are encrypted prior to transmission and the key is dynamically updated using historical system data, with a view to increasing the difficulty for attackers to crack the ciphertext. At the same time, a dynamic relationship is established among ciphertext, key, and auxiliary encrypted ciphertext, and an attack detection scheme based on dynamic encryption is designed to realize instant detection and localization of FDI attacks. Further, an H fusion filter is designed to filter external interference noise, and the real information is estimated or restored by the weighted fusion algorithm. Ultimately, the validity of the proposed scheme is confirmed through simulation experiments.

1. Introduction

Cyber–physical systems (CPSs) are becoming increasingly important in modern science and technology, especially in areas such as ocean monitoring and defense [1,2,3]. CPSs closely integrate computational, cyber, and physical processes, enabling systems to sense and respond to environmental changes in real time [4,5,6]. Wireless sensor networks (WSNs), as integrated systems, usually integrate multiple sensors and information sources, such as Global Navigation Satellite Systems (GNSSs), Doppler Velocimeters (DVLs), Inertial Navigation Systems (INSs), and so on, at their core [7,8]. Through the effective combination of CPSs and wireless sensor networks, CPSs show great potential in data acquisition, processing, and transmission. Unmanned surface vessels (USVs), as a key application of this system [9,10,11], rely on WSNs for real-time data collection and transmission for efficient monitoring and decision making in the marine environment [12,13].
The reliability of data is directly related to the USV’s ability to perform its mission [14,15,16], especially in the complex maritime environment and under potential cyberattacks, where ensuring the authenticity and integrity of the data is of particular importance. In USV applications, WSNs enable these vessels to efficiently perform data acquisition and real-time monitoring in a vast marine environment. By integrating data from different sensors, USVs are able to quickly adapt to complex marine environments, enhancing their operational efficiency and safety. During data measurement and transmission, the data are susceptible to a variety of external disturbances, including marine environmental disturbances (e.g., the effects of wind, waves, currents, etc., on USVs) and signal disturbances, which can lead to variations in the data, further exacerbating the uncertainty in the system’s decision making and thus affecting the safety and efficiency of USVs. To make data transmission more accurate, the use of WSNs and H fusion filtering techniques is beneficial. Recently, the rapid development of H filtering technology has provided a new solution for data processing in complex systems [17,18,19]. With its superior anti-interference ability, this technology can effectively filter external interference noise and improve the reliability and accuracy of data. By fusing data from different sensors, H fusion filtering can significantly improve the accuracy of the data, thus enhancing the autonomous decision-making level of USVs. This is essential to the autonomous navigation and operation of USVs in dynamic and uncertain marine environments.
Although USVs show great advantages in data acquisition and transmission, their high reliance on wireless communication also exposes them to potential cybersecurity threats, especially in terms of false data injection (FDI) attacks [20,21,22]. FDI attacks are cyberattacks that mislead the system’s decision making by tampering with or falsifying data, and the attacker can influence the behavior of the USVs through these false data, leading to wrong navigation and decision making. FDI attacks are highly stealthy, and malicious attackers are potentially able to inject false information into USVs through wireless networks without being detected [23,24,25]. Such attacks can not only mislead USVs’ mission execution, e.g., wrong course selection or improper action strategies, but also lead to more serious consequences, such as personnel casualties. In addition, FDI attacks may also cause a chain reaction to other USV-dependent data systems, affecting the overall efficiency of maritime surveillance and defense. Therefore, the development of effective protective measures and data processing strategies has become urgent.
To date, multiple researchers have considered FDI attacks. For example, Chen et al. [26] developed a framework capable of simultaneously estimating system states and FDI attack signals under FDI and denial-of-service attacks and implementing compensatory control. At the same time, a novel co-design methodology was developed. The method is capable of estimating and compensating unknown FDI attacks without relying on any a priori constraints on the frequency, duration, or derivatives of the FDI attack signals and effectively suppressing their negative impacts. The compensation method is effective against jamming attacks; however, the FDI attack is detected only after the injection into the system, i.e., after the system state information has been tampered with.
To address the above FDI detection issues, Xia et al. [27] proposed a distributed detection method which consists of two steps: a kernel entropy-based discrimination scheme identifies secure nodes and attacked nodes by calculating the kernel entropy of the measured data between nodes, while a state-aware scheme enables each node to monitor its own state and filter reliable neighboring nodes. The method theoretically derives the conditions that guarantee the stability of the algorithm’s mean value and reveals how its performance changes under an FDI attack.
Zhang et al. [28] introduced an adaptive backstepping technique into nonlinear CPSs and integrated a dynamic surface control technique which successfully overcomes the computational complexity (combinatorial explosion) problem existing in the traditional backstepping method. The method significantly reduces the computational burden by bypassing the direct complex computation of higher-order systems through the stepwise design of virtual control inputs. In addition, they developed a novel defense strategy centered on a nonlinear interference observer. The strategy is capable of accurately estimating the external composite disturbances and substantially improving the system robustness. The nonlinear disturbance observer dynamically estimates the magnitude of the disturbance and its trend by monitoring the system state and output in real time, enabling the controller to compensate accordingly in real time, thus effectively enhancing the system’s stability when it is subjected to attacks and disturbances. Although the above methods have a certain degree of fault tolerance and FDI attack resistance, they do not solve the privacy protection problem in the data transmission process.
Li et al. [29] designed a low-computational-complexity encryption scheme for data based on random matrices to achieve instant detection and localization of FDI attacks during local estimation transmission. Using the results of the encryption detection scheme, a secure fusion estimation algorithm was proposed. The algorithm is able to discard the attacked local estimation information and use only the unattacked local estimation information for fusion estimation. Although the method proposed in the article has significant advantages in terms of privacy protection of data, the static key it uses lacks forward security, and the entire cryptographic detection scheme will fail once it is intercepted on the transmission link or restored through brute force decryption.
Hence, improving the ability of USVs to protect data privacy against FDI attacks and ensuring the accuracy of data estimation through dynamic key management and data encryption techniques have become very meaningful and urgent research focuses. The primary contributions of this paper can be outlined as follows:
(1)
A novel dynamic data encryption scheme for privacy protection during data transmission is proposed. The scheme encrypts the data before data transmission and dynamically updates the key by utilizing historical system data, which increases the difficulty for attackers to crack the ciphertext compared with the literature [29].
(2)
Establishment of a dynamic relationship between the ciphertext, the key, and the auxiliary encrypted ciphertext. Once the ciphertext or auxiliary encrypted ciphertext is maliciously tampered with, the dynamic relationship is destroyed. Based on this feature, we design an attack detection scheme based on dynamic data encryption. The scheme can detect FDI attacks in real time and immediately discard the damaged data.
(3)
H fusion filters are proposed to suppress external noise and interference during data measurement and transmission. The weighted fusion algorithm fuses the data that have not received the attack to more accurately estimate and restore the real signal, ensuring the information integrity and reliability of USVs during data transmission.
The organization of this paper is as follows: Section 2 develops the system model for the problem under consideration; Section 3 details the proposed dynamic data encryption scheme and the FDI attack detection method; Section 4 introduces the design of the H fusion filter and explores its applications; Section 5 employs simulation experiments to validate the performance of the proposed scheme.
Notations: R n × n denotes the n-dimensional Euclidean space, and I and 0 represent the identity matrix and the zero matrix of appropriate dimensions, respectively. The transpose of a matrix is indicated by the superscript T. For any matrix X R n × n , the condition X > 0 (   X < 0 ) defines X as a real symmetric positive definite matrix (or a real symmetric negative definite matrix). ⊕ represents the XOR operator.

2. System Description

Since USVs are susceptible to interference by unpredictable environmental factors such as wind and wave currents during navigation, they not only directly change their motion attitude but also introduce uncertainty noise in their motion control system and sensor measurement data. As shown in Figure 1, when USVs transmit data to the sensors via a wireless network, the communication link may be subjected to an FDI attack, which tampers with the transmitted data, resulting in the distortion of the sensor reception, which in turn leads to wrong decision making by the control center.
Based on [14], the mathematical model of the motion of USVs can be described as η ˙ = J ( φ ) v , M v ˙ = D v + τ + d ( t ) . In which η = [ u , v , r ] T represents the position vector of the vessel and consisting of north-east position ( χ , μ ) and yaw angle σ [ 0 ,   2 π ] , and v = u , ν , r T denotes the USV velocity vector in the vessel coordinate system, which consists of longitudinal u, transverse ν , and yaw angular velocities r. The rotation matrix J ( φ ) is expressed as
J ( φ ) = cos φ sin φ 0 sin φ cos φ 0 0 0 1
Based on [30], a class of discrete-time multi-sensor network systems are modeled as follows:
x k + 1 = A x k + B ω k y i , k = H i , k x k + v i , k z k = L x k
where x k = [ P x , k , P y , k , σ k ] T denotes the position state information, x k = η k , ( P x , k , P y , k ) denotes the position coordinates, σ k denotes the yaw. x k and y i , k are the system state and measured output of the ith sensor at moment k, respectively. z k is the state to be estimated. ω k R n ω is an unknown external disturbance, and v i , k is measurement noise belonging to l 2 0 ,   . Matrices A, B, H i , k , and L have the appropriate dimensions.
At time instant k, each sensor receives a packet from the USV containing the ciphertext and its auxiliary encrypted ciphertext. The detector applies an attack detection scheme to the packet and discards any packet that has been maliciously altered by an attacker; subsequently, it performs a decryption operation on the ciphertext in any legitimate packet. However, marine environmental disturbances (e.g., the effects of wind, waves, and currents on USVs) are inevitable during data transmission. These disturbances introduce system state noise, which in turn leads to biased data. Therefore, H fusion filtering is used to filter the interference noise and estimate or restore the real information by the weighted fusion algorithm.
As shown in Figure 1, during the transmission of data packets, a malicious attacker may launch an FDI attack on unknown data in the communication links to tamper with these data., whereas in a multi-sensor system, due to the limited resources of the attackers, it is unlikely that they can attack all communication links at the same time [31]. Therefore, it is reasonable to assume that there is at least one unattacked communication link in a multi-sensor system. This assumption ensures that the sensors receive at least one true system state. If all of them were attacked, then the sensors would not be able to obtain reliable data.

3. Encryption Attack Detection Scheme

This section designs an attack detection method incorporating dynamic data encryption, aiming to achieve real-time identification of FDI attacks. First, a dynamic data encryption mechanism with low computational overhead is constructed to ensure the security of transmitted data. Subsequently, based on this encryption mechanism, a corresponding attack detection scheme is designed. The specific process is shown in Figure 2.

3.1. Dynamic Data Encryption Scheme

As shown in Figure 1, local data x i , k is encrypted using a key c i , k before transmission. Once it reaches the decryptor, it will be restored from it using the decryption scheme. The specific encryption scheme is designed as follows:
c i , 0 = s i , 0 x i , k c = x i , k φ ( c i , k ) E i , k c = x i , k c i , k φ ( c i , k ) c i , k + 1 = x i , k + s i , k
where c i , k R n × n + 1 is the key in the encryption process, s i , k R n × n + 1 is a matrix of random numbers with suitable dimensions, c i , k is updated each time by summing it with s i , k based on the historical system data to achieve dynamic encryption, and c i , 0 = s i , 0 is the given initial key. x i , k c is the ciphertext corresponding to the encryption of x i , k , and E i , k c is the auxiliary encrypted ciphertext used for detecting FDI attacks. The function φ c i , k : R n × n + 1 R n × n + 1 is an arbitrary encryption function about c i , k . For security reasons, the function φ c i , k will be physically implanted during the initial deployment phase. In addition, the encryption function φ c i , k can be selected according to the application scenarios as well as the requirements of computational complexity. After the encryption is completed, the encryptor sends the packet { x i , k c , E i , k c } to the decryptor through the communication network.
To recover the original data x i , k from x i , k c , the decryption scheme is designed as follows:
d i , 0 = s i , 0 x i , k d = x i , k c + φ ( d i , k ) D i , k d = E i , k c + φ ( d i , k ) d i , k + 1 = x i , k d + s i , k
where d i , k R n × n + 1 is the key in the decryption process, x i , k d is the decrypted value of x i , k , and D i , k d is an auxiliary value to be used in an attack detection scheme.
Notations: Under encryption method (3) and decryption method (4), a random matrix s i , k is introduced, which has to be consistent during encryption and decryption. In order to ensure that d i , k is equal to c i , k , the ciphertext x i , k c is recovered as x i , k . In fact, since the use of the same seed when using a random number generator produces unique random sequences, it is possible to use in (3) and (4) the same random number generator seed to ensure the consistency of s i , k , and this is a widely used solution in cryptography [32]. For security reasons, physical implantation of seeds will be used during the initial deployment phase.
In the attack-free case, the following propositions about dynamic data encryption schemes (3) and (4) can be obtained.
Proposition 1.
In the absence of FDI attacks, the following conclusions can be drawn using dynamic data encryption schemes (3) and (4):
x i , k d = x i , k x i , k d D i , k d = d i , k = c i , k
Proof. 
According to dynamic data encryption schemes (3) and (4), d i , k = c i , k is established; when the decryptor receives the data packet { x i , k c , E i , k c } , the decryption process is shown in (6):
x i , k d = x i , k c + φ ( d i , k ) = x i , k φ ( c i , k ) + φ ( d i , k ) = x i , k D i , k d = E i , k c + φ ( d i , k ) = x i , k c i , k φ ( c i , k ) + φ ( d i , k ) = x i , k c i , k
The decrypted data is then examined using the detection scheme to obtain the following results:
x i , k d D i , k d = x i , k x i , k c i , k = c i , k = d i , k
According to the mathematical description of Equations (6) and (7), the correct data can be obtained in the ideal case of no FDI attack, and the attack detection scheme does not detect that the packet suffers from an FDI attack.    □

3.2. Scheme for Detection of Encryption-Based Attacks

Note that from Proposition 1, it is clear that in dynamic data encryption schemes (3) and (4), x i , k d D i , k d = d i , k ; this feature enables us to determine whether the system data have been tampered with by a malevolent attacker. Based on dynamic data encryption schemes (3) and (4), an attack detection scheme as shown in Algorithm 1 is proposed, which can detect whether the data are under FDI attack in a very short time.
Theorem 1.
In the absence of FDI attacks, the original data x i , k can be recovered using Algorithm 1.
Proof. 
In the absence of a cyberattack, x i , k d = x i , k is known from Proposition 1, which implies that the original data x i , k can be recovered using Algorithm 1. Also, x i , k d D i , k d = d i , k = c i , k implies that Case 1 in Algorithm 1 is always satisfied.   □
Remark 1.
In encryption schemes (3) and (4), only XOR operations and basic arithmetic operations are employed, featuring low computational complexity. It enhances data security and keeps the system performance overhead within a negligible range.
Remark 2.
From Theorem 1, the system exists with a specific dynamic relation, i.e., x i , k d D i , k d = d i , k , when there is no FDI attack. This dynamic relation will be changed when subjected to an FDI attack. This property can be used as a sufficient criterion for attack detection and provides a theoretical basis for the cryptographic detection algorithm proposed in this paper.
Algorithm 1: Attack detection algorithm based on dynamic data encryption
Step 1 (encryption process): At moment k, the encryptor executes the encryption process, generates the ciphertext x i , k c and the auxiliary encryption ciphertext E i , k c , and encapsulates them into a data packet { x i , k c , E i , k c } .
Step 2 (data transmission): The encryptor sends the packet to the decryptor through the communication network.
Step 3 (decryption process): When the decryptor receives the received packet, it performs the decryption process.
Step 4 (attack Detection): After the decryption process, the following detection scheme is executed.
        Case 1: If x i , k d D i , k d = d i , k , this received packet is not attacked by FDI. k k + 1 , return to step 1. 
        Case 2: If x i , k d D i , k d d i , k , then this received packet is subject to FDI attack. Discard the data packets received on this communication link this time. k k + 1 , return to step 1. 

4. H Fusion Estimation Under FDI Attack

In data transmission, the effects of complex and variable marine environmental disturbances (e.g., wind-induced offsets and wave-induced impacts) on USVs are unavoidable. These powerful environmental factors can cause unpredictable attitude changes and position drifts in USVs, resulting in increased system state noise and biased data. For this reason, the H fusion filtering technique is used to filter out the noise, and the real state information is estimated by a weighted fusion algorithm.

4.1. The Effectiveness of the Encryption-Based Attack Detection Scheme in Detecting FDI Attacks

In Algorithm 1, x i , k c and E i , k c are packaged and sent to the decryptor via the communication network. It is assumed that the attacker can recognize x i , k c and E i , k c to implement tampering. The attack strategy consists of the following three scenarios:
  • Scenario 1: The attacker modifies only x i , k c as follows:
    x i , k c = x i , k c + a i , k
  • Scenario 2: The attacker modifies only E i , k c as follows:
    E i , k c = E i , k c + b i , k
  • Scenario 3: The attacker modifies both x i , k c and E i , k c as follows:
    x i , k c = x i , k c + a i , k E i , k c = E i , k c + b i , k
where a i , k and b i , k are arbitrary non-zero attack signals of the appropriate dimensions.
Theorem 2.
For Algorithm 1, with the FDI attacks in Equations (8)–(10) in Scenarios 1–3 at time k, the encryption-based attack detection algorithm will trigger an alert immediately from time k onwards.
Proof. 
If the FDI attack in Equation (8) in Scenario 1 starts at time k, the decryption process is as follows:
x i , k d = x i , k c + φ ( d i , k ) = x i , k + a i , k D i , k d = E i , k c + φ ( d i , k ) = x i , k c i , k
Then, the improved format can be obtained as
x i , k d D i , k d = x i , k + a i , k x i , k + c i , k = a i , k c i , k d i , k
If the FDI attack in (9) in Scenario 2 begins at time k, the decryption process is defined as follows:
x i , k d = x i , k c + φ ( d i , k ) = x i , k D i , k d = E i , k c + φ ( d i , k ) = x i , k c i , k + b i , k
Thus, it can be derived that
x i , k d D i , k d = x i , k x i , k c i , k + b i , k = c i , k + b i , k d i , k
From the mathematical description of Equations (11)–(14), it can be seen that Scenario 1 and Scenario 2 always satisfy the Case 2 decision condition in Algorithm 1, which ensures that the encryption-based attack detection algorithm achieves a zero-delay alarm at attack initiation moment k. For the FDI attack corresponding to Scenario 3 (Equation (10)), the consistency conclusion can be obtained by the same methodological derivation, and its proof process is omitted here.

4.2. H Fusion Estimation Based on Fast Attack Detection

Although attack detection algorithms can effectively filter out data tampered with by malicious attackers, the external noise interference inherent in the measurement and transmission process can still lead to biased system state information obtained by the sensors, which in turn affects the accuracy of control decisions. Therefore, the aim of this study is to design an H filter that mitigates the effect of noise on the estimated system state. The H filter is able to effectively cope with the noise and ensure that the system can still provide accurate state estimation and control in the event of noise interference. Then, a secure fusion estimation algorithm is proposed to perform optimal weighted fusion of unattacked data, thereby significantly improving the accuracy of state estimation while ensuring security and enabling more precise estimation and reconstruction of the true signal.
Consider the following local filter structure on sensor i:
x ^ i , k + 1 = A p i x ^ i , k + B p i y i , k z ^ i , k = C p i x ^ i , k
where x ^ k and z ^ k are the estimated values of x k and z k , respectively. A p i , B p i , and C p i are filter parameter matrices to be probe-based.
By introducing the local error z ~ i , k = z k z ^ i , k and combining Equations (2) and (15), the local filtering error system for sensor i is established as follows:
ς i , k = A ¯ i ς i , k 1 + B ¯ i ω k 1 + D ¯ i v i , k 1 z ~ i , k = C ¯ i ς i , k
In order to facilitate the derivation of the formula for the filter performance, the symbols in Equation (16) are denoted as follows: ς i , k = Δ x k x ^ i , k ; A ¯ i = A 0 B p i H i , k A p i ; B ¯ i = B 0 ; C ¯ i = L C p i ; D ¯ i = 0 B p i .
ς i , k represents the state vector of local filtering error, ω k R n ω is the unknown external interference, v i , k is the measurement noise belonging to l 2 0 ,   , and C ¯ i is the gain matrix of the localized filter.
In the case of non-zero noise interference, the stability of the system can be determined by the H filter performance criterion. Specifically, when the upper bound of the filter output energy is smaller than a given performance criterion, the filter system is proved to be asymptotically stable. Based on the actual noise characteristics and filter structure analysis, the H performance criterion adopted in this chapter is expressed as follows:
k = 0 z ~ i , k 2 < l 2 k = 0 ω k 2 + k = 0 v i , k 2 + x 0 T θ 1 x 0 + ( x 0 x ^ 0 ) T θ 2 ( x 0 x ^ 0 )
where θ 1 and θ 2 are the two given positive definite real symmetric auxiliary matrices, and these two parameter matrices achieve boundedness control of the system paradigm through a weight adjustment mechanism.
Theorem 3.
For a scalar ρ > 0 and real positive definite matrices θ 1 and θ 2 , system (16) is asymptotically stable if there exists a real symmetric matrix Q satisfying Equation (18).
Proof. 
According to the auxiliary matrices P and θ given below, an inequality satisfying the filter performance criterion is obtained:
A ¯ i T Q A ¯ i + C ¯ i T C ¯ i Q A ¯ i T Q B ¯ i A ¯ i T Q D ¯ i B ¯ i T Q A ¯ i B ¯ i T Q B ¯ i ρ 2 I B ¯ i T Q D ¯ i D ¯ i T Q A ¯ i D ¯ i T Q B ¯ i D ¯ i T Q D ¯ i ρ 2 I Q < ρ 2 θ < 0
where
P = C ¯ i T C ¯ i Q 0 0 0 ρ 2 I 0 0 0 ρ 2 I ; θ = θ 1 + θ 2 θ 1 θ 1 θ 1 .
Proof. 
We set up the Lyapunov function:
V k = ς i , k T Q ς i , k
There are two scenarios that need to be discussed here.
(1)
When ω k = 0 and v i , k = 0 ,
Δ V k = V k + 1 V k = ς i , k T ( A ¯ i T Q A ¯ i Q ) ς i , k
Considering C ¯ i T C ¯ i 0 and combining it with Equation (18) show the inequality A ¯ i T Q A ¯ i Q < 0 .
Therefore, Δ V k < 0 guarantees the asymptotic stability of the filter under noiseless conditions.
(2)
When ω k > 0 and v i , k > 0 ,
Δ V k = V k + 1 V k = ς i , k + 1 T Q ς i , k + 1 ς i , k T Q ς i , k = ( A ¯ i ς i , k + B ¯ i ω k + D ¯ i v k ) T Q ( A ¯ i ς i , k + B ¯ i ω k + D ¯ i v k ) ς i , k T Q ς i , k = ς i , k T A ¯ i T Q A ¯ i ς i , k + ς i , k T A ¯ i T Q B ¯ i ω k + ς i , k T A ¯ i T Q D ¯ i v k + ω k T B ¯ i T Q A ¯ i ς i , k + ω k T B ¯ i T Q B ¯ i ω k + ω k T B ¯ i T Q D ¯ i v k + v k T D ¯ i T Q A ¯ i ς i , k + v k T D ¯ i T Q B ¯ i ω k + v k T D ¯ i T Q D ¯ i v k ς i , k T Q ς i , k = ϑ i , k T Ξ ( Q ) ϑ i , k ,
Here, ϑ i , k = ς k ω k v i , k ; Ξ ( Q ) = A ¯ i T Q A ¯ i Q A ¯ i T Q B ¯ i A ¯ i T Q D ¯ i B ¯ i T Q A ¯ i B ¯ i T Q B ¯ i B ¯ i T Q D ¯ i D ¯ i T Q A ¯ i D ¯ i T Q B ¯ i D ¯ i T Q D ¯ i .
Continuing the derivation yields
Δ V k = V k + 1 V k = ϑ i , k T Υ ( k ) ϑ i , k + ρ 2 ω k T ω k + ρ 2 v i , k T v i , k + z ~ i , k T z ~ i , k
where
Υ ( k ) = A ¯ i T Q A ¯ i + C ¯ i T C ¯ i Q A ¯ i T Q B ¯ i A ¯ i T Q D ¯ i B ¯ i T Q A ¯ i B ¯ i T Q B ¯ i ρ 2 I B ¯ i T Q D ¯ i D ¯ i T Q A ¯ i D ¯ i T Q B ¯ i D ¯ i T Q D ¯ i ρ 2 I
Combined with Equation (18), the inequality can be written as
Δ V k ρ 2 ω k T ω k ρ 2 v i , k T v i , k + z ~ i , k T z ~ i , k < 0
Then,
ϑ i , k T Υ ( k ) ϑ i , k < 0
which satisfies
k = 0 Δ V k ρ 2 ω k T ω k + ρ 2 v i , k T v i , k + z ~ i , k T z ~ i , k = k = 0 | | z ~ i , k | | 2 ρ 2 ( | | ω k | | 2 + | | v i , k | | 2 ) v 1 < 0
Further,
k = 0 | | z ~ i , k | | 2 < ρ 2 k = 0 ( | | ω k | | 2 + | | v i , k | | 2 ) + v 1
Since Q < ρ 2 θ ,
k = 0 z ~ i , k 2 < ρ 2 k = 0 ( ω k 2 + v i , k 2 ) + ρ 2 x k x ^ i , k θ x k x ^ i , k = ρ 2 k = 0 ( ω k 2 + v i , k 2 ) + ρ 2 x k x ^ i , k θ 1 + θ 2 θ 1 θ 1 θ 1 x k x ^ i , k = ρ 2 k = 0 ( ω k 2 + v i , k 2 ) + x 1 T θ 2 x 1 + ( x 1 x ^ 1 ) T θ 2 ( x 1 x ^ 1 )
Thus,
k = 0 z ~ i , k 2 < ρ 2 k = 0 ( ω k 2 + v i , k 2 ) + x 1 T θ 2 x 1 + ( x 1 x ^ 1 ) T θ 2 ( x 1 x ^ 1 )
It can be concluded that V k satisfies the H fusion filtering performance criteria of this paper.
We define Λ k and Λ ¯ k as the set of attacked local estimation indexes and the set of unattacked local estimation indexes, Λ k Λ ¯ k = 1 , 2 , , n , respectively, at time k. For the multi-sensor configuration of system (2), the proposed distributed H fusion filter design is presented below:
z ^ k = i = 1 n ι i z ^ i , k
ι i = 1 / κ i 2 j = 1 n κ j 2
where z ^ k denotes the fused global estimate, ι i > 0 denotes the fused weights and satisfies the normalization condition i Λ ¯ k ι i = 1 , n denotes the total number of sensors, and κ i represents the filter error.

5. Simulations

To verify the effectiveness of the dynamic data encryption fusion estimation strategy for USV-oriented FDI attacks proposed, a simulation experiment platform is constructed in this study. Based on the dynamics model of a USV and the established system model, it is assumed that the sensor network contains six nodes. In order to enhance security, the first three sensors receive the first state component of the system, and the last three sensors receive the second state component of the system. During the measurement process, the communication data are affected by measurement noise:
v 1 , k = 0.022 sin ( k ) , v 2 , k = 0.044 sin ( k ) .
The external interference noise is
ω k = 0.2 cos ( 2 k ) 0.1 sin ( k ) T .
It is used to simulate the effect of wind, waves, and other factors on data acquisition and transmission in the marine environment. The simulation duration is set to [0, 100] seconds, and the initial state value of the system is
x 0 = 1 2 T .
The system parameter matrix is defined as
A = 0.77 0 0 0.77 , B = 1.1 0 0 1.1 .
It is assumed that there exists at least one sensor that is not subject to the FDI attack in the first three sensor groups and the last three sensor groups at any time, and the location of the FDI attack occurs randomly. In addition, we set the value of the attack signal to a random value in the interval [40, 80]. In the dynamic data encryption scheme, the initial key matrix c i , 0 is randomly generated, and the key c i , k is updated according to the historical system data during the subsequent encryption process, with the update step set to 1. The encryption function φ c i , k = c i , k . The following H fusion filter parameters are given according to the Monte Carlo method:
A p i = 0.4 0 0 0.4 , B p i = 0.4 0 0 0.4 , C p i = 1.005 0 0 1.005 , F p i = 0.6 0 0 0.6 .
To address the issue of privacy protection during data transmission, we use dynamic encryption methods for protection. Figure 3 demonstrates the effect of the decryptor on the recovery of key state quantities of the system. Figure 3a depicts the horizontal position of the system ( x 1 , k ) dynamic: the black dashed line represents the true horizontal position, and the red line represents the decrypted position ( x 1 , k d ) obtained by the decryptor. Figure 3b depicts the velocity of the system ( x 2 , k ) dynamic: the black dashed line represents the true velocity, and the blue solid line represents the decryption velocity ( x 2 , k d ) obtained by the decryptor. The comparison shows that the positions and velocities output by the decryptor can effectively track and approximate their corresponding true values, indicating that the decryptor has a excellent performance in recovering the position and velocity states of the system.
Figure 4 and Figure 6 together show the state observation effect of the multi-sensor system under FDI attack. Figure 4a marks the true horizontal position of the system ( x 1 , k ) by the black dashed line, while presenting the observed values of sensor 1/2/3 pairs of x 1 , k by the red, blue, and orange solid lines, respectively. And the red block in Figure 4b marks the FDI attack occurring at the corresponding moment. Figure 6a similarly presents the true speed ( x 2 , k ; black dashed line) with the three sensors’ observations of x 2 , k (red/blue/orange solid lines). Figure 6b synchronizes the distribution of FDI attacks in the x 2 , k channel. The comparison between the two sets of images clearly shows that during the normal operation period without being attacked, there is very little error between the data obtained by the sensor and the real data, while there is a significant deviation during the 40 to 80 FDI attack period (red block), which verifies the destructive impact of the attack on the data. Figure 5 and Figure 7 show the FDI attack detection results of sensors 1−3 and 4−6, respectively. The green dots in the figures indicate the alerts issued when an attack is detected, and the results show that the proposed scheme in this paper has a 99% FDI detection rate and a 1% false alarm rate.
Figure 4. Comparison of USV location observation and FDI attack distribution.
Figure 4. Comparison of USV location observation and FDI attack distribution.
Jmse 13 01457 g004
Figure 5. FDI detection results of sensors 1−3.
Figure 5. FDI detection results of sensors 1−3.
Jmse 13 01457 g005
Figure 6. Comparison of USV velocity observation and FDI attack distribution.
Figure 6. Comparison of USV velocity observation and FDI attack distribution.
Jmse 13 01457 g006
Figure 7. FDI detection results of sensors 4−6.
Figure 7. FDI detection results of sensors 4−6.
Jmse 13 01457 g007
Figure 8 and Figure 9 show the true values and estimated values of the horizontal position and velocity of the USV, respectively. As shown in Figure 8, the tracking error of this method (red solid line) for the true position (black dashed line) is significantly lower than the CI fusion result (blue dotted line) in reference [29]. Especially at moments [50, 80], the protection advantage of the dynamic key mechanism is particularly significant: the position offset of this method is strictly controlled within ± 0.15 m, whereas the reference [29] method results in a maximum offset of ± 0.82 m due to static key vulnerability. The speed estimation results in Figure 9 further indicate that this method (solid red line) effectively suppresses the influence of disturbances through H filtering, and the speed estimation error is strictly controlled within the range of ± 0.12 m/s; in contrast, the method in reference [29] has a maximum error of ± 0.76 m/s due to static key vulnerability.
Table 1 summarizes the processing latency and resource allocation of different modules in the experimental scenario. Table 2 summarizes the performance comparison results of different methods for USV position estimation in experimental scenarios with FDI attacks. Among them, the standard deviation of position estimation reflects the degree of dispersion of position estimation values around their mean. The smaller the SD, the better the stability and consistency of the estimation results. The mean square error of position estimation measures the average square of the difference between the estimated position and the true position. The smaller the MSEs, the higher the accuracy of the estimation and the more accurate the tracking of the true value. Table 3 summarizes the single run times for the different methods. The comparison shows that the mean square error value obtained from this paper’s method is smaller, the single run time is shorter, and the robustness is better, indicating that the method has a stronger ability to resist FDI attacks.

6. Conclusions

The innovative security solution for the problem of FDI attacks faced by USVs during data transmission in CPSs is investigated. Due to the open nature of WSNs, attackers can tamper with sensor data, leading to poor decision making by the control center. To solve this problem, a dynamic data encryption method for encrypting the data before transmission and dynamically updating the key using historical data to enhance the difficulty of cracking is developed. At the same time, we construct a dynamic correlation mechanism among the ciphertext, the key, and the auxiliary encrypted ciphertext. The goal is to create a detection system that can quickly identify and map FDI attacks. In addition, external noise interference is filtered by the H fusion filter, and the weighted fusion algorithm is used to restore the actual information. The results show that the position estimation error is strictly controlled within a range ±0.15 m and the velocity estimation error is controlled within a range ±0.12 m/s. Compared with the scheme in the literature [29] (maximum position offset of ±0.82 m and velocity offset of ±0.76 m/s), the accuracy improvement is significant. In summary, this scheme provides an effective solution for the secure transmission and reliable state estimation of USVs in open-WSN environments through the collaborative design of dynamic key encryption, real-time attack detection and localization, and H filtering and weighted fusion.

Author Contributions

Methodology, Z.L.; Formal analysis, Z.L. and L.L.; Investigation, Z.L. and L.L.; Writing—original draft, Z.L.; Writing—review and editing, Z.L., L.L., H.Y., Z.W., G.D., and C.Z.; Supervision, L.L., H.Y., Z.W., G.D., and C.Z.; Funding acquisition, L.L., H.Y., Z.W., G.D., and C.Z. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported in part by the National Natural Science Foundation of China (grants No. 62273172 and 62403227), the Shanghai Key Laboratory of Power Station Automation Technology, the Natural Science Foundation of Shandong Province (grants No. ZR2023MF105, ZR2022MF231, ZR2024MF055, and ZR2022MF292), and the Yantai Science and Technology Innovation Development Plan Research Project (grant No. 2024JCYJ092).

Data Availability Statement

The original contributions presented in this study are included in the article. Further inquiries can be directed to the corresponding authors.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Kim, S.; Park, K.J.; Lu, C. A survey on network security for cyber–physical systems: From threats to resilient design. IEEE Commun. Surv. Tutor. 2022, 24, 1534–1573. [Google Scholar] [CrossRef]
  2. Cui, D.; Li, H. Dual self-triggered model-predictive control for nonlinear cyber-physical systems. IEEE Trans. Syst. Man Cybern. Syst. 2021, 52, 3442–3452. [Google Scholar] [CrossRef]
  3. Lu, K.D.; Wu, Z.G.; Huang, T. Differential evolution-based three stage dynamic cyber-attack of cyber-physical power systems. IEEE/ASME Trans. Mechatronics 2022, 28, 1137–1148. [Google Scholar] [CrossRef]
  4. Yu, Z.; Gao, H.; Cong, X.; Wu, N.; Song, H.H. A survey on cyber–physical systems security. IEEE Internet Things J. 2023, 10, 21670–21686. [Google Scholar] [CrossRef]
  5. Zhang, Y.; Fei, M.; Du, D.; Hu, Y. Security State Assessment in Cyber-Physical Systems Post-DoS Attack Based on Cyber Layer Partitioning. IEEE Trans. Ind. Inform. 2024, 21, 2204–2213. [Google Scholar] [CrossRef]
  6. Xu, Q.; Li, X.; Jiang, Y.; Zhu, S.; Yang, B.; Chen, C.; Duan, S.; Guan, X. Transportation-Energy-Communication Integrated Management of Ship Cyber-Physical Systems Against Cyber Attacks. IEEE Trans. Smart Grid 2025, 16, 2518–2528. [Google Scholar] [CrossRef]
  7. Younus, M.U.; Khan, M.K.; Bhatti, A.R. Improving the software-defined wireless sensor networks routing performance using reinforcement learning. IEEE Internet Things J. 2021, 9, 3495–3508. [Google Scholar] [CrossRef]
  8. Zheng, Y.; Hu, J.; Zhao, Y.; Yang, K. Average age of sensing in wireless powered sensor networks. IEEE Trans. Wirel. Commun. 2024, 23, 9265–9281. [Google Scholar] [CrossRef]
  9. Fei, Z.; Wang, X.; Wang, Z. Event-based fault detection for unmanned surface vehicles subject to denial-of-service attacks. IEEE Trans. Syst. Man Cybern. Syst. 2021, 52, 3326–3336. [Google Scholar] [CrossRef]
  10. Su, N.; Wang, J.B.; Zeng, C.; Zhang, H.; Lin, M.; Li, G.Y. Unmanned-surface-vehicle-aided maritime data collection using deep reinforcement learning. IEEE Internet Things J. 2022, 9, 19773–19786. [Google Scholar] [CrossRef]
  11. Tang, C.; Zhang, H.T.; Wang, J. Flexible formation tracking control of multiple unmanned surface vessels for navigating through narrow channels with unknown curvatures. IEEE Trans. Ind. Electron. 2022, 70, 2927–2938. [Google Scholar] [CrossRef]
  12. Ar-Reyouchi, E.M.; Ghoumid, K.; Ar-Reyouchi, D.; Rattal, S.; Yahiaoui, R.; Elmazria, O. Protocol wireless medical sensor networks in IoT for the efficiency of healthcare. IEEE Internet Things J. 2021, 9, 10693–10704. [Google Scholar] [CrossRef]
  13. Karimi-Bidhendi, S.; Guo, J.; Jafarkhani, H. Energy-efficient deployment in static and mobile heterogeneous multi-hop wireless sensor networks. IEEE Trans. Wirel. Commun. 2021, 21, 4973–4988. [Google Scholar] [CrossRef]
  14. Wu, C.; Zhu, G.; Lu, J. Indirect adaptive neural tracking control of USVs under injection and deception attacks. Ocean Eng. 2023, 270, 113641. [Google Scholar] [CrossRef]
  15. Duan, H.; Yuan, Y.; Zeng, Z. Distributed robust learning control for multiple unmanned surface vessels with fixed-time prescribed performance. IEEE Trans. Syst. Man Cybern. Syst. 2023, 54, 787–799. [Google Scholar] [CrossRef]
  16. Liu, C.; Jiang, B.; Wang, X.; Zhang, Y.; Xie, S. Event-based distributed secure control of unmanned surface vehicles with DoS attacks. IEEE Trans. Syst. Man Cybern. Syst. 2024, 54, 2159–2170. [Google Scholar] [CrossRef]
  17. Wang, L.; Wang, Z.; Han, Q.L.; Wei, G. Event-Based Variance-Constrained H Filtering for Stochastic Parameter Systems over Sensor Networks with Successive Missing Measurements. IEEE Trans. Cybern. 2017, 48, 1007–1017. [Google Scholar] [CrossRef]
  18. Zhang, L.; Sun, S. Distributed H fusion filtering for multi-sensor networked systems with DoS attacks and sensor saturations. Digit. Signal Process. 2023, 134, 103908. [Google Scholar] [CrossRef]
  19. Hu, Z.; Chen, K.; Deng, F.; Luo, S.; Hu, S. H controller design for networked systems with two-channel packet dropouts and FDI attacks. IEEE Trans. Cybern. 2023, 54, 1661–1670. [Google Scholar] [CrossRef] [PubMed]
  20. Li, Y.G.; Yang, G.H. Optimal stealthy false data injection attacks in cyber-physical systems. Inf. Sci. 2019, 481, 474–490. [Google Scholar] [CrossRef]
  21. Liu, C.; He, W.; Deng, R.; Tian, Y.C.; Du, W. False-data-injection-enabled network parameter modifications in power systems: Attack and detection. IEEE Trans. Ind. Inform. 2022, 19, 177–188. [Google Scholar] [CrossRef]
  22. Xiao, L.; Chen, H.; Xu, S.; Lv, Z.; Wang, C.; Xiao, Y. Reinforcement Learning-Based False Data Injection Attacks in Smart Grids. IEEE Trans. Ind. Inform. 2025, 21, 3475–3484. [Google Scholar] [CrossRef]
  23. Jafari, M.; Rahman, M.A.; Paudyal, S. Optimal false data injection attack against load-frequency control in power systems. IEEE Trans. Inf. Forensics Secur. 2023, 18, 5200–5212. [Google Scholar] [CrossRef]
  24. Guo, H.; Sun, J.; Pang, Z.H. Residual-based false data injection attacks against multi-sensor estimation systems. IEEE/CAA J. Autom. Sin. 2023, 10, 1181–1191. [Google Scholar] [CrossRef]
  25. Du, M.; Wang, L.; Zhou, Y. High-stealth false data attacks on overloading multiple lines in power systems. IEEE Trans. Smart Grid 2022, 14, 1321–1324. [Google Scholar] [CrossRef]
  26. Chen, X.; Hu, S.; Li, Y.; Yue, D.; Dou, C.; Ding, L. Co-estimation of state and FDI attacks and attack compensation control for multi-area load frequency control systems under FDI and DoS attacks. IEEE Trans. Smart Grid 2022, 13, 2357–2368. [Google Scholar] [CrossRef]
  27. Xia, W.; Zhang, Y. Resilient distributed estimation against FDI attacks: A correntropy-based approach. Inf. Sci. 2023, 635, 236–256. [Google Scholar] [CrossRef]
  28. Zhang, Q.; He, D. Adaptive neural control of nonlinear cyber–physical systems against randomly occurring false data injection attacks. IEEE Trans. Syst. Man Cybern. Syst. 2022, 53, 2444–2455. [Google Scholar] [CrossRef]
  29. Li, T.; Weng, P.; Chen, B.; Zhang, D.; Yu, L. Encryption-based attack detection scheme for multi-sensor secure fusion estimation. IEEE Trans. Aerosp. Electron. Syst. 2024, 60, 7548–7554. [Google Scholar] [CrossRef]
  30. Ma, Y.; Nie, Z.; Hu, S.; Li, Z.; Malekian, R.; Sotelo, M. Fault detection filter and controller co-design for unmanned surface vehicles under DoS attacks. IEEE Trans. Intell. Transp. Syst. 2020, 22, 1422–1434. [Google Scholar] [CrossRef]
  31. Pan, K.; Teixeira, A.; Cvetkovic, M.; Palensky, P. Data attacks on power system state estimation: Limited adversarial knowledge vs. limited attack resources. In Proceedings of the IECON 2017-43rd Annual Conference of the IEEE Industrial Electronics Society, Beijing, China, 29 October–1 November 2017; pp. 4313–4318. [Google Scholar]
  32. Blum, M.; Micali, S. How to generate cryptographically strong sequences of pseudo random bits. In Providing Sound Foundations for Cryptography: On the Work of Shafi Goldwasser and Silvio Micali; Association for Computing Machinery: New York, NY, USA, 2019; pp. 227–240. [Google Scholar]
Figure 1. USVs with dynamic data encryption under FDI attack.
Figure 1. USVs with dynamic data encryption under FDI attack.
Jmse 13 01457 g001
Figure 2. Dynamic encryption and attack detection flowchart.
Figure 2. Dynamic encryption and attack detection flowchart.
Jmse 13 01457 g002
Figure 3. Comparison of real and decrypted values of horizontal position and velocity.
Figure 3. Comparison of real and decrypted values of horizontal position and velocity.
Jmse 13 01457 g003
Figure 8. State estimation for horizontal position.
Figure 8. State estimation for horizontal position.
Jmse 13 01457 g008
Figure 9. State estimation of velocity values.
Figure 9. State estimation of velocity values.
Jmse 13 01457 g009
Table 1. Quantitative table of computational efficiency.
Table 1. Quantitative table of computational efficiency.
ModuleAverage Processing Latency (ms)Proportion of Resources
Dynamic encryption0.457.2%
Attack detecting0.182.9%
H fusion filter1.2319.7%
Attention: Based on AMD Ryzen 7 5800H platform testing.
Table 2. Standard deviation (SD) and mean square error (MSE) of the position with respect to the comparison literature [29].
Table 2. Standard deviation (SD) and mean square error (MSE) of the position with respect to the comparison literature [29].
Standard DeviationMean Square Error
Method of comparison0.15590.0243
This method0.06030.0036
Table 3. Comparison with the single execution time of the comparative literature [29].
Table 3. Comparison with the single execution time of the comparative literature [29].
Single Execution Time (s)
Method of comparison12.8
This method10.3
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Liu, Z.; Liu, L.; Yang, H.; Wang, Z.; Deng, G.; Zhou, C. Fast Detection of FDI Attacks and State Estimation in Unmanned Surface Vessels Based on Dynamic Encryption. J. Mar. Sci. Eng. 2025, 13, 1457. https://doi.org/10.3390/jmse13081457

AMA Style

Liu Z, Liu L, Yang H, Wang Z, Deng G, Zhou C. Fast Detection of FDI Attacks and State Estimation in Unmanned Surface Vessels Based on Dynamic Encryption. Journal of Marine Science and Engineering. 2025; 13(8):1457. https://doi.org/10.3390/jmse13081457

Chicago/Turabian Style

Liu, Zheng, Li Liu, Hongyong Yang, Zengfeng Wang, Guanlong Deng, and Chunjie Zhou. 2025. "Fast Detection of FDI Attacks and State Estimation in Unmanned Surface Vessels Based on Dynamic Encryption" Journal of Marine Science and Engineering 13, no. 8: 1457. https://doi.org/10.3390/jmse13081457

APA Style

Liu, Z., Liu, L., Yang, H., Wang, Z., Deng, G., & Zhou, C. (2025). Fast Detection of FDI Attacks and State Estimation in Unmanned Surface Vessels Based on Dynamic Encryption. Journal of Marine Science and Engineering, 13(8), 1457. https://doi.org/10.3390/jmse13081457

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop