{"title":"Data-Importance-Aware Attack Strategy Design and Secure Control Countermeasure","authors":"Jiancun Wu;Engang Tian;Chen Peng;Zhiru Cao","doi":"10.1109/TIFS.2024.3522770","DOIUrl":null,"url":null,"abstract":"This paper is concerned with the security issues related to integrated attack-defense strategy for a category of multi-sensor networked control systems with state saturation constraints. In general, existing denial-of-service (DoS) attack models typically conduct indiscriminate attacks on data packets, disregarding the significance of the attacked data packets to the system. Note that the measurement data from different sensor nodes possesses varying levels of importance. In light of this, we first propose a novel form of attack from the perspective of attack design, known as a data-importance-aware attack. The importance of data refers to the quantitative impact of the measured values at each sensor node on the stable and safe operation of the entire system. As such, the proposed attack has the awareness to launch attacks against critical sensor nodes, rendering data unable to be transmitted. Then, an attack-node-dependent security controller is devised from the defender’s perspective against the constructed attack, which can effectively resist the impact of attacks and stabilize the system. By employing the Lyapunov functional method, sufficient conditions are derived to ensure the asymptotic stability of the closed-loop system. Finally, the reliability and effectiveness of the node importance-aware attack strategy and control countermeasure are validated by numerical simulation.","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"20 ","pages":"944-954"},"PeriodicalIF":6.3000,"publicationDate":"2024-12-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Transactions on Information Forensics and Security","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10816202/","RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, THEORY & METHODS","Score":null,"Total":0}
引用次数: 0
Abstract
This paper is concerned with the security issues related to integrated attack-defense strategy for a category of multi-sensor networked control systems with state saturation constraints. In general, existing denial-of-service (DoS) attack models typically conduct indiscriminate attacks on data packets, disregarding the significance of the attacked data packets to the system. Note that the measurement data from different sensor nodes possesses varying levels of importance. In light of this, we first propose a novel form of attack from the perspective of attack design, known as a data-importance-aware attack. The importance of data refers to the quantitative impact of the measured values at each sensor node on the stable and safe operation of the entire system. As such, the proposed attack has the awareness to launch attacks against critical sensor nodes, rendering data unable to be transmitted. Then, an attack-node-dependent security controller is devised from the defender’s perspective against the constructed attack, which can effectively resist the impact of attacks and stabilize the system. By employing the Lyapunov functional method, sufficient conditions are derived to ensure the asymptotic stability of the closed-loop system. Finally, the reliability and effectiveness of the node importance-aware attack strategy and control countermeasure are validated by numerical simulation.
期刊介绍:
The IEEE Transactions on Information Forensics and Security covers the sciences, technologies, and applications relating to information forensics, information security, biometrics, surveillance and systems applications that incorporate these features