Abstract

AbstractIn this study, we address two fundamental questions that are crucial for designing stealthy cyber‐attacks similar to false data injection. The first question involves obtaining an accurate dynamic model of the target to ensure stealthy performance under a detector. The second question pertains to understanding the opponent's ongoing detection tactics, such as dynamic watermarking, and developing a counter‐strategy. To answer the first question, we propose a data‐driven framework that calculates the accurate dynamic model used in stealthy false data injection cyber‐attacks, including zero dynamics attacks, covert attacks, and replay attacks. To address the second question, we present a scheme against the dynamic watermarking defense strategy, which typically detects replay attacks. We validate the methods introduced in this study through an experimental setup of a cyber‐physical system, which includes an omnidirectional mobile robot, a wireless network router, and a remote control center.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call