高级检索

    汪迪, 李芳菲, 许思遥, 刘昌洪. 针对信息物理系统线性欺诈攻击的水印加密策略[J]. 华东理工大学学报(自然科学版), 2020, 46(6): 828-832. DOI: 10.14135/j.cnki.1006-3080.20191016001
    引用本文: 汪迪, 李芳菲, 许思遥, 刘昌洪. 针对信息物理系统线性欺诈攻击的水印加密策略[J]. 华东理工大学学报(自然科学版), 2020, 46(6): 828-832. DOI: 10.14135/j.cnki.1006-3080.20191016001
    WANG Di, LI Fangfei, XU Siyao, LIU Changhong. Watermark Encryption Strategy for Linear Deception Attacks in Cyber Physical Systems[J]. Journal of East China University of Science and Technology, 2020, 46(6): 828-832. DOI: 10.14135/j.cnki.1006-3080.20191016001
    Citation: WANG Di, LI Fangfei, XU Siyao, LIU Changhong. Watermark Encryption Strategy for Linear Deception Attacks in Cyber Physical Systems[J]. Journal of East China University of Science and Technology, 2020, 46(6): 828-832. DOI: 10.14135/j.cnki.1006-3080.20191016001

    针对信息物理系统线性欺诈攻击的水印加密策略

    Watermark Encryption Strategy for Linear Deception Attacks in Cyber Physical Systems

    • 摘要: 利用水印加密策略来防御信息物理系统(CPS)的线性欺诈攻击。线性欺诈攻击可以降低系统的远程估计性能,很难被检测器检测。采取KL散度检测器和水印加密的方式来保护系统传输的数据,并证明这一方法可以有效地帮助KL散度检测器检测攻击或降低攻击的效果,最后给出了数值模拟进一步说明水印加密策略的有效性。

       

      Abstract: A defense method for linear deception attacks using KL divergence detector to detect watermarks in cyber physics system (CPS) is proposed. It is well known that linear deception attacks can degrade the performance of the remote estimator without being detected by the KL divergence detector. In order to detect such attacks, computer-based encryption methods use watermarks to encrypt and decrypt data transmitted over a wireless network to protect the system. In the absence of attack, the decryption section can recover the transmitted data to ensure remote estimation performance. In the case of linear deception attacks, these data will be watermarked to expand the variance of the transmitted data, so that the data at the receiving end will no longer obey the original normal distribution. Due to the convex nature of KL divergence, the KL divergence value can be proved. It is enlarged to exceed the thresholds that have been tested by the detector, so that they can help the KL divergence detector to detect the attack. The watermark encryption method has been proved to help the KL divergence detector to detect attacks or to mitigate the effects of attacks in different situations, and further discusses how to select the appropriate value of the watermark parameters, which makes the system’s protection performance more perfect. Finally, numerical simulations are given to further illustrate the limitations of the presence of watermarks on attackers, further highlighting the practical effects of parameter selection.

       

    /

    返回文章
    返回