Next Article in Journal
Uncertainty-Aware Federated Reinforcement Learning for Optimizing Accuracy and Energy in Heterogeneous Industrial IoT
Previous Article in Journal
Influence of Camera Placement on UGV Teleoperation Efficiency in Complex Terrain
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Enhancing Unmanned Marine Vehicle Security: A Periodic Watermark-Based Detection of Replay Attacks

1
School of Automation Engineering, University of Electronic Science and Technology of China, Chengdu 611731, China
2
School of Maritime Economics and Management, Dalian Maritime University, Dalian 116026, China
*
Author to whom correspondence should be addressed.
Appl. Sci. 2024, 14(18), 8298; https://doi.org/10.3390/app14188298
Submission received: 21 August 2024 / Revised: 7 September 2024 / Accepted: 13 September 2024 / Published: 14 September 2024
(This article belongs to the Section Transportation and Future Mobility)

Abstract

:
This paper explores a periodic watermark-based replay attack detection method for Unmanned Marine Vehicles modeled in the framework of the Takagi–Sugeno fuzzy system. The precise detection of replay attacks is crucial for ensuring the security of Unmanned Marine Vehicles; however, traditional timestamp-based or encoded measurement-dependent detection approaches often sacrifice system performance to achieve higher detection rates. To reduce the potential performance degradation, a periodic watermark-based detection scheme is developed, in which a compensation signal together with a periodic Gaussian watermark signal is integrated into the actuator. By compensation calculations conducted with all compensatory signals in each period, the position corresponding to a minimum value of the detection function can be derived. Then, the time that the attacks occurred can be ensured with the aid of the comparison between this position with the watermark signal in the same period. An application on a UMV is shown to demonstrate the effectiveness of the presented scheme in detecting replay attacks while minimizing control costs.

1. Introduction

Unmanned Marine Vehicles (UMVs) represent a category of highly automated, intelligent, cost-effective, and efficient maritime vessels that operate without human intervention, which have been found to have widespread applications in the area of the observation of marine hydrological data, detection of marine environments, and exploration of marine resources etc. [1]. Their developments have significantly advanced marine technologies [2,3,4], and also showcased enormous potential in scientific research, military applications [5,6], and civilian uses. In contrast to traditional vessels, UMVs can operate under harsh weather conditions and undertake monotonous and hazardous operations in complicated marine environments [7]. Such versatility has fostered the development and research within the domains of navigation control, fleet coordination, trajectory tracking control etc. [8,9].
The rapid development of UMVs has been inseparable from the significant growth of modern network communications [10]. UMVs are transitioning from reliance on traditional communication channels to integrated networks to enhance system efficiency. However, this transition also introduces significant cybersecurity challenges, such as network attacks [11,12]. Network attacks are not only increasingly common but also growing in complexity, leading to substantial risks to the UMVs systems [13,14]. Hence, the security challenges faced by UMVs are crucial, and the detection of attacks has significant research significance. In an open network environment, cybersecurity problems targeting UMV systems primarily manifest as denial of service (DoS) attacks and replay attacks [15]. Extensive investigations by Zhang et al. [16] and Fei et al. [17] have concentrated on countering DoS attacks on UMV systems. Unfortunately, unlike DoS attacks, replay attackers do not require prior knowledge of the control systems. These attackers typically retransmit system measurement data from periods of stability, rendering the attacks inherently covert and difficult to detect through standard methods [18]. The covert nature of replay attacks makes them challenging to detect with traditional methods, which contributes to their frequent occurrence in contemporary UMV systems.
The rising occurrence of replay attacks has drawn the interest of scholars, especially in the aspect of attack detection. Existing methods primarily include timestamp techniques and the addition of physical watermarks to control signals. Timestamp-based replay attack detection was first proposed in [19], where Kerberos leverages a reputable third-party authentication service to authenticate user identities. Subsequently, Greene et al. [20] proposed an enhanced remote keyless entry system employing timestamping and exclusive OR (EOR) encoding to robustly defend against replay attacks, significantly improving security over systems. Farha et al. [21] introduced a timestamp-based method to enhance ZigBee network security against replay attacks, ensuring effectiveness without impacting network efficiency. Furthermore, a Promela-based model checking approach for verifying timestamp-utilizing security protocols against replay attacks, effectively identifying vulnerabilities in the protocol, was proposed in [22]. Nonetheless, it had been suggested by Yang et al. [23] and Zhu et al. [24] that transmitted signals are vulnerable to interception by replay attackers, who can alter the timestamps, leading to noticeable decline in the efficiency of the detection strategy mentioned in [19,20,21,22]. To address this issue, Du et al. [25] added the continuous addition of Gaussian random noise to the control signals, causing noticeable variations in data residuals before and after an attack, therefore facilitating the detection of such attacks. Then, an approach for designing optimal physical watermark signals to detect replay attacks in linear time-invariant systems with unknown parameters was studied in [26]. These strategies adjusted the system’s optimal control signals, trading off control costs for improved detection of attacks. Therefore, an optimized watermarking method that balances improved detection of replay attacks against control costs in networked control systems was discussed in [27]. Ma et al. [28] presented a watermarking method for efficiently detecting transient covert attacks in industrial cyber-physical systems, reducing system performance cost while detecting detection accuracy. A recursive watermark algorithm significantly safeguarding against replay attacks with remarkable efficiency and saving the control cost by embedding rapid, detectable watermarks in hard real-time channels was introduced in [29]. In [30], a watermark-based encoding and decoding method were also proposed to detect replay attacks on UMVs with less control cost. It is worth noting that while incorporating watermark signals into control systems of UMVs aids in replay attack detection, the approach also compromises control performance [25,26,27,28,29,30]. The advantages and limitations of different existing methods can be seen in Table 1. Therefore, it is interesting to study the schedule of watermarks to use control costs more effectively.
Inspired by the above-mentioned discussions, in this article, a periodic watermark signal method against replay attacks for UMV systems is investigated, which can precisely detect replay attacks and minimize the impact of the watermark signal on the control system’s performance. Significant contributions of this paper are highlighted as follows.
(1)
The proposed method utilizes the relative positions of watermark signals to detect replay attack, diverging from traditional watermarking methods in [30,31]. Compared with existing, this method significantly lowers control costs by reducing watermark signal variance.
(2)
A novel periodic watermarking-compensation mechanism is constructed based on a Gaussian signal, contrasting with binary watermark signals employed in [32]. Comparatively, this mechanism can effectively enhance the detection rate of replay attacks.
Throughout this article, the superscripts ‘T’ and ‘-’ denote the transposition and the inverse of a matrix.

2. Problem Formulation and Preliminaries

The considered system Structure is presented in Figure 1, which is comprised of UMVs, a Kalman filter, and an LQG controller for setpoint optimization. The following analysis will explore the Takagi–Sugeno (T-S) fuzzy modeling for UMVs, the replay attacks, and the applications of Kalman filters and LQG controllers.

2.1. UMVs System Modeling

It follows from [33,34,35] that the equations describing dynamics and kinematics of the UMVs shown in Figure 2 are depicted as follows:
M τ ˙ ( t ) + N τ ( t ) + O φ ( t ) = u ( t ) + θ ( t ) φ ˙ ( t ) = Z ( ω ( t ) ) τ ( t )
where τ ( t ) = τ s u r g e ( t ) τ s w a y ( t ) τ y a w ( t ) T denotes the vector of body-fixed linear and angular velocities, where τ surge ( t ) stands for surge velocity, τ sway ( t ) for sway velocity, and τ yaw ( t ) for yaw velocity. φ ( t ) = [ x ( t ) y ( t ) ω ( t ) ] T indicates the earth-fixed orientation vector, where x ( t ) and y ( t ) are positions, and ω ( t ) denotes the yaw angle. Control inputs are given by u ( t ) = [ u 1 ( t ) u 2 ( t ) u 3 ( t ) ] T . θ ( t ) = [ θ 1 ( t ) , θ 2 ( t ) , θ 3 ( t ) ] T encapsulates wave-induced disturbances. O = diag { O 11 , O 22 , O 33 } stands for mooring forces.
Next, the UMVs system can be described as:
τ ˙ ( t ) = A φ ( t ) + B τ ( t ) + D u ( t ) + D θ ( t )
where A = M 1 O , B = M 1 N , D = M 1 . In constructing the fuzzy dynamic model of the UMVs system, the yaw angle serves as the premise variable. In this case, Three pivotal yaw angle points ω ( t ) are selected at the origin and ± π / 6 , respectively, and linearize the system at those three operating points, the fuzzy model of UMVs is given as follows:
R 1 : IF ω ( t ) is about 0 THEN
x ˙ ( t ) = A 1 x ( t ) + B u ( t ) , y ( t ) = C x ( t ) .
R 2 : IF ω ( t ) is about π / 6 THEN
x ˙ ( t ) = A 2 x ( t ) + B u ( t ) , y ( t ) = C x ( t ) .
R 3 : IF ω ( t ) is about π / 6 THEN
x ˙ ( t ) = A 3 x ( t ) + B u ( t ) , y ( t ) = C x ( t ) .
where
A p = 0 3 × 3 Q i B A , B = 0 3 × 3 D , C = I 3 × 3 0 3 × 3 , Q 1 = I 3 × 3 , Q 2 = 3 2 1 2 0 1 2 3 2 0 0 0 1 , Q 3 = 3 2 1 2 0 1 2 3 2 0 0 0 1 .
Given that the position and angle can be measured with relative ease, the output matrix C is selected accordingly. Furthermore, the membership functions for the three rules are illustrated in Figure 3.
The global T-S fuzzy model of the UMVs is derived using a singleton fuzzifier, product inference, and center average defuzzifier as described below:
x ˙ ( t ) = p = 1 3 p ( ϱ ( t ) ) ( A p x ( t ) + D p u ( t ) + θ ( t ) ) y ( t ) = C x ( t ) + v ( t )
where
p ( ϱ ( t ) ) = υ p ( ϱ ( t ) ) p = 1 3 υ p ( ϱ ( t ) ) , υ p ( ϱ ( t ) ) = M p 1 ( ϱ 1 ( t ) ) M p 1 ( ϱ 2 ( t ) ) , p ( ϱ ( t ) ) 0 , p = 1 3 p ( ϱ ( t ) ) = 1 .
The discrete-time fuzzy system results from the periodic sensor sampling with a period of T z and the application of the ZOH input mechanism:
x ( k + 1 ) = p = 1 3 p ( ϱ ( k ) ) ( A d p x ( k ) + B d p u ( k ) + θ d p ( k ) ) , y ( k ) = C x ( k ) + v ( k )
where A d p = e A n T , B d p = 0 T e A n T B n d t , and C are defined as in Equation (6). The function p ( ϱ ( k ) ) represents the value of p ( ϱ ( t ) ) at the sampling instance t = k . The variables θ d p ( k ) and v ( k ) represent process noise and measurement noise, respectively. These noise components are mutually independent, with W and V serving as their respective covariance matrices.
In a UMVs system, optimal state estimation x ^ ( k | k ) can be achieved by implementing a Kalman filter. Sensor data are forwarded to an estimator that applies the Kalman filter for estimating the state. The system is presumed to initiate operations at , allowing for the convergence of the Kalman filter into a constant-gain linear estimator. The update process is outlined in Algorithm 1.
Algorithm 1 Kalman Filter Utilized in T-S UMVs Model
1:
Step 1: Input A d p , B d p , C , W , V
2:
Step 2:  x ^ ( k + 1 | k ) = p = 1 3 p ( ϱ ( k ) ) ( A d p x ^ ( k | k ) + B d p u ( k ) )
3:
Step 3:  x ^ ( k | k ) = x ^ ( k | k 1 ) + K z ( k )
4:
Step 4:  z ( k ) = y ( k ) C x ^ ( k | k 1 )
5:
Step 5:  L = P C T ( C P C T + R ) 1
6:
Step 6:  P = p = 1 3 ( A d p P A d p T + W ) A d p P C T ( C P C T + R ) 1 C P A d p T
7:
Step 7: Output x ^ ( k | k )

2.2. Linear Quadratic Gaussian Controller

The LQG controller is utilized with the goal of minimizing the LQG cost is assumed as:
J = m i n lim 1 E [ i = 0 1 ( x ( k ) ) T Q x ( k ) + ( u ( k ) ) T R u ( k ) ]
where Q T = Q and R T = R denote the state and control variables, respectively. Consequently, the derived optimal feedback control law is:
u ( k ) = p = 1 3 p ( ϱ ( k ) ) F x ^ ( k | k )
The goal function given the optimal estimator and LQG controller is recast as:
J = t r ( S W ) + t r [ p = 1 3 ( A d p T S A d p + Q S ) ( P L C P ) ]
Controller enables the system to achieve a stable operational state. Consequently, parameters including L , P , F , and J can be computed offline.

2.3. Replay Attack Model

Mo et al. [31] initially defined a model for a replay attack. This model assumes that an attacker can capture a substantial amount of sensor data. During the attack, the real sensor measurement y ( t 1 + i ) is obstructed and replaced by y ( t 1 + i ) = y ( t 0 + i ) , which is forwarded to the estimator as demonstrated in Figure 4, with d = t 1 t 0 identified as the replay delay. The model is expressed as:
y ( t 1 + i ) = y ( t 0 + i ) , 0 i T .
Remark 1.
In UMV systems, two prevalent types of replay attacks are commonly discussed: Stuxnet-like Zhu et al. [24] and time-delay attacks, which often target network-transmitted signals such as y ( k ) and r ( k ) . Stuxnet-like attacks, which involve manipulated control inputs, present significant detection challenges due to their reliance on historical feedback signals. Time-delay attacks disrupt system performance by modifying the poles of the closed-loop system. This study specifically focuses on replay attacks that affect sensor signals y ( k ) . Future research will investigate the simultaneous tampering of sensor data and control actions.
Remark 2.
Replay attack threats to UMVs may come from state-sponsored groups, hacktivists, criminals, and insiders motivated by espionage, data theft, disruption, financial gain, and geopolitical leverage. The likelihood and success rate of replay attacks is contingent upon the security of the UMVs system’s transmission network—specifically, whether it employs advanced encryption technologies to protect its communications and data transmissions and the complexity of the attacker’s replay attack methods. When UMVs are fully deployed underwater, the inherent challenges of data transmission may reduce the success rate of such network attacks. Conversely, during docking operations or surface activities, UMV communications are more susceptible to the threat of replay attacks.
Assumption 1.
In this paper’s discussion of the replay attack scenario, the attack phase and the subsequent attack segment are temporally distinct with no overlap.

3. A Periodic Watermark-Based Detection of Replay Attacks

3.1. Periodic Watermarking Detection Mechanism

As shown in Figure 5, the attacker intercepts the actual sensor measurement y ( k ) and forwards y r ( k ) to the estimator or controller regularly. Furthermore, it has been shown in Yang et al. [23] that under certain conditions, these attacks can evade detection.
Lemma 1.
In the scenario where a UMVs system faces a replay attack and equipping with a χ 2 detector, ensuring ε = ( A d p + B d p L ) ( I n L C ) is Schur stable implies that the false alarm rate α and the positive detection rate β k at time k will equalize over time, confirmed by lim k β k = α .
According to Lemma 1, the detector’s alarm rate matches the false alarm rate, therefore complicating the confirmation of attacks upon alarms. To combat replay attacks, Mo et al. [31] introduced a technique of continuously adding Gaussian watermark signals Δ o ( k ) into the control inputs. It should be noted that, unless otherwise specified, the continuous watermark referenced hereafter is assumed to be a Gaussian signal. The actual control input can thus be described as:
u r ( k ) = u ( k ) + Δ o ( k )
where u r ( k ) represents the actual control input of UMVs system added Gaussian watermark signals.
For UMV systems that are less responsive to watermarking, achieving an adequate detection rate might necessitate significantly increased watermark intensities Bian et al. [30]. To reduce the system control cost, a periodic watermarking mechanism is proposed in Figure 6.
Compared to the method in Bian et al. [30], the primary advantage of this periodic watermarking method lies in its reliance on comparing the relative magnitudes of the detection functions for compensation signals at various times within the same cycle rather than their absolute values. At time k = t 0 , a periodic random watermark is introduced into the control variable, and a corresponding compensation signal is designed. As the system operates, this compensation signal develops periodicity that aligns with the watermark’s cycle. Furthermore, during each operational cycle of the UMV, there is a direct correlation between the compensation signal and the watermark.

3.2. Construction of Periodic Watermark Signal

In contrast to the approach presented in Fang et al. [32], which injects watermarks of varying sizes at periodic intervals, this study introduces a method that continuously injects a periodic Gaussian random signal into the control signal. The watermark signal’s period is denoted by T, where T N r . The series of periodic watermark signals is represented by Δ o i = Δ o 0 , Δ o 1 , , Δ o T 1 , with each Δ o i ( i = 0 , , T 1 ) being independently drawn from a Gaussian white noise signal characterized by a zero mean and a covariance matrix Σ o . Assuming the system operates steadily at time t 0 , a signal is continuously injected into the control variable. At any given time k, this injected watermark signal Δ o is defined as follows:
Δ o ( k ) = Δ o ( i ) , i = ( k t 0 ) mod T
where ( k t 0 ) mod T represents the remainder of k divided by T, and 0 ( k mod T ) T 1 . After injecting the periodic watermark signal, the UMVs state equation can be expressed as:
x r ( k + 1 ) = p = 1 3 p ( ϱ ( k ) ) ( A d p x r ( k ) + B d i ( u ( k ) + Δ o ( k ) ) + θ d i ( k ) ) y r ( k ) = D x r ( k ) + v ( k )

3.3. Construction of Periodic Compensation Signal

To construct the auxiliary system for obtaining the measurement compensation signal y f ( k ) after watermark insertion ( k > t 0 ):
x f ( k + 1 ) = p = 1 3 p ( Δ o ( k ) ) A d p x f ( k ) + B d i Δ o ( k ) y f ( k ) = C x f ( k )
where x f ( t 0 ) = 0 .
Theorem 1.
Assume A d p is stable, there exits an n 0 N r such that A d p ( n 0 1 ) T 0 . By introducing watermark signals into the UMVs system over n 0 periods, the compensatory signal y f ( k ) achieves periodicity for k t 0 + n 0 T , mirroring the periodic nature of the watermark. A series of these compensatory signals Y f = [ Y f ( 0 ) , Y f ( 1 ) , , Y f ( T 1 ) ] . Therefore, each compensatory signal within a period corresponds directly to its associated watermark signal, as demonstrated by the relationship o ( i 1 ) Y f ( i ) , where i = ( k t 0 ) mod T .
Proof. 
To demonstrate that the compensation signal y f ( k ) becomes periodic for k t 0 + n 0 T , it suffices to prove that the compensation state x f ( k ) becomes periodic for k t 0 + n 0 T . When k [ t 0 , t 0 + T 1 ] , the compensation signal state can be expressed as:
x f ( k ) = p = 1 3 p ( ϱ ( k ) ) ( A d p x f ( k ) + B d p Δ o ( k ) ) = i = 0 k t 0 p = 1 3 p ( ϱ ( k ) ) A d p x f ( k ) i B d p Δ o ( k t 0 i )
When k = t 0 + n T + i , with i [ 0 , T 1 ] and n N r , the compensation signal state can be represented as:
x f ( k ) = x f ( t 0 + n T + i ) = p = 1 3 p ϱ ( k ) ( A d p x f ( t 0 + n T + i 1 ) ) i B d p Δ o ( t 0 + n T + i 1 ) ) = p = 1 3 p ϱ ( k ) ( ( A d p 2 ( A d p x f ( t 0 + n T + i 3 ) ) i B d p Δ o ( i 3 ) ) ) + A d p B d p Δ o ( i 2 ) ) + B d p Δ o ( i 1 ) = p = 1 3 p ϱ ( k ) ( A d p ( n 1 ) T + x f ( t 0 + T ) + x f ( t 0 + ( l 1 ) T + i ) )
Given the stability of the transition matrix A d p , an integer n 0 N r is identified for which A d p ( n 0 1 ) T 0 . This value of n 0 is determined solely by the matrix A d p . Consequently, it is observed that for n n 0 , the state x f ( t 0 + n T + i ) = x f ( t 0 + ( n 1 ) T + i ) . We can achieve
x f ( k ) = x f ( k T )
It is indicated in (18) that the state values of the compensatory signal are deduced to become periodic after n 0 operational periods, reflecting the periodicity of the watermark signal. With the independence of watermark signals within each period, the state of the compensatory signal is confirmed to be distinct within any given period. Given that the compensatory signal y f ( k ) is defined as y f ( k ) = C x f ( k ) and output matrix C is constant, the compensatory signal is periodic, with each cycle exhibiting distinct values.
In accordance with (15), it is observed that for k = t 0 + n 0 T + i , where i spans from 0 to T 1 , a precise correlation is established between the value of the compensatory signal Y f ( i ) and the watermark signal value Δ o ( k 1 ) = Δ o ( i ) present in the measurement data. It has been confirmed that for any distinct i and j, Prob ( Δ o ( i ) = Δ o ( j ) ) = 0 . Thus, a one-to-one correspondence between compensatory signal Y f ( i ) and the watermark signal sequence Δ o ( i 1 ) is established. □

3.4. Detection of Replay Attacks

At time k, the measurement y r ( k ) is received and augmented by adding the compensatory signal Y f ( m ) , resulting in a compensated measurement represented as y e ( k , m ) = y r ( k ) + Y f ( m ) . This process results in the modified measurement being defined as y e ( k , m ) = y r ( k ) + Y f ( m ) . The prediction state estimate from the Kalman filter at this point is designated as x ^ e ( k | k 1 ) . Subsequently, the residual is computed as r e = y e ( k , m ) C x e ( k | k 1 ) . This residual is then employed to construct the chi-squared detection function g ( k , m ) = ( r e ( k , m ) ) T Σ r 1 r e ( k , m ) , where Σ r is defined as C P C T + V . The effectiveness of the proposed detection method is confirmed in this paper, and it is demonstrated that the subsequent theorem is applicable.
Theorem 2.
At time k, where k = t 0 + n T + i , i [ 0 , T 1 ] , and n n 0 , the control watermark signal is Δ o ( i 1 ) . Introducing different compensatory signals Y f ( m ) , m [ 0 , T 1 ] , results in the chi-square detection function g ( k ) satisfying g ( k , i ) < g ( k , j ) for j [ 0 , T 1 ] and j i . This indicates that assume compensatory signal Y f ( m ) is injected with m = i , the detection function value g ( k , m ) is minimized.
Proof. 
According to Theorem 1, the compensation signal at time k = t 0 + n T + i is denoted by Y f ( i ) . When m = i , Y f ( m ) = Y f ( i ) . Thus, the measurement value y e ( k , m ) after adding the compensation signal Y f ( m ) can be derived as follows:
y e ( k , m ) = y r ( k ) + Y f ( m ) = y r ( k ) + Y f ( t 0 + n T + i ) C p = 1 3 p ( ϱ ( k ) ) ( A d p x r ( k 1 ) + B d p ( u ( k 1 ) + Δ o ( k 1 ) ) + θ d i ( k 1 ) A d p x f ( k 1 ) B d p Δ o ( k 1 ) + v ( k ) = C p = 1 3 p ( ϱ ( k ) ) A d p k x ( 0 ) + i = 0 k 1 A d p i ( B d p u ( k 1 i ) + θ d i ( k i 1 ) ) + v ( k ) = C x ( k ) + v ( k ) = y ( k )
As established by (19), at time k, the measurement y e ( k , m ) , which incorporates the compensatory signal Y f ( m ) , coincides with the system’s original measurement y ( k ) . This concurrence indicates that the disturbances induced by the watermark signal in the measurement are effectively neutralized by the compensatory signal.
The prediction state estimate by the Kalman filter post-compensation is represented as x ^ e ( k | k 1 ) , and the original system’s state prediction estimate is denoted as x ^ ( k | k 1 ) . At the initial, it is affirmed that x ^ e ( 0 | 1 ) = x ^ ( 0 | 1 ) . Following the integration with (19), it is derived that:
x ^ e ( k | k 1 ) = n = 1 3 p ( ϱ ( k ) ) A d p x ^ e ( k 1 | k 1 ) + B d p u ( k 1 ) = n = 1 3 p ( ϱ ( k ) ) A d p + B d p F x ^ e ( k 1 | k 1 ) = n = 1 3 p ( ϱ ( k ) ) ( ε k x ^ ( 0 | 1 ) + i = 0 k 1 ε i ( A d p + B d p F ) L y ( k i 1 ) ) = n = 1 3 p ( ϱ ( k ) ) x ^ ( k 1 | k 2 ) + ( A d p + B d p F ) L y ( k 1 ) = x ^ ( k | k 1 )
Given the condition that m = i , it is found that the post-compensation state prediction estimate x ^ e ( k | k 1 ) aligns with the state prediction estimate x ^ ( k | k 1 ) obtained when a control quantity watermark has not been injected. Hence, the residual r e ( k , m ) under the scheme presented in this paper is determined as:
r e ( k , m ) = y e ( k , m ) C x ^ e ( k | k 1 ) = y r ( k ) + Y f ( m ) C x ^ e ( k | k 1 ) = y ( k ) C x ^ e ( k | k 1 ) = y ( k ) C x ^ ( k | k 1 ) = r ( k )
Consequently, the chi-squared detection function derived from the compensated residual is determined as follows:
g ( k , m ) = r e ( k , m ) T Σ r 1 r e ( k , m ) = ( r ( k ) ) T Σ r 1 r ( k ) = g ( k )
Assume compensatory signal Y f ( m ) is injected at time k. It has been established that the chi-squared detection function for compensated residual matches the g ( k ) observed on the condition of no control quantity watermark is introduced. If at time k 1 , a control quantity watermark signal o ( k 1 ) = o ( i 1 ) was injected, and at time k, the compensatory signal Y f ( i ) is introduced with j i , then the measurement processed by the Kalman filter is as follows:
y e ( k , j ) = y r ( k ) + Y f ( j ) = y r ( k ) + Y f ( k ) + Y f ( j ) Y f ( k ) = y r ( k ) + Y f ( i ) + Y f ( j ) Y f ( i ) = y ( k ) + Y f ( j ) Y f ( i )
At this point, the residual r e ( k , j ) is as follows:
r e ( k , j ) = y e ( k , j ) C x ^ e ( k | k 1 ) = y ( k ) + Y s ( j ) Y s ( i ) C x ^ e ( k , j ) = y ( k ) C x ^ ( k | k 1 ) + Y s ( j ) Y s ( i ) = r ( k ) + Y s ( j ) Y s ( i )
The chi-squared detection signal based on the residual is defined as:
g ( k , j ) = r e ( k , m ) T Σ r 1 r e ( k , j ) = ( r ( k ) + Y f ( j ) Y f ( i ) ) T Σ r 1 ( r ( k ) + Y f ( j ) Y f ( i ) ) = r T ( k ) Σ r 1 r ( k ) + Y f ( j ) Y f ( i ) T Σ r 1 ( Y f ( j ) Y f ( i ) ) = g ( k ) + Σ r 1 Y f ( j ) Y f ( i ) 2 2
Given that j i and the compensatory signals within the same period are distinct, it invariably holds that Y f ( j ) Y f ( i ) 2 2 > 0 . Therefore, it is deduced that g ( k , j ) > g ( k ) = g ( k , i ) . □
Based on Theorem 2, the following replay attack detection method can be devised. Commencing from moment t 0 , a periodic watermark signal is continuously injected into the control variable. At moment k 1 , this watermark signal is given by o ( k 1 ) = o ( i 1 ) , where i = ( k t 0 ) mod T . At moment k, where k = t 0 + n T + i , and i [ 0 , T 1 ] , n n 0 , the minimum value of the chi-squared detection function after incorporating different compensatory signals is denoted by:
a ( k ) = min m g ( k , m ) , m = 0 , , T 1
A decision function is defined as:
G ( k ) = a ( k ) i
In accordance with (27), the following hypothesis test is proposed: If G ( k ) = 0 , UMVs are considered to be operating normally. Otherwise, UMVs are presumed to be under a replay attack.
Theorem 3.
For a UMV system as depicted by (7), replay attacks can be detected to assume the delay of the replayed data is not an integer multiple of the watermark signal period, utilizing the approach described in this paper.
Proof. 
It is established from Theorem 2 that during normal system operation at moment k = t 0 + n T + i , the compensatory signal Y f ( m ) that minimizes g ( k ) satisfies m = i , with (26) yielding a ( k ) = m . Therefore, under the scheme proposed in this paper, the detection signal during normal operation is G ( k ) = a ( k ) i = m i = 0 .
When a replay attack occurs at time k = t 0 + n T + i , where data from a normal state at time k 1 = t 0 + n 1 T + m 1 is replayed, the corresponding control quantity watermark of the replayed measurement signal is Δ o ( k 1 1 ) = Δ o ( m 1 1 ) , with m 1 = ( k 1 t 0 ) mod T . Given that the system operates normally at time k 1 , it follows that y e ( k 1 ) = y ( k 1 ) , and x ^ e ( k | k 1 ) = x ^ ( k | k 1 ) . According to Theorem 2, for the detection function to achieve a minimal value, the injected compensatory signal should be y f ( k 1 ) = Y f ( m 1 ) , resulting in a ( k ) = m 1 . If the delay of the replayed data Δ k = k k 1 = ( n n 1 ) T + i m 1 is not an integer multiple of the watermark signal period, i.e., i m 1 , as indicated by (27), the detection signal G ( k ) = α ( k ) i = m 1 i 0 at this point, indicating the presence of a replay attack.    □
Remark 3.
Employing the method proposed in this paper, a replay attack can be detected whenever the condition | Σ r 1 | Y f ( j ) Y f ( i ) 2 2 is satisfied in (25). Therefore, in an ideal scenario, the detection rate of replay attacks using this scheme reaches 1. However, due to the presence of random noise disturbances and computational errors, especially assuming Σ o is small, there is a possibility of false detection occurring.
Remark 4.
To compromise system stability, an attacker must record and store system signals for an extended period prior to launching a replay attack. Conversely, control watermarks can be integrated into the control variables at the onset of system operations. It is established that n 0 is sufficient to ensure that A d i ( n 0 1 ) T 0 . Consequently, this paper assumes that no replay attack occurs within the initial n 0 periods.
Remark 5.
If the delay of the replayed data Δ k = k k 1 = ( n n 1 ) T + i m 1 is an integer multiple of the watermark signal period, i.e., i = m 1 , as indicated by (27), the detection signal G ( k ) = α ( k ) i = m 1 i = 0 at this point, which can result in a false positive. However, this method has certain limitations on the condition that the length of the chosen watermark period is sufficiently large that the occurrence of such cases can be minimized. Future work will focus on addressing this issue in more depth.

3.5. Analysis of System Performance Degradation

This paper focuses on analyzing the impact of this method on system control. Assuming no additional signals are present, the true state variables of the UMVs system are expressed by x ( k ) . The state error is then described as ϵ ( k ) = x ( k ) x ^ ( k ) . Employing the methodology presented herein, the state variables for the system during normal operation are given by x ^ r ( k ) , and the undisturbed steady-state error as defined within this section is ϵ ^ ( k ) , thus yielding δ ( k ) = x ^ r ( k ) x ^ ( k ) . Upon constructing the matrix x ˜ ( k ) = x ( k ) ϵ ( k ) δ ( k ) T , the following relation is established:
x ˜ ( k + 1 ) = p = 1 3 A d p + B d p F B d p F 0 0 A d p L C A d p 0 0 0 A d p   x ˜ ( k ) + w ( k ) H w ( k ) L v ( k + 1 ) p = 1 3 B d p u ( k )
where H = I n L C , Θ and γ ( k ) can be achieved as:
Θ = p = 1 3 A d p + B d p F B d p F 0 0 A d p L C A d p 0 0 0 A d p , γ ( k ) = w ( k ) H w ( k ) L v ( k + 1 ) p = 1 3 B d p u ( k )
Consequently, the covariance of the system is expressed as:
c o v ( x ˜ ) = Θ c o v ( x ˜ ) Θ T + ι
Wherein, ι is characterized by:
ι = W W H T 0 H W H W ( I n L C ) T 0 L C W 0 p = 1 3 ( B d p Σ o B d p T )
In the scheme proposed in this paper, the system control performance index can be represented as:
J = lim 1 + 1 k = 1 E x * T ( k ) Q x * ( k ) + ( u ( k ) + Δ o ( k ) ) T × R ( u ( k ) + Δ o ( k ) ) = lim 1 + 1 k = 1 E x ˜ ( k ) Ω x ˜ T ( k ) + Δ o T ( k ) R Δ o ( k ) = t r cov ( x ˜ ( k ) ) Ω + Σ o R
where Ω = Q + F T R F Q F T R F F T R F 0 F T R F Q Q 0 .
In the scheme proposed in this paper, the system performance degradation is expressed as:
Δ J = J J
wherein, the optimal system control performance index J is derived using (10).
Remark 6.
According to (31), it can be observed that an increase in the covariance of the watermark signal Σ o results in a corresponding rise in the control performance function J. The methodology adopted in this paper, which utilizes the relative positions of watermark signals for attack detection, enables the application of smaller Σ o values, effectively minimizing control costs in UMV systems.

4. Numerical Simulation

This section validates the efficacy of replay attack detection. The UMVs model selected for this study, borrowed from Bian et al. [30] and Wang et al. [33], is presented below:
M = 1.0852 0 0 0 2.0575 0.4087 0 0.4087 0.2153 , N = 0.0865 0 0 0 0.0762 0.1510 0 0.1510 0.0031 , O = 1.0389 0 0 0 0.0266 0 0 0 0 .
For the UMVs to effectively track the reference system’s output through the yaw angle, consider the following matrix C = 0 0 1 0 0 0 . The disturbance θ ( k ) is presented as:
θ 1 ( k ) = 0.27 F 1 ( s ) N 1 ( k ) N 2 ( k ) θ 2 ( k ) = 0.6 cos ( 1.6 k ) e 0.12 k θ 3 ( k ) = 0.58 F 2 ( s ) N 3 ( k ) N 4 ( s )
where F 1 ( s ) = Δ [ K θ 1 s / ( s 2 + 2 h 1 ς 1 s + ς 1 2 ) ] and F 2 ( s ) = Δ [ K θ 2 s / ( s 2 + 2 h 2 ς 2 s + ς 2 2 ) ] . Designated wave strength coefficients are K θ 1 = 0.26 and K θ 2 = 0.8 . The damping factors, h 1 = 0.2 and h 2 = 1.7 . The frequencies of the waves are ς 1 = 1.3 and ς 2 = 0.9 . Levels of white noise power are N 1 ( k ) = 2.69 and N 3 ( k ) = 1.56 . Where
N 2 ( t ) = 1 , t [ 0 s , 20 s ] 0 , t > 20 s , N 4 ( t ) = 1 , t [ 0 s , 15 s ] 0 , t > 15 s
At t 0 = 50 s, assuming the injected watermark signal has a periodicity of T = 10 s with Σ o = 0.5763 , there exist A d p 10 T 0 . After 10 periods of watermark signal injection, the injected watermark and compensation signals are illustrated in Figure 7. As depicted in the following figures, both the compensation and watermark signals exhibit periodic behavior with distinct values within each period.
In the following, an evaluation of watermark signal periods is conducted, detailing detection rates and false alarm rates under two types of replay attacks at various watermark intervals, as shown in Table 2. For the same watermark signal value, Σ o = 0.5763 , β values for both continuous and discontinuous replay attacks exhibit an increase for T < 10 . Conversely, β values decrease as the watermark period increases beyond T > 10 . Based on these observations, a period of T = 10 has been selected.
In scenarios devoid of process and measurement noise interference, with Σ o = 0.015 and Σ o = 0.4353 , the detection results under normal system operation are as illustrated in Figure 8. The values of the discriminant function are consistently zero, indicating the absence of false positives. With noise interference present in the system, the watermark signal variances are set to Σ o = 0.015 and Σ o = 0.4353 , with the corresponding normal operational detection results displayed in Figure 9, respectively. The state noise and measurement noise in the system can lead to false negatives and false positives. As the variance Σ o of the watermark signal increases, the incidence of false positives decreases.
Case 1: The UMVs system is subjected to continuous replay attacks. Setting the watermark signal at Σ o = 0.5763 , data are recorded by the attacker from 30 to 40 s. As illustrated in Figure 10 (left figure), the UMVs undergo replay attacks from 650 to 950 s. Similarly, as shown in Figure 10 (right figure), replay attacks occur from 750 to 1000 s. This case study aims to test the strategy’s effectiveness in detecting prolonged continuous replay attacks.
Case 2: The UMVs system is subjected to discontinuous replay attacks. Setting the watermark signal at Σ o = 0.5763 , data are recorded by the attacker from 30 to 40 s. As illustrated in Figure 11 (left figure), the UMVs undergo replay attacks from 620 to 660 s, 700 to 740 s, 780 to 820 s, 860 to 900 s, and 940 to 980 s. Similarly, as shown in Figure 11 (right figure), replay attacks occur from 620 to 710 s, 750 to 840 s, and 880 to 970 s. This case study aims to test the strategy’s effectiveness in detecting prolonged continuous replay attacks.
Detection effectiveness of the UMVs system under replay attacks, as demonstrated for both continuous and discontinuous types of replay attacks using the method proposed, is showcased in Case 1 and Case 2. In Case 1, the UMVs underwent continuous replay attacks of two different durations during regular operations. As Figure 10 indicates, during normal system operation, G ( k ) = 0 . However, when the UMVs are undergoing a replay attack, significant changes occur in the values of the detection function. Between 650 and 750 s, G ( k ) 0 , indicating that the UMVs are experiencing a replay attack. In Case 2, the UMVs underwent several brief intermittent replay attacks. As displayed in Figure 11, the system faced five short, discontinuous attacks and two additional quick, intermittent ones. Similar to Case 1, with the application of the proposed strategy, the detection function maintains G ( k ) = 0 during normal operations. Notable shifts in detection function values when under attack suggest a replay attack is occurring. After repeating experiments 1000 times, the detection rates for continuous and discontinuous replay attacks are β = 93.8 % and β = 90.1 % , respectively, with false positive rates of α = 4.5 % and α = 6.7 % . Thus, the method proposed in this article effectively detects the occurrence of continuous with discontinuous replay attacks of UMV systems.
As shown in Figure 12, in order to further validate the effectiveness of the proposed method, a comparative analysis is performed to compare the control performance of the proposed method with that of the method outlined in [30,36,37]. Simulations were conducted for 200 iterations on four approaches to obtain the average performance degradation and detection rates under replay attacks. It can be observed from Figure 12 that as the detection rate increases, the performance degradation of different methods gradually increases.
This analysis underscores the superiority of the proposed method by comparing various metrics, including the continuous replay attack detection rate β 1 , discontinuous replay attack detection rate β 2 , continuous replay attack false alarm rate α 1 , discontinuous replay attack false alarm rate α 2 , and the average control cost under multiple attacks J a v e , with those reported in previous studies [30,31,32,36,37]. The results of this comparative analysis are presented in Table 3 and Table 4.
It is revealed in Table 3 that when the detection requirements are specified as follows: continuous replay attack detection rate β 1 between 88% and 92%, discontinuous replay attack detection rate β 2 between 87% and 91%, continuous replay attack false alarm rate α 1 between 4% and 6%, and discontinuous replay attack false alarm rate α 2 between 6% and 10%, the lowest control cost of 24 is achieved by the proposed method.
It is shown in Table 4 that when the control cost J a v e for various methods is fixed at 80, other methods are surpassed by the proposed method in both continuous replay attack detection rate β 1 and discontinuous replay attack detection rate β 2 . Additionally, the continuous replay attack false alarm rate α 1 and discontinuous replay attack false alarm rate α 2 are both lower than those reported in previously published methods.
The superiority of the proposed method is evident from the data and analysis presented. When the detection accuracy requirement is held constant, the proposed method results in reduced control costs. Conversely, when the control cost requirement is fixed, the proposed method achieves higher detection accuracy and a lower false alarm rate.

5. Conclusions

This research has presented a method for detecting replay attacks on UMVs by employing periodic watermark and compensatory signals that adhere to a Gaussian signal. Unlike conventional approaches that use fixed thresholds to compare residual detection function magnitudes, this method has improved detection efficiency by evaluating the relative position across compensatory signals. The technique has not only achieved high detection rates but also reduced the variance of watermark signals, thus preserving system performance. However, when the attack delay aligns with an integer multiple of the watermark signal period, the method may produce some false positives. In the method used by Bian et al. [30], although the method incurs a greater loss in control system performance compared to the paper, it does not produce false positives under these circumstances. Addressing this issue is planned for future research. Future research will also focus on designing new watermark signals to minimize their effect on system control performance further.

Author Contributions

Conceptualization, methodology, software, validation, formal analysis, investigation, resources, data curation, writing—original draft preparation, writing—review and editing, visualization, supervision, project administration, funding acquisition, G.B. and X.G. All authors have read and agreed to the published version of the manuscript.

Funding

This work is supported in part by the National Natural Science Foundation of China under Grants 52301418; Sichuan Science and Technology Program under Grants 2024NSFSC0878; Joint Fund of Science and Technology Department of Liaoning Province and State Key Laboratory of Robotics under Grant 2022-KF-22-08.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

The raw data supporting the conclusions of this article will be made available by the authors on request.

Conflicts of Interest

The author declares no conflict of interest.

References

  1. Wang, Y.; Yang, X.; Hao, L.; Li, T.; Chen, C.L.P. Integral Sliding Mode Output Feedback Control for Unmanned Marine Vehicles Using T–S Fuzzy Model with Unknown Premise Variables and Actuator Faults. Appl. Sci. 2024, 12, 920. [Google Scholar] [CrossRef]
  2. Li, W.; Zhou, H.; Zhang, J. Quasi-Infinite Horizon Model Predictive Control with Fixed-Time Disturbance Observer for Underactuated Surface Vessel Path Following. Appl. Sci. 2024, 12, 967. [Google Scholar] [CrossRef]
  3. Wu, Y.; Wang, T.; Liu, S. A Review of Path Planning Methods for Marine Autonomous Surface Vehicles. Appl. Sci. 2024, 12, 833. [Google Scholar] [CrossRef]
  4. Li, Z.; Lei, K. Robust Fixed-Time Fault-Tolerant Control for USV with Prescribed Tracking Performance. Appl. Sci. 2024, 12, 799. [Google Scholar] [CrossRef]
  5. Pandey, P.K.; Kansal, V.; Swaroop, A. PKI-SMR: PKI based secure multipath routing for unmanned military vehicles (UMV) in VANETs. Wirel. Netw. 2024, 30, 595–615. [Google Scholar] [CrossRef]
  6. Zhang, P.; Li, H.; Wang, Y.; Zhao, X. Optimal search path planning of UUV in battlefield ambush scene. Def. Technol. 2024, 19, 101–111. [Google Scholar]
  7. Wang, H.; Wang, T.; Lv, H.; Liu, S. An adjustable pendulum mechanism for in-situ wave energy harvesting in an unmanned marine vehicle. Ocean Eng. 2024, 297, 117116. [Google Scholar] [CrossRef]
  8. Song, W.; Tong, S. Event-triggered fuzzy finite-time reliable control for dynamic positioning of nonlinear unmanned marine vehicles. Ocean Eng. 2022, 266, 113139. [Google Scholar] [CrossRef]
  9. Wang, W.; Liang, H.; Pan, Y.; Li, T. Prescribed Performance Adaptive Fuzzy Containment Control for Nonlinear Multiagent Systems Using Disturbance Observer. IEEE Trans. Cybern. 2020, 50, 3879–3891. [Google Scholar] [CrossRef]
  10. Hao, L.; Zhang, H.; Li, H.; Li, T. Sliding mode fault-tolerant control for unmanned marine vehicles with signal quantization and time-delay. Ocean Eng. 2020, 215, 107882. [Google Scholar] [CrossRef]
  11. Chwa, D. Global Tracking Control of Underactuated Ships With Input and Velocity Constraints Using Dynamic Surface Control Method. IEEE Trans. Control Syst. Technol. 2011, 19, 1357–1370. [Google Scholar] [CrossRef]
  12. Ge, S.S.; Zhang, J. Neural-network control of nonaffine nonlinear system with zero dynamics by state and output feedback. IEEE Trans. Neural Netw. 2003, 14, 900–918. [Google Scholar] [PubMed]
  13. Liu, M.; Zhao, C.; Xia, J.; Deng, R.; Cheng, P.; Chen, J. PDDL: Proactive Distributed Detection and Localization against Stealthy Deception Attacks in DC Microgrids. IEEE Trans. Smart Grid 2023, 14, 714–731. [Google Scholar] [CrossRef]
  14. Alfaro-Cid, E.; McGookin, E.W.; Murray-Smith, D.J.; Fossen, T.I. Genetic Programming for the Automatic Design of Controllers for a Surface Ship. IEEE Trans. Intell. Transp. Syst. 2008, 9, 311–321. [Google Scholar] [CrossRef]
  15. Liu, Q.; Long, Y.; Li, T.; Chen, C.L.P. Attack-resilient fault detection for interconnected systems under DoS attack. ISA Trans. 2024, 148, 201–211. [Google Scholar] [CrossRef] [PubMed]
  16. Zhang, D.; Ye, Z.; Feng, G.; Li, H. Intelligent Event-Based Fuzzy Dynamic Positioning Control of Nonlinear Unmanned Marine Vehicles Under DoS Attack. IEEE Trans. Cybern. 2022, 52, 13486–13499. [Google Scholar] [CrossRef]
  17. Fei, Z.; Wang, X.; Wang, Z. Event-Based Fault Detection for Unmanned Surface Vehicles Subject to Denial-of-Service Attacks. IEEE Trans. Syst. Man Cybern. Syst. 2022, 52, 3326–3336. [Google Scholar] [CrossRef]
  18. Zhang, Z.; Cheng, P.; Wu, J.; Chen, J. Secure State Estimation Using Hybrid Homomorphic Encryption Scheme. IEEE Trans. Control Syst. Technol. 2021, 29, 1704–1720. [Google Scholar] [CrossRef]
  19. Steiner, J.; Neuman, C.; Schiller, J. Kerberos: An authentication service for open networks. In Proceedings of the USENIX Annual Tech Conference, Dallas, TX, USA, 9–12 February 1988. [Google Scholar]
  20. Greene, K.; Rodgers, D.; Dykhuizen, H.; Niyaz, Q.; Shamaileh, K.A.; Devabhaktuni, V. A Defense Mechanism Against Replay Attack in Remote Keyless Entry Systems Using Timestamping and XOR Logic. IEEE Consum. Electron. Mag. 2021, 10, 101–108. [Google Scholar] [CrossRef]
  21. Farha, F.; Ning, H.; Yang, S.; Xu, J.; Zhang, W.; Choo, K.-K.R. Timestamp Scheme to Mitigate Replay Attacks in Secure ZigBee Networks. IEEE Trans. Mob. Comput. 2022, 21, 342–351. [Google Scholar] [CrossRef]
  22. Xiao, M.; Song, W.; Yang, K.; OuYang, R.; Zhao, H. Formal Analysis of the Security Protocol with Timestamp Using SPIN. Comput. Intell. Neurosci. 2022, 2022, 2420590. [Google Scholar] [CrossRef] [PubMed]
  23. Yang, C.; Chu, Z.; Ma, L.; Wang, G.; Dai, W. Joint Watermarking-Based Replay Attack Detection for Industrial Process Operation Optimization Cyber-Physical Systems. IEEE Trans. Ind. Inform. 2023, 19, 8910–8922. [Google Scholar] [CrossRef]
  24. Zhu, H.; Liu, M.; Fang, C.; Deng, R.; Cheng, P. Detection-Performance Tradeoff for Watermarking in Industrial Control Systems. IEEE Trans. Inf. Forensics Secur. 2023, 18, 2780–2793. [Google Scholar] [CrossRef]
  25. Du, D.; Zhang, C.; Li, X.; Fei, M.; Zhou, H. Attack Detection for Networked Control Systems Using Event-Triggered Dynamic Watermarking. IEEE Trans. Ind. Inform. 2023, 19, 351–361. [Google Scholar] [CrossRef]
  26. Liu, H.; Mo, Y.; Yan, J.; Xie, L.; Johansson, K.H. An Online Approach to Physical Watermark Design. IEEE Trans. Autom. Control 2020, 65, 3895–3902. [Google Scholar] [CrossRef]
  27. Ma, L.; Chu, Z.; Yang, C.; Wang, G.; Dai, W. Recursive Watermarking-Based Transient Covert Attack Detection for the Industrial CPS. IEEE Trans. Inf. Forensics Secur. 2023, 18, 1709–1719. [Google Scholar] [CrossRef]
  28. Naha, A.; Teixeira, A.M.H.; Ahlén, A.; Dey, S. Quickest detection of deception attacks on cyber–physical systems with a parsimonious watermarking policy. Automatica 2023, 155, 111147. [Google Scholar] [CrossRef]
  29. Song, Z.; Skuric, A.; Ji, K. A Recursive Watermark Method for Hard Real-Time Industrial Control System Cyber-Resilience Enhancement. IEEE Trans. Autom. Sci. Eng. 2020, 17, 1030–1043. [Google Scholar] [CrossRef]
  30. Bian, G.; Long, Y.; Li, T.; Park, J.H.; Chen, C.L.P. Watermark-Based Replay Attack Detection for Unmanned Marine Vehicles. IEEE Trans. Intell. Veh. 2024. early access. [Google Scholar] [CrossRef]
  31. Mo, Y.; Chabukswar, R.; Sinopoli, B. Detecting Integrity Attacks on SCADA Systems. IEEE Trans. Control Syst. Technol. 2014, 22, 1396–1407. [Google Scholar] [CrossRef]
  32. Fang, C.; Qi, Y.; Cheng, P.; Zheng, W.X. Optimal periodic watermarking schedule for replay attack detection in cyber–physical systems. Automatica 2020, 112, 108698. [Google Scholar] [CrossRef]
  33. Wang, Y.-L.; Han, Q.-L.; Fei, M.-R.; Peng, C. Network-Based T–S Fuzzy Dynamic Positioning Controller Design for Unmanned Marine Vehicles. IEEE Trans. Cybern. 2018, 48, 2750–2763. [Google Scholar] [CrossRef] [PubMed]
  34. Peng, Z.; Wang, J.; Wang, D.; Han, Q.-L. An Overview of Recent Advances in Coordinated Control of Multiple Autonomous Surface Vehicles. IEEE Trans. Ind. Inform. 2021, 17, 732–745. [Google Scholar] [CrossRef]
  35. Hao, L.-Y.; Zhang, H.; Li, T.S.; Lin, B.; Chen, C.L.P. Fault Tolerant Control for Dynamic Positioning of Unmanned Marine Vehicles Based on T-S Fuzzy Model with Unknown Membership Functions. IEEE Trans. Veh. Technol. 2021, 70, 146–157. [Google Scholar] [CrossRef]
  36. Mo, Y.; Weerakkody, S.; Sinopoli, B. Physical Authentication of Control Systems: Designing Watermarked Control Inputs to Detect Counterfeit Sensor Outputs. IEEE Control Syst. Mag. 2015, 35, 93–109. [Google Scholar]
  37. Zhao, S.; Li, Q.; Cao, H. Improved Smooth Watermarking Methods for Detecting Replay Attacks in Process Control Systems. Electronics 2023, 12, 3812. [Google Scholar] [CrossRef]
Figure 1. The UMVs diagram.
Figure 1. The UMVs diagram.
Applsci 14 08298 g001
Figure 2. Reference Reference frames fixed to the Earth and the body.
Figure 2. Reference Reference frames fixed to the Earth and the body.
Applsci 14 08298 g002
Figure 3. Membership functions.
Figure 3. Membership functions.
Applsci 14 08298 g003
Figure 4. The timing diagram of the replay attacks.
Figure 4. The timing diagram of the replay attacks.
Applsci 14 08298 g004
Figure 5. UMVs equipped with periodic watermarking algorithm.
Figure 5. UMVs equipped with periodic watermarking algorithm.
Applsci 14 08298 g005
Figure 6. A realization of a replay attack and periodic watermarking method.
Figure 6. A realization of a replay attack and periodic watermarking method.
Applsci 14 08298 g006
Figure 7. The periodic watermarking signal and the periodic compensation signal with a period of T = 10 .
Figure 7. The periodic watermarking signal and the periodic compensation signal with a period of T = 10 .
Applsci 14 08298 g007
Figure 8. G ( k ) for UMVs with different watermark signal variances in the absence of noise.
Figure 8. G ( k ) for UMVs with different watermark signal variances in the absence of noise.
Applsci 14 08298 g008
Figure 9. G ( k ) for UMVs with different watermark signal variances in the presence of noise.
Figure 9. G ( k ) for UMVs with different watermark signal variances in the presence of noise.
Applsci 14 08298 g009
Figure 10. The G ( k ) of the UMVs during continuous replay attacks in Case 1.
Figure 10. The G ( k ) of the UMVs during continuous replay attacks in Case 1.
Applsci 14 08298 g010
Figure 11. The G ( k ) of the UMVs during discontinuous replay attacks in Case 2.
Figure 11. The G ( k ) of the UMVs during discontinuous replay attacks in Case 2.
Applsci 14 08298 g011
Figure 12. Comparison between the performance index of the method proposed in this paper and others [30,36,37].
Figure 12. Comparison between the performance index of the method proposed in this paper and others [30,36,37].
Applsci 14 08298 g012
Table 1. Advantages and Limitations of Different Existing Methods.
Table 1. Advantages and Limitations of Different Existing Methods.
Detection MethodTimestampWatermarkVulnerablePreciseCost-Effective
Ref. [19]
Ref. [20]
Ref. [25]
Ref. [26]
Ref. [27]
Ref. [27]
Ref. [29]
Proposed Method
Table 2. Detection Rates of Replay Attacks under Different Watermark Periods.
Table 2. Detection Rates of Replay Attacks under Different Watermark Periods.
T Σ o β of Continuous Replay Attacks β of Discontinuous Replay Attacks
60.576392.5%87.3%
80.576392.7%88.4%
100.576393.8%90.1%
120.576393.3%89.2%
140.576389.6%87.5%
Table 3. Comparison of Detection Efficiency and Control Cost Between Methods in This Paper and Other Papers under the Same Detection Efficiency.
Table 3. Comparison of Detection Efficiency and Control Cost Between Methods in This Paper and Other Papers under the Same Detection Efficiency.
J ave β 1 α 1 β 2 α 2
Method in This Paper24 88 92 % 4 6 % 87 91 % 6 10 %
Method in Bian et al. [30]30 88 92 % 4 6 % 87 91 % 6 10 %
Method in Zhao et al. [37]55 88 92 % 4 6 % 87 91 % 6 10 %
Method in Fang et al. [32]93 88 92 % 4 6 % 87 91 % 6 10 %
Method in Mo et al. [31]167 88 92 % 4 6 % 87 91 % 6 10 %
Method in Mo et al. [36]175 88 92 % 4 6 % 87 91 % 6 10 %
Table 4. Comparison of Detection Efficiency and Control Cost Between Methods in This Paper and Other Papers under the Same Control Performance Loss.
Table 4. Comparison of Detection Efficiency and Control Cost Between Methods in This Paper and Other Papers under the Same Control Performance Loss.
J ave β 1 α 1 β 2 α 2
Method in This Paper80 95 96 % 1 2 % 95 96 % 1 2 %
Method in Bian et al. [30]80 92 94 % 1 2 % 92 94 % 1 3 %
Method in Zhao et al. [37]80 90 92 % 3 5 % 89 92 % 3 4 %
Method in Fang et al. [32]80 82 84 % 9 12 % 79 80 % 11 13 %
Method in Mo et al. [31]80 67 70 % 16 19 % 57 66 % 22 27 %
Method in Mo et al. [36]80 65 70 % 17 23 % 53 62 % 28 35 %
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Bian, G.; Gao, X. Enhancing Unmanned Marine Vehicle Security: A Periodic Watermark-Based Detection of Replay Attacks. Appl. Sci. 2024, 14, 8298. https://doi.org/10.3390/app14188298

AMA Style

Bian G, Gao X. Enhancing Unmanned Marine Vehicle Security: A Periodic Watermark-Based Detection of Replay Attacks. Applied Sciences. 2024; 14(18):8298. https://doi.org/10.3390/app14188298

Chicago/Turabian Style

Bian, Guangrui, and Xiaoyang Gao. 2024. "Enhancing Unmanned Marine Vehicle Security: A Periodic Watermark-Based Detection of Replay Attacks" Applied Sciences 14, no. 18: 8298. https://doi.org/10.3390/app14188298

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop