Next Article in Journal
Decoupling Methods in Planar Ultra-Wideband Multiple-Input-Multiple-Output Antennas: A Review of the Design, State-of-the-Art, and Research Challenges
Previous Article in Journal
Software Requirement Risk Prediction Using Enhanced Fuzzy Induction Models
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Improved Smooth Watermarking Methods for Detecting Replay Attacks in Process Control Systems

School of Electrical Engineering and Automation, Tianjin University of Technology, Tianjin 300384, China
*
Author to whom correspondence should be addressed.
Electronics 2023, 12(18), 3812; https://doi.org/10.3390/electronics12183812
Submission received: 7 August 2023 / Revised: 4 September 2023 / Accepted: 6 September 2023 / Published: 8 September 2023

Abstract

:
Network attack detection is a crucial issue in cyber–physical systems. One classical type of network attack is the replay attack. Although the watermarking scheme has proven to be effective in detecting replay attacks, it may confront numerous challenges when applied to process control systems. The watermarking signal, which consists of independent and identically distributed Gaussian noise sequences, responds slowly to industrial process control systems. To address this issue, two novel smooth watermarking methods are proposed. The smooth watermarking signals exhibit low-frequency characteristics, enabling them to effectively handle large inertia processes. The proposed schemes are validated through two simulated examples. These examples indicate that the proposed methods can significantly enhance detection efficiency while minimizing additional control performance loss.

1. Introduction

After decades of development, network technology has achieved very great progress. This makes it possible for it to be used in several control systems, such as cyber–physical systems (CPSs). The cyber and physical layers are connected through networks in these systems, which makes it easier to analyze and design control systems. In addition to the advantage, there has been growing concern about the security of these systems [1,2,3]. Control systems that are vulnerable to attacks can lead to severe consequences, such as serious economic losses [4,5].
Over the past few decades, there have been several attack incidents, for example, the attack on the Maroochy Shire Council’s sewage control system in Queensland in 2000 [6]. The StuxNet virus is another representative attack, which targets supervisory control and data acquisition systems used in several industrial and power systems [7]. Additionally, the Ukraine power outage in 2015 [8] and the security incident at the ‘Kemuri’ water company in 2016 [9] highlight the need for increased attention to CPS security. Hence, essential security schemes should be deployed in CPSs to fight against the attacks launched by some malicious users.
Among these attacks, one typical attack is called Denial-of-Service (DoS), which aims to disrupt network transmission [10]. Under a DoS attack, receivers cannot obtain any transmitted information, as the communication channels or infrastructures are paralyzed. Another representative attack is the replay attack, where the pre-recorded transmission is irregularly injected into networks by attackers [11]. This type of attack cannot be detected with traditional network defense technologies because the pre-recorded information is stolen from valid transmissions, such as involving the StuxNet virus [7]. In this context, secure strategies based on control theory should be developed to resist replay attacks.
Active detection schemes introduced from fault diagnoses are considered as the most effective solutions in detecting replay attacks. In these methods, probing signals will be injected into packets before transmission to facilitate the detection of attacks on the receiver side. A primary active detection method is the timestamp-based technology [12,13]. By embedding a timestamp in the head of the packets, replayed historical signals can be quickly identified by receivers. However, this method may not always be effective if attackers can tamper with the timestamps in stealing the packets [14].
In this context, another active detection scheme called watermark-based technology (physical watermark or dynamic watermark) was proposed to detect replay attacks [15]. This technology is inspired by digital watermarking techniques widely used in electronic documents to preserve private information. The watermarking signal is invisible to attackers because of its random characteristic, which greatly increases the difficulty of launching a replay attack. Therefore, it can be considered to be the most reliable detection technology to date. There are two types of watermarking signals according to their deployment positions. One is the sensor multiplicative watermark used to encrypt the sensor outputs [16]. The encrypted signals are then decrypted on the controller side. The most significant advantage of this watermarking is the zero-performance loss compared with its rival. However, theoretical studies on this watermarking are not yet complete.
Another type of watermarking scheme is known as a controller additive watermark. In this scheme, the watermarking signal is added to the control signal [15]. The watermarking signal can potentially degrade the efficiency of the control signal [17]. There have been sufficient theoretical works conducted in this area despite the negative impact on system performance [18]. The effectiveness of the watermarking method is addressed in [19], not only for single-input–single-output (SISO) systems but also for multi-input–multi-output (MIMO) systems with Gaussian noises. The watermarking strategy is also used to detect and distinguish replay attacks from other anomalies in nuclear power plants [20]. The effectiveness of the watermarking scheme is demonstrated in the context of power systems to secure the distributed measurements feeding automatic generation control (AGC) [21].
Other studies on generating watermarking signals have also been reported, such as periodic watermarking signals [22], online watermarking signals [23], time-varying watermarking signals [24], two-controller schemes [25], etc. Apart from the timestamp and watermarking-based technologies, other active detection schemes have also been investigated. For example, a hidden Markov model is utilized to replace watermarking signals by generating a set of random serial numbers [18].
Compared with the sensor multiplicative watermarking method, the controller additive watermarking scheme is considered easier to implement from an engineering perspective. It is worth noting that the watermarking method proposed in [18] can be applied to various CPSs, excluding process control systems [26,27]. These process systems may not be sensitive to the watermarking signal due to their large inertia characteristic. Therefore, applying a watermarking signal in these systems not only has ineffective attack detection but also results in reduced control performance. So, in summary, it is necessary to make some improvements if the watermarking signal is to be used in process control systems.
Motivated by the aforementioned reasons, two improved watermarking methods used for process control systems are proposed in this paper. The main contributions are outlined as follows:
(1) While numerous uses of the watermarking scheme exist in dynamic systems, there is a lack of research on process systems. In this paper, smoothing technologies are applied to increase the sensitivity of the process systems to watermarking signals. In this context, this problem may be solved with the proposed smooth watermarking and sliding smooth watermarking schemes, which can greatly extend the application of the watermarking method proposed in [18].
(2) The relationship between the performance loss and the watermarking signal is explicitly explored. The purpose is to minimize the performance loss while still achieving better attack detection efficiency by designing suitable smooth parameters.
The remainder of this paper is organized as follows: Section 2 introduces the system description. Section 3 presents the system model under attacks. Section 4 proposes two smooth watermarking methods for process control systems. Finally, Section 5 provides two examples to illustrate the effectiveness of the proposed smooth watermarking schemes.
Notations: R and Z denote the set of all real numbers and the set of integers, respectively. R n is the n-dimensional Euclidean space. X T represents the transpose of the matrix X . X 1 represents the inverse of the matrix X . I is the identity matrix with an appropriate dimension. N ( μ , σ 2 ) stands for Gaussian white noise with mean μ and variance σ 2 .

2. System Description

In this section, the discrete system model considered in the paper is constructed. Additionally, the Kalman estimator and the LQG control scheme are introduced.

2.1. System Model and Kalman Estimator

Consider a discrete linear time-invariant (LTI) system,
x k + 1 = A x k + B u k + ω k ,
y k = C x k + ν k .
where x k R n is the system state, u k R n denotes the control input, and y k R n means the system output. A , B , and C are the system matrix, control matrix, and measurement matrix with appropriate dimensions. { ω k N ( 0 , Q ) } and { ν k ~ N ( 0 , R ) } respectively represent process and measurement noise, and are independent of each other. Q and R are positive definite covariance matrices.
The Kalman estimator, an optimal filter based on the least mean square error, is used to effectively remove noise interference in (2). Being an online recursive algorithm, it does not need to store all the historical data but the data from the last moment. The Kalman estimator can be represented as
x ^ k k 1 = A x ^ k 1 + B u k 1 ,
x ^ k = x ^ k k 1 + K ( y k C x ^ k k 1 ) ,
  z k y k C x ^ k k 1   ,
e k x k x ^ k .
where x ^ k k 1 and x ^ k denote the prior estimation and optimal estimation of x k , respectively. z k is the residual vector. And e k means the estimation error. The Kalman gain can be calculated as follows:
K = P C T ( C P C T + R ) 1 ,
where P is the solution of the following Riccati equation:
P = A P A T + Q A P C T ( C P C T + R ) 1 C P A T ,

2.2. LQG Optimal Controller

In order to obtain the control signal, an LQG controller is used to minimize the following infinite horizon linear quadratic objective function:
J = lim N E { 1 N + 1 [ k = 0 N ( x k T W x k + u k T U u k ) ] } ,
where W and U are positive semidefinite matrices. According to the separation theorem, an optimal control input u k * is derived by solving the optimization problem mentioned above. The control input is the linear feedback of the optimal state estimation x ^ k .
u k * = L x ^ k ,
where L can be described as
L = ( B T S B + U ) 1 B T S A ,
where S satisfies the following Riccati equation:
S = A T S A + W - A T S B ( B T S B + U ) - 1 B T S A .
The optimal objective function J * is given by
J * = t r a c e ( S Q ) + t r a c e [ ( A T S A + W S ) ( P K C P ) ] ,
where t r a c e (   ) represents the trace of a matrix.

3. System under Replay Attacks

In this section, the system model under replay attacks is first introduced. The stability of the system under replay attacks is then discussed. Finally, a detailed argument on the effectiveness of the watermarking signal in detecting attacks is provided.

3.1. System Model under Replay Attacks

The process of launching a replay attack is described as follows. An attacker observes and records the previous sensor outputs y k for all k . And then the recorded data will be injected into the control system to launch the replay attack. For instance, the attacker records the sensor outputs from time T to time 1 , and then replays them from time 0 to time T 1 . The sensor outputs y k in this situation are the same as the data stolen at time k T , which means
y k = y k T , 0 k T 1 .
Then, the system under replay attacks can be described as
x k + 1 = A x k + B u k + ω k ,
y k = C x k + ν k ,
x ^ k k 1 = A x ^ k 1 + B u k 1 ,
x ^ k = x ^ k k 1 + K ( y k C x ^ k k 1 ) ,
z k y k C x ^ k k 1 .
Remark 1.
Attackers have the ability to steal the sensor data at any time. In order to facilitate mathematical calculations, the start time of the attack in the following is considered as time  0 . In other words, the attackers immediately launch an attack after stealing the sensor data at the time  k T . In this context, the system under the attacks can be viewed as the shifted version of system (1)–(5).

3.2. System Stability under Replay Attacks

The stability of the system under a replay attack may be damaged. Therefore, the stability conditions of the system under attacks should be explicitly investigated. The following equations used to construct an augmented system can be obtained from (14)–(19):
e k + 1 = x k + 1 x ^ k + 1 = x k + 1 ( x ^ k + 1 k + K ( y k + 1 T C x ^ k + 1 k ) ) = ( I K C ) ( x k + 1 x ^ k + 1 k ) K ν k + 1 T + K C ( x k + 1 x k + 1 T ) = ( A K C A ) e k + ( I K C ) ω k K ν k + 1 T + K C ( x k + 1 x k + 1 T ) = ( A K C A ) e k + ( I K C ) ω k K ν k + 1 T + K C ( ( A + B L ) x k B L e k + ω k ( A + B L ) x k T + B L e k T ω k T ) = K C ( A + B L ) x k + ( A K C A K C B L ) e k K C ( A + B L ) x k T + K C B L e k T + ω k K C ω k T K ν k + 1 T ,
e k T + 1 = x k T + 1 x ^ k T + 1 = x k T + 1 ( x ^ k T + 1 k T + K ( y k + 1 T C x ^ k T + 1 k T ) ) = ( I K C ) ( x k T + 1 x ^ k T + 1 k T ) K ν k + 1 T + K C ( x k T + 1 x k + 1 T ) = ( A K C A ) e k T + ( I K C ) ω k T K ν k + 1 T ,
x k + 1 = A x k + B u k + ω k = A x k + B L ( x k e k ) + ω k = ( A + B L ) x k B L e k + ω k ,
x k T = A x k T 1 + B u k T 1 + ω k T 1 = A x k T 1 + B L ( x k T 1 e k T 1 ) + ω k T 1 = ( A + B L ) x k T 1 B L e k T 1 + ω k T 1 .
The system under attacks can be rewritten as
x ˜ k + 1 = A ˜ x ˜ k + B ˜ ω ˜ k , 0 k T 1 ,
where
x ˜ k = [ x k e k x k T e k T ] ,
ω ˜ k = [ ω k ν k + 1 ω k T ν k + 1 T ] ,
A ˜ = [ A + B L B L 0 0 K C ( A + B L ) A K C A K C B L K C ( A + B L ) K C B L 0 0 A + B L B L 0 0 0 A K C A ] ,
B ˜ = [ I 0 0 0 I 0 K C K 0 0 I 0 0 0 I K C K ] .
The augmented state vector x ˜ k is composed of the state vector [ x k e k ] with attacks and the state vector [ x k T e k T ] without attacks. Therefore, the stability of the closed-loop system without attacks relies on A + B L and A K C A . By using the elementary transformation, the stability of the closed-loop system with attacks is dependent on A + B L , A K C A , A , and ( I K C ) ( A + B L ) .
Remark 2.
According to Theorem 1 in [18], a stable system is insensitive to a replay attack, since the residual used for the attack detection tends to be zero. That means the replay attack cannot be detected. Consequently, alternative methods need to be explored to address the replay attack of stable systems, such as incorporating a watermarking signal.

3.3. Attack Detection with Watermarking Signal

In a watermarking-signal-based attack detection, the watermarking signal is assumed to be an independent and identically distributed (IID) zero-mean Gaussian noise sequence with a variance diagonal matrix, Λ . Then, the true control input u k with an additive watermark can be described as
u k = u k * + ξ k ,
where u k * is the optimal LQG control signal, and ξ k is the watermarking signal with { ξ k N ( 0 , Λ ) } . Accordingly, the control input with replay attacks and the watermarking signal can be rewritten as
u k = u k * + ξ k ,
where u k * and ξ k are the LQG control signal and watermarking signal of the systems under attacks.
The system with replay attacks and watermarking signals is depicted in Figure 1.
After injecting a watermarking signal, the optimal state estimation of the system without attacks is modified as
x ^ k k 1 = A x ^ k 1 + B u k 1 , = ( A + B L ) x ^ k 1 + B ξ k 1 , = ( A + B L ) ( I K C ) x ^ k 1 k 2 + ( A + B L ) K y k 1 + B ξ k 1 ,
It is also easy to reconstruct x ^ k k 1 of the system under attacks.
x ^ k k 1 = A x ^ k 1 + B u k 1 , = ( A + B L ) x ^ k 1 + B ξ k 1 , = ( A + B L ) ( I K C ) x ^ k 1 k 2 + ( A + B L ) K y k 1 + B ξ k 1 ,
According to (14), y k 1 in (31) and y k 1 in (32) are the same. Then, we have
x ^ k k 1 x ^ k k 1 = Γ k ( x ^ 0 1 x ^ 0 1 ) + B ( ξ k 1 ξ k 1 ) ,
where Γ = ( A + B L ) ( I K C ) . After incorporating the watermark signal, the variation of the residual of the system under replay attacks can be written as
z k z k = C Γ k ( x ^ 0 1 x ^ 0 1 ) + C i = 0 k Γ k i B ( ξ i ξ k ) ,
Similar to (13), the whole performance loss of the system with the watermarking signal can be described as
J = J * + t r a c e [ ( B T S B + U ) Λ ] ,
where J * is the performance loss of the optimal control in Formula (13). Let Δ J t r a c e [ ( B T S B + U ) Λ ] , where Λ is the variance of the watermarking signal. Δ J means the additional performance loss induced with the watermarking signal. The watermarking signal is essentially a group of Gaussian white noise. So, it degrades the efficiency of u k and unavoidably introduces additional performance loss.
Remark 3.
The system residual converges to a non-zero value when a watermarking signal is injected. Therefore, replay attacks can be detected even if the closed-loop system is stable. It means that the replay attacks will be exposed by injecting the watermarking signal.
Γ is stable, and the first term on the right side of Equation (34) hence converges to 0 as k approaches infinity. Additionally, neither ξ i nor ξ i is dependent on z k , and the watermarking signals are uncorrelated with each other. Therefore, the expectation and covariance of the residual under replay attacks can be described as follows:
μ k = C i = 0 k Γ k i B ξ i ,
  Σ k = 2 C o v [ C i = 0 k Γ k i B ξ i ] ,
Expanding (37), we have
Σ lim k Σ k = 2 i = 0 k C Γ i B Λ B T ( Γ i ) T C T ,
In the following, the chi square ( X 2 ) detector is updated to verify the occurrence of replay attacks. The expression is reconstructed as follows [18]:
g ( z k ) = z k T ( A ) 1 z k ( z k μ k 1 ) T ( A + Σ ) 1 ( z k μ k 1 ) η ,
where A = C P C T + R , and η is a detection threshold to be designed. If g ( z k ) < η , it indicates that the system is operating normally. On the other hand, if g ( z k ) η , the system is being copped by a replay attack.
To evaluate the effectiveness of the X 2 detector, the asymptotic detection rate β is defined as
β lim k P ( g ( z k ) η ) ,
β is a monotonically increasing function of Σ   [18]. It can be seen from ( 38 ) that Σ   is solely dependent on Λ . Therefore, the asymptotic detection rate β of the X 2 detector is a monotonically increasing function only about the variance Λ of the watermarking signal. This implies that the detection rate can be improved by increasing the variance Λ . However, a larger variance Λ will result in more additional performance loss. Hence, how to design an appropriate variance of the watermarking signal is a great challenge.

4. Watermarking Smoothing Methods

Modern industrial processes in factories are characterized as large time delay and inertia systems, making them insensitive to rapidly changing inputs. Based on this property, the watermarking signal proposed in [18] may not be suitable for industrial processes. Therefore, the watermarking signal should be specifically redesigned if it is to be used in industrial processes. Following Remark 3, the frequency of the watermarking signal should be degraded to match the slow property of the industrial processes.
In this section, two methods are proposed to obtain a low-frequency watermarking signal by adding new sampling points or sliding windows between two consecutive signal points of the original watermark.

4.1. Smooth Watermarking Method

In this method, some positive integer variables, h , m , n , and v , are defined. The variables h , m , n , and v represent smooth segments. Additionally, positive integers a , b , and c are used as weights.
The design process of this method can be described as follows: The original watermarking signal is divided into h parts between two consecutive signal points ( ξ k ,   ξ k + 1 ) . The h parts are further divided into three segments. In this design, h can be further divided into any number of subsegments in the following. For the sake of convenience of the formula expression and calculation, without loss of generality, we use three segments as an example to design.
The first segment containing m parts is assigned a weight, a . Similarly, the second segment including n parts is assigned a weight, b , and the remaining segment involving v parts is assigned a weight, c . The segment allocation should satisfy m + n + v = h , while the weights should meet a + b + c = 1 , where { a , b , c   |   0 < a , b , c < 1 , a , b , c R } .
A new watermarking signal, Δ ξ k , is generated by performing the above process. To achieve smoothing, the original signal ( ξ k , ξ k + 1 ) is replaced with several new signal points generated through uniform sampling. In essence, the new watermarking signal is obtained by taking the weighted average of the sampling points. A low-frequency signal suitable for process control systems is obtained after the smoothing. The mathematical expression of the smooth watermarking signal is
Δ ξ k = [ ξ k + ( ξ k + 1 ξ k ) m h ] a + [ ξ k + ( ξ k + 1 ξ k ) n h ] b + [ ξ k + ( ξ k + 1 ξ k ) v h ] c = ( h m h a + h n h b + h v h c ) ξ k + ( m h a + n h b + v h c )   ξ k + 1 ,
Remark 4.
In the smooth watermarking method, the original watermarking signal is divided into three parts: m h ,  n h , and  v h . A weighted average is performed on each part using the corresponding weights  a ,  b , and  c . It is worth noting that the smoothing segments, weight values, and weight distribution can be designed according to the specific requirements. However, different divisions and weights may have different impacts on the performance loss and detection rate.
The statistical properties of the smooth watermarking are as follows: E Δ ξ k represents the mean of Δ ξ k and D Δ ξ k represents the variance of Δ ξ k . The mean and the variance are derived from the following equations:
E Δ ξ k = E [ ( h m h a + h n h b + h v h c ) ξ k + ( m h a + n h b + v h c ) ξ k + 1 ] = 0
D Δ ξ k = D [ ( h m h a + h n h b + h v h c ) ξ k + ( m h a + n h b + v h c ) ξ k + 1 ] , = E [ ( ( h m h a + h n h b + h v h c ) ξ k + ( m h a + n h b + v h c ) ξ k + 1 ) 2 ] = E [ ( ( h m h a + h n h b + h v h c ) ξ k ) 2 + ( ( m h a + n h b + v h c ) ξ k + 1 ) 2 ] + 2 ( h m h a + h n h b + h v h c ) ξ k ( m h a + n h b + v h c ) ξ k + 1 = ( h m h a + h n h b + h v h c ) 2 Λ + ( m h a + n h b + v h c ) 2 Λ ,
Let D Δ ξ k = Θ Λ , where Θ = α + ϵ , α = ( h m h a + h n h b + h v h c ) 2 , and ϵ = ( m h a + n h b + v h c ) 2 . According to (35), the additional performance loss of the control system is only related to the variance of the redesigned watermarking signal. Therefore, the additional performance loss caused by the smooth watermarking is
Δ J t r a c e [ ( B T S B + U ) Θ Λ ] ,
Δ J = Θ Δ J .
The additional performance loss can be smaller than that of the original watermark by designing appropriate smooth parameters. Additionally, the change in the weights can help improve the detection efficiency. This will be demonstrated in Section 5.

4.2. Sliding Smooth Watermarking Method

The sliding smooth watermarking method is introduced in the following. Two positive integer variables u and K 1 are defined. u indicates the number of smoothing segments, and K 1 indicates the size of the sliding window.
It is assumed that the original watermarking signal is divided into u parts between two continuous signal points ( ξ k , ξ k + 1 ) . A sliding window with the size K 1 is deployed to calculate the average of the first K 1 part.
For each K 1 part, there is an inner window with a variable size. The left side of the inner window overlaps the left side of the sliding window. The right side of the inner window moves one step to the right until it reaches the end of the sliding window. The mean of the first K 1 part is obtained by averaging the values derived from each moving step of the inner window. After moving the sliding window one step to the right, the second mean of the K 1 part is obtained. The sliding window continues to move right until it reaches the end of the original watermarking signal segment.
Ultimately, the final smooth signal is obtained by averaging the values derived from each moving step of the sliding window. Note that the smooth parameter u and window size K 1 should satisfy the condition u > K 1 , and the number of moving steps should be equal to u K 1 + 1   { u , K 1   |   u , K 1 > 0 , u , K 1 Z } .
A new sliding smooth watermarking signal Δ ξ k is generated by performing the aforementioned process. In essence, the new watermarking signal is obtained by taking the sliding average of the sampling points of the original watermarking signal. The mathematical model of this new watermarking signal can be described as
Δ ξ k = 1 u K 1 + 1 m = 1 u K 1 + 1 1 K 1 i = m K 1 + m 1 [ ξ k + ( ξ k + 1 ξ k ) i n ] ,
It is worth noting that u and K 1 can be freely designed. The statistical properties of the sliding smooth watermarking are
  E Δ ξ k = E [ 1 u K 1 + 1 m = 1 u K 1 + 1 1 K 1 i = m K 1 + m 1 [ ξ k + ( ξ k + 1 ξ k ) i u ] ] = 0
D Δ ξ k = D [ 1 u K 1 + 1 m = 1 u K 1 + 1 1 K 1 i = m K 1 + m 1 [ ξ k + ( ξ k + 1 ξ k ) i u ] ] = E ( 1 u K 1 + 1 m = 1 u K 1 + 1 1 K 1 i = m K 1 + m 1 [ ξ k + ( ξ k + 1 ξ k ) i u ] ) 2 = E [ ( 1 u K 1 + 1 m = 1 u K 1 + 1 ( ξ k K 1 i = m K 1 + m 1 u i u + ξ k + 1 K 1 i = m K 1 + m 1 i u ) ) 2 ] = E [ ( 1 u K 1 + 1 m = 1 u K 1 + 1 ξ k K 1 i = m K 1 + m 1 u i u + 1 u K 1 + 1 m = 1 u K 1 + 1 ξ k + 1 K 1 i = m K 1 + m 1 i u ) 2 ] = E [ ( ξ k u K 1 + 1 m = 1 u K 1 + 1 1 K 1 i = m K 1 + m 1 u i u + ξ k + 1 u K 1 + 1 m = 1 u K 1 + 1 1 K 1 i = m K 1 + m 1 i u ) 2 ] = ( 1 u K 1 + 1 m = 1 u K 1 + 1 1 K 1 i = m K 1 + m 1 u i u ) 2 Λ + ( 1 u K 1 + 1 m = 1 u K 1 + 1 1 K 1 i = m K 1 + m 1 i u ) 2 Λ
Let D Δ ξ k = Ψ Λ , where Ψ = ( γ + ϑ ) , γ = ( 1 u K 1 + 1 m = 1 u K 1 + 1 1 K 1 i = m K 1 + m 1 u i u ) 2 , and ϑ = ( 1 u K 1 + 1 m = 1 u K 1 + 1 1 K 1 i = m K 1 + m 1 i u ) 2 .
According to (35), the additional performance loss caused by the sliding smooth watermarking is
Δ J t r a c e [ ( B T S B + U ) Ψ Λ ] ,
Δ J = Ψ Δ J .
Similar to the smooth watermarking signal, the additional performance loss caused by the sliding smooth watermarking signal can be less than that of the original watermarking signal by designing appropriate sliding smooth parameters.

5. Simulations

In this section, two simulation results are presented to demonstrate the effectiveness of the proposed watermarking smooth methods. Firstly, a numerical example of a process control plant is illustrated. Secondly, a double-tank system example is provided to test the effectiveness of the watermarking smooth methods.

5.1. Numerical Example

The model parameters of a discrete system are given as follows:
A = [ 0.8976 0.0126 0.01896 0.9987 ]
B = [ 0.1896 0.0193 ]
C = [ 0 0.0667 ]
In the following, the effectiveness of the two watermarking smooth schemes proposed in this paper is analyzed. Additionally, we compare these methods with the watermark in [18] to illustrate the potential superiority. The control gain and Kalman filter gain then can be respectively designed as L = [ 1.1216 , 0.8187 ] and K = [ 0.1392 , 1.2406 ] . The stability of the closed-loop system under replay attacks is guaranteed, as the eigenvalues of A + B L , A K C A , A , and ( I K C ) ( A + B L ) all lie within the unit circle. In the following simulation, the parameters used in the smooth watermarking method and sliding smooth watermarking method are listed in Table 1.
As shown in Figure 2, the asymptotic detection rate β is directly proportional to the variance Λ of the original watermarking signal for all three watermarks. However, the proposed smooth schemes have higher asymptotic detection rates compared with the watermark in [18] for a specified variance, Λ . Looking at Figure 3, it is apparent that the asymptotic detection rate β is proportional to the additional performance loss for all watermarking signals. However, the proposed smooth signals exhibit a higher asymptotic detection level compared with the watermark in [18] for the same additional performance loss Δ J .

5.2. Double-Tank System

In this section, the effectiveness of the proposed watermarking smooth methods is demonstrated through a double-tank system. The double-tank system, as depicted in Figure 4, is a commonly used verification model in process control systems. The purpose of the system is to maintain the fluid level h 2 of tank 2 at a desired value by regulating inlet valve 1. The dynamic model of the double-tank system can be represented as
Δ q 1 Δ q 2 = c 1 d Δ h 1 d t ,
Δ q 2 Δ q 3 = c 2 d Δ h 2 d t ,
Δ q 2 = ( Δ h 1 R 2 ) ,
Δ q 3 = ( Δ h 2 R 3 ) ,
where c 1 and c 2 are the capacity coefficients. R 1 , R 2 , and R 3 represent the fluid resistance of the three valves, respectively. The transfer function of the double-tank system can be derived.
G ( s ) = h 2 ( s ) q 1 ( s ) = K 0 T 1 T 2 s 2 + T 2 s + T 1 s + 1 ,
where T 1 = c 1 R 2 is the time constant of tank 1, and T 2 = c 2 R 3 is the time constant of tank 2. K 0 = R 3 means the magnification factor.
Let c 1 = 33.33 , c 2 = 0.2 , R 2 = 9 , and R 3 = 10 , and the state space expression of the double-tank system can be obtained.
{ x ˙ ( t ) = [ 1.0033 0.0033 1.0000 0 ] x ( t ) + [ 1 0 ] u ( t ) y ( t ) = [ 0 0.0333 ] x ( t )   ,
Given a sampling period of 0.2 s, the discrete model of the double-tank system can be represented as
{ x ( k + 1 ) = [ 0.8181 0.0006 0.1812 0.9999 ] x ( k ) + [ 0.1812 0.0187 ] u ( k ) y ( k ) = [ 0 0.0333 ] x ( k ) ,
In the following, the effectiveness of the two watermarking smooth schemes proposed in this paper is demonstrated. W and U in Equation (9) are set to be identity matrices. The controller and Kalman filter gains then can be respectively designed as L = [ 0.9006 , 0.9018 ] and K = [ 0.0502 , 1.1677 ] . The stability of the closed-loop system under replay attacks is guaranteed according to the stability condition presented in Section 3.2. In the following simulation, the same parameters listed in Table 1 are used for the two watermarking smooth schemes.
The covariance matrices Q and R are equal to 0.8 times the identity matrix and identity matrix, respectively. According to (45), the additional performance loss of the smooth watermarking signal is Δ J = 29 50 Δ J . Similarly, the additional performance loss of the sliding smooth watermarking signal is Δ J = 41 81 Δ J . The additional performance losses of the proposed smooth signals are less than that of the watermark in [18]. Moreover, the additional performance loss of the sliding smooth method is lower compared with the smooth watermarking scheme. However, the sliding smooth method has a higher design and computational complexity.
As can be seen from Figure 5, the asymptotic detection rate β is directly proportional to the variance Λ of the original watermarking signal for all three watermarks. However, the proposed smooth schemes have higher asymptotic detection rates compared with the watermark in [18] for a specified Λ . Additionally, the sliding smooth watermarking signal exhibits a better asymptotic detection performance compared with the smooth watermarking signal.
As shown in Figure 6, the increase in the additional performance loss Δ J is proportional to the variance Λ , which accords with the discussion in Section 3.3. However, the additional performance losses of the proposed smooth schemes are all smaller than that of the watermark in [18] for the same variance Λ . In addition, the sliding smooth watermarking method possesses a lower performance loss compared with the smooth watermarking strategy.
From Figure 7, the asymptotic detection rate β is proportional to the additional performance loss for every type of watermarking signal. However, the proposed smooth schemes exhibit a higher asymptotic detection level compared with the watermark in [18]. It is worth noting that the sliding smooth watermarking method demonstrates a superior asymptotic detection rate compared with the smooth watermarking strategy.
These numerical examples demonstrate that the watermarking scheme discussed in [18] exhibits lower performance when used to process control systems. The frequency should be reduced if it is to be used for process control systems. The smooth watermarking schemes proposed in this paper offer improved performance in terms of the additional performance loss and asymptotic detection rate. Additionally, the sliding smooth watermarking method outperforms the smooth watermarking scheme, although higher design and calculation complexity is required.

6. Conclusions

Two watermarking smooth methods, namely the smooth watermarking scheme and sliding smooth watermarking strategy, are proposed for detecting replay attacks in industrial process control systems. In light of these significant findings, we believe that our analysis may contribute to extending the original watermarking signal from dynamic systems to large-inertia process systems. The smooth watermarking signals significantly improve the detection of replay attacks in industrial process systems. These signals enhance the security of attack-sensitive systems, particularly nuclear power stations. Furthermore, these findings can also be applied to the field of fault diagnoses. Future studies will primarily focus on determining the optimal smooth parameters for a specified variance and an additional performance loss.

Author Contributions

Conceptualization, S.Z. and Q.L.; methodology, S.Z. and Q.L.; validation, Q.L. and H.C.; formal analysis, S.Z.; investigation, S.Z. and H.C.; writing—original draft preparation, S.Z. and Q.L.; writing—review and editing, S.Z., Q.L. and H.C. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the Natural Science Foundation of Tianjin (grant number: 18JCQNJC74600).

Data Availability Statement

The data used to support the results of this study are included within the manuscript.

Acknowledgments

The authors would like to thank the editors and anonymous reviewers for their useful comments for improving the quality of this paper.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Naha, A.; Teixeira, A.; Ahlén, A.; Dey, S. Sequential detection of replay attacks. IEEE Trans. Autom. Control 2023, 68, 1941–1948. [Google Scholar] [CrossRef]
  2. Sandberg, H.; Gupta, V.; Johansson, K.H. Secure networked control systems. Annu. Rev. Control Robot. Auton. Syst. 2021, 5, 445–464. [Google Scholar] [CrossRef]
  3. Ding, D.R.; Han, Q.L.; Ge, X.H.; Wang, J. Secure state estimation and control of cyber-physical systems: A survey. IEEE Trans. Syst. Man Cybern. Syst. 2020, 51, 176–190. [Google Scholar] [CrossRef]
  4. Zhang, H.; Liu, B.; Wu, H.Y. Smart grid cyber-physical attack and defense: A review. IEEE Access 2021, 9, 29641–29659. [Google Scholar] [CrossRef]
  5. Inayat, U.; Zia, M.F.; Mahmood, S.; Berghout, T.; Benbouzid, M. Cybersecurity enhancement of smart grid: Attacks, methods, and prospects. Electronics 2022, 11, 3854. [Google Scholar] [CrossRef]
  6. Bayou, L.; Espes, D.; Cuppens-boulahia, N.; Cuppens, F. Security issue of wirelesshart based SCADA systems. In Proceedings of the 10th International Conference on Risks and Security of Internet and Systems, Mytilene, Lesbos Island, Greece, 20–22 July 2015. [Google Scholar]
  7. Smith, R.S. Covert misappropriation of networked control systems: Presenting a feedback structure. IEEE Control Syst. Mag. 2015, 35, 82–92. [Google Scholar]
  8. Whitehead, D.E.; Owens, K.; Gammel, D.; Smith, J. Ukraine cyber-induced power outage: Analysis and practical mitigation strategies. In Proceedings of the 70th Annual Conference for Protective Relay Engineers, College Station, TX, USA, 3–6 April 2017. [Google Scholar]
  9. Hemsley, K.E.; Fisher, E. History of Industrial Control System Cyber Incidents; No. INL/CON-18-44411-Rev002; Idaho National Lab: Idaho Falls, ID, USA, 31 December 2018.
  10. Wang, A.M.; Fei, M.R.; Song, Y.; Peng, C.; Du, D.J.; Sun, Q. Secure adaptive event-triggered control for cyber–physical power systems under denial-of-service attacks. IEEE Trans. Cybern. 2023. [Google Scholar] [CrossRef] [PubMed]
  11. Li, T.X.; Wang, Z.D.; Zou, L.; Chen, B.; Yu, L. A dynamic encryption–decryption scheme for replay attack detection in cyber–physical systems. Automatica 2023, 151, 110926. [Google Scholar] [CrossRef]
  12. Kashima, K.; Inoue, D. Replay attack detection in control systems with quantized signals. In Proceedings of the 2015 European Control Conference, Linz, Austria, 15–17 July 2015. [Google Scholar]
  13. Hosseinzadeh, M.; Sinopoli, B.; Garone, E. Feasibility and detection of replay attack in networked constrained cyber-physical systems. In Proceedings of the 57th Annual Allerton Conference on Communication, Control, and Computing, Monticello, IL, USA, 24–27 September 2019. [Google Scholar]
  14. Yaseen, A.A.; Bayart, M. Attack-Tolerant networked control system based on the deception for the cyber-attacks. In Proceedings of the 2015 World Congress on Industrial Control Systems Security, London, UK, 14–16 December 2015. [Google Scholar]
  15. Mo, Y.L.; Sinopoli, B. Secure control against replay attacks. In Proceedings of the 47th Annual Allerton Conference on Communication, Control, and Computing, Monticello, IL, USA, 30 September–2 October 2009. [Google Scholar]
  16. Ferrari, R.M.; Teixeira, A.M. A switching multiplicative watermarking scheme for detection of stealthy cyber-attacks. IEEE Trans. Autom. Control 2020, 66, 2558–2573. [Google Scholar] [CrossRef]
  17. Du, D.J.; Zhang, C.D.; Li, X.; Fei, M.R.; Zhou, H.Y. Attack detection for networked control systems using event-triggered dynamic watermarking. IEEE Trans. Ind. Inform. 2022, 19, 351–361. [Google Scholar] [CrossRef]
  18. Mo, Y.L.; Weerakkody, S.; Sinopoli, B. Physical authentication of control systems designing watermarked control inputs to detect counterfeit sensor outputs. IEEE Control Syst. Mag. 2015, 35, 93–109. [Google Scholar]
  19. Satchidanandan, B.; Kumar, P.R. Dynamic watermarking: Active defense of networked cyber-physical systems. Proc. IEEE 2017, 105, 219–240. [Google Scholar] [CrossRef]
  20. Zhao, Y.; Smidts, C. A control-theoretic approach to detecting and distinguishing replay attacks from other anomalies in nuclear power plants. Prog. Nucl. Energy 2020, 123, 103315. [Google Scholar] [CrossRef]
  21. Huang, T.; Satchidanandan, B.; Kumar, P.R.; Xie, L. An online detection framework for cyber attacks on automatic generation control. IEEE Trans. Power Syst. 2018, 33, 6816–6827. [Google Scholar] [CrossRef]
  22. Fang, C.R.; Qi, Y.F.; Cheng, P.; Zheng, W.X. Cost-effective watermark-based detector for replay attacks on cyber-physical systems. In Proceedings of the 11th Asian Control Conference, Gold Coast, QLD, Australia, 17–20 December 2017. [Google Scholar]
  23. Liu, H.X.; Yan, J.Q.; Mo, Y.L.; Johansson, K.H. An on-line design of physical watermarks. In Proceedings of the 2018 IEEE Conference on Decision and Control, Miami, FL, USA, 17–19 December 2018. [Google Scholar]
  24. Porter, M.; Hespanhol, P.; Aswani, A.; Johnson-Roberson, M.; Vasudevan, R. Detecting generalized replay attacks via time-varying dynamic watermarking. IEEE Trans. Autom. Control 2020, 66, 3502–3517. [Google Scholar] [CrossRef]
  25. Miao, F.; Pajic, M.; Pappas, G.J. Stochastic game approach for replay attack detection. In Proceedings of the 52nd IEEE Conference on Decision and Control, Firenze, Italy, 10–13 December 2013. [Google Scholar]
  26. Fang, C.R.; Qi, Y.F.; Cheng, P.; Zheng, W.X. Optimal periodic watermarking schedule for replay attack detection in cyber-physical systems. Automatica 2020, 112, l08698. [Google Scholar] [CrossRef]
  27. Forment Navarro, A. Security Analysis of a Wireless Quadruple Tank Control System. Master’s Thesis, KTH Royal Institute of Technology, Stockholm, Sweden, May 2011. [Google Scholar]
Figure 1. Control system with replay attacks and watermarking signal.
Figure 1. Control system with replay attacks and watermarking signal.
Electronics 12 03812 g001
Figure 2. Comparisons of the asymptotic detection rates with different Λ .
Figure 2. Comparisons of the asymptotic detection rates with different Λ .
Electronics 12 03812 g002
Figure 3. Comparisons of the asymptotic detection rates with different additional performance losses.
Figure 3. Comparisons of the asymptotic detection rates with different additional performance losses.
Electronics 12 03812 g003
Figure 4. Double-tank control system.
Figure 4. Double-tank control system.
Electronics 12 03812 g004
Figure 5. Comparisons of the asymptotic detection rateswith different Λ for the double-tank system.
Figure 5. Comparisons of the asymptotic detection rateswith different Λ for the double-tank system.
Electronics 12 03812 g005
Figure 6. Comparisons of the additional performance losses with different Λ .
Figure 6. Comparisons of the additional performance losses with different Λ .
Electronics 12 03812 g006
Figure 7. Comparisons of the asymptotic detection rates with different additional performance losses for the double-tank system.
Figure 7. Comparisons of the asymptotic detection rates with different additional performance losses for the double-tank system.
Electronics 12 03812 g007
Table 1. The parameters used in the smooth watermarking method and sliding smooth watermarking method.
Table 1. The parameters used in the smooth watermarking method and sliding smooth watermarking method.
MethodWeightSmooth Segment
smooth watermarking a = 0.3 m = 2
b = 0.2   n = 2
c = 0.5   v = 1
methodstep size smooth segment
sliding smooth watermarking K 1 = 5 u = 9
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Zhao, S.; Li, Q.; Cao, H. Improved Smooth Watermarking Methods for Detecting Replay Attacks in Process Control Systems. Electronics 2023, 12, 3812. https://doi.org/10.3390/electronics12183812

AMA Style

Zhao S, Li Q, Cao H. Improved Smooth Watermarking Methods for Detecting Replay Attacks in Process Control Systems. Electronics. 2023; 12(18):3812. https://doi.org/10.3390/electronics12183812

Chicago/Turabian Style

Zhao, Shunli, Qisen Li, and Haifeng Cao. 2023. "Improved Smooth Watermarking Methods for Detecting Replay Attacks in Process Control Systems" Electronics 12, no. 18: 3812. https://doi.org/10.3390/electronics12183812

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop