Core Concepts
A chaotic masking protocol enhances security and enables attack detection in remote estimation of cyber-physical systems.
Abstract
The article introduces a chaotic masking protocol to secure sensor measurements transmission in cyber-physical systems. It addresses eavesdropping, replay, and false data injection attacks. The protocol uses a chaotic dynamic system for encoding sensor measurements and an estimator to estimate both plant states and the chaotic system. By removing the masking effect in steady state, no additional secure communication links are needed. Watermark-based and encode-decode methods are discussed as well. The article provides theoretical analysis, simulation verification, and defense strategies against various attacks.
Stats
A numerical simulation is conducted without any attack at time point 40s.
The distance to unobservability of the pair (A, C) is calculated as about 0.4.
For the new coordinate transformation with β = 100, the distance to unobservability becomes about 0.3.
The control input matrix K is provided for stabilizing the system.
The symmetric positive definite matrix P and matrix L are obtained for solving LMI (11).
Quotes
"The main contribution of this work is summarized as follows."
"Inspired by this result, in this work we use chaotic signal to encode the sensor measurement."