Font Size: a A A

A Watermarking Strategy For Cyber Physical Systems Under KL Divergence Detector

Posted on:2021-02-07Degree:MasterType:Thesis
Country:ChinaCandidate:D WangFull Text:PDF
GTID:2428330605953628Subject:Mathematics
Abstract/Summary:PDF Full Text Request
Cyber physical systems(CPSs)can be used to model smart grid and intelligent building,which has a wide range of applications and important theoretical research significance.As it is often used in large-scale projects,safety related issues are more focused on.In this paper,a new watermarking encryption strategy is proposed to detect linear deception attacks in CPSs under KL divergence detector.The main results are as follows:Firstly,this paper introduces the related theory,development process and future development trend of cyber physical systems,and briefly reviews the existing research results of domestic and foreign scholars.Then it introduces the cyber physical systems,Kalman filter and KL divergence detector,and gives the deception attack model used in this paper.Additionally,the model of watermark encryption proposed in this paper is given.For linear deception attacks,this paper designs watermarks for different degrees of information leakage,and verifies the effectiveness of the watermark encryption methods for one-dimensional and multi-dimensional CPSs,respectively.When the attacker doesn't know the existence of the watermark,he/she will take the original optimal attack,and the existence of the watermark can be detected.When the attacker has mastered the statistical characteristics of the watermark,the reconstructed attack will be limited by the watermark.Based on different situations,the simulation results are given to verify the proposed method.Furthermore,more extensive general deception attacks are considered,and the performance of watermark in such cases is discussed.For almost all forms of deception attacks,the existence of watermark has good performance,which has great significance in the actual situation.
Keywords/Search Tags:Cyber physical systems, Watermark encryption, KL divergence, Cyber security
PDF Full Text Request
Related items