Optimal innovation-based attacks against remote state estimation with side information and historical data

被引:3
作者
Shan, Hua-Sheng [1 ]
Li, Yi-Gang [1 ]
An, Liwei [2 ]
机构
[1] Shenyang Univ Technol, Sch Artificial Intelligence, Shenyang 110870, Peoples R China
[2] Northeastern Univ, Coll Informat Sci & Engn, Shenyang, Peoples R China
基金
中国国家自然科学基金;
关键词
Cyber-physical systems; remote state estimation; false data injection attacks; Kullback-Leibler divergence; historical data; side information; DATA-INJECTION ATTACKS; CONTROL-SYSTEMS; INTEGRITY ATTACKS; SECURITY;
D O I
10.1080/00207721.2024.2395931
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This work investigates the attack strategy design problem of the false data injection attack against the cyber-physical system. Distinct from the relevant results which utilise the current intercepted data or additionally consider side information, a more universal attack model is proposed which combines historical data and side information with the current intercepted data to synergistically deteriorate the system estimation performance. In order to quantify the impact resulting from the proposed attack strategy, the optimisation objective is characterised by deriving the error covariance matrix under the attacks, which becomes more intricate since the proposed attack model introduces more decision variables and coupled terms. Take the stealthiness which is characterised by Kullback-Leibler divergence as the constraints, the problem investigated in this work is equivalently transformed into the constrained multi-variable non-convex optimisation problems, which are not able to be solved directly by the methods in the relevant results. By utilising the Lagrange multiplier method, the structural characteristic of the optimal mean and the optimal covariance which only related to the Lagrange multiplier are derived, such that the optimal distribution of the modified innovation is able to be obtained by a simple search procedure. Following that, the design of the optimal attack strategy is completed by using semi-definite programming to derive the optimal attack matrices. Finally, the simulation examples are given such that the validity of the results is verified.
引用
收藏
页码:544 / 560
页数:17
相关论文
共 52 条
[1]  
Ahmed SH, 2013, IFIP WIREL DAY
[2]   Collisions-Free Distributed Cooperative Output Regulation of Nonlinear Multiagent Systems [J].
An, Liwei ;
Yang, Guang-Hong .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2024, 69 (11) :8072-8079
[3]  
Anderson BD., 2012, OPTIMAL FILTERING
[4]   Data-injection attacks in stochastic control systems: Detectability and performance tradeoffs [J].
Bai, Cheng-Zong ;
Pasqualetti, Fabio ;
Gupta, Vijay .
AUTOMATICA, 2017, 82 :251-260
[5]  
Cardenas Alvaro A., 2008, 2008 28th International Conference on Distributed Computing Systems Workshops (ICDCS Workshops), P495, DOI 10.1109/ICDCS.Workshops.2008.40
[6]  
Cardenas A. A., 2008, HOTSEC 08 P 3 C HOT, V5, P1158
[7]   Optimal Attack Strategies Subject to Detection Constraints Against Cyber-Physical Systems [J].
Chen, Yuan ;
Kar, Soummya ;
Moura, Jose M. F. .
IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, 2018, 5 (03) :1157-1168
[8]   Information Leakage-Aware Computer-Aided Cyber-Physical Manufacturing [J].
Chhetri, Sujit Rokka ;
Faezi, Sina ;
Al Faruque, Mohammad Abdullah .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (09) :2333-2344
[9]  
Cover TM., 2006, ELEMENTS INFORM THEO, DOI [DOI 10.1002/047174882X, DOI 10.1002/0471200611.CH2]
[10]   Distributed Cooperative Optimization for Nonlinear Heterogeneous MASs Under Intermittent Communication [J].
Deng, Chao ;
Xu, Lei ;
Yang, Tao ;
Yue, Dong ;
Chai, Tianyou .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2024, 69 (04) :2737-2744