Optimal deception attacks under energy harvesting constraints for cyber-physical systems

被引:1
作者
Liu, Xuan [1 ]
Yang, Guang-Hong [1 ,2 ]
Dimirovski, Georgi Marko [3 ]
Li, Yi-Gang [4 ]
机构
[1] Northeastern Univ, Coll Informat Sci & Engn, Shenyang 110819, Peoples R China
[2] Northeastern Univ, State Key Lab Synthet Automat Proc Ind, Shenyang 110819, Peoples R China
[3] Ss Cyril & Methodius Univ Skopje, Doctoral Sch FEIT, Skopje 1000, North Macedonia
[4] Shenyang Univ Technol, Sch Artificial Intelligence, Shenyang 110870, Peoples R China
基金
中国国家自然科学基金;
关键词
Cyber-physical systems; Deception attacks; Energy harvesting; Remote state estimation; NETWORKED CONTROL-SYSTEMS; DATA-INJECTION ATTACKS; LINEAR-ATTACK; STUXNET;
D O I
10.1016/j.neucom.2024.128652
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper investigates the design of optimal deception attacks against remote state estimation, where the attacker is equipped with energy harvesting capability to supply more energy resources for implementing the attacks. To derive the optimal attack parameters and energy allocation strategy collaboratively, the attack design problem is transformed into a multi-variable constrained optimization problem which is solved by employing the proposed stepwise optimization method without sacrificing the optimality. Specifically, the analytical expression of the optimal attack parameters is firstly derived based on the presented data isolation technique, which removes the conservatism of the existing results where the attack schemes are merely suboptimal or the attack targets are limited to the systems without redundant sensors. Then, by analyzing the intrinsic property of the average estimation error, the optimal allocation of the dynamic attack energy is obtained to maximize the attack effect. Finally, the simulations are given to verify the developed results.
引用
收藏
页数:9
相关论文
共 43 条
[1]   Collisions-Free Distributed Cooperative Output Regulation of Nonlinear Multiagent Systems [J].
An, Liwei ;
Yang, Guang-Hong .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2024, 69 (11) :8072-8079
[2]   Data-injection attacks in stochastic control systems: Detectability and performance tradeoffs [J].
Bai, Cheng-Zong ;
Pasqualetti, Fabio ;
Gupta, Vijay .
AUTOMATICA, 2017, 82 :251-260
[3]   Representations of the Drazin inverse for a class of block matrices [J].
Castro-González, N ;
Dopazo, E .
LINEAR ALGEBRA AND ITS APPLICATIONS, 2005, 400 :253-269
[4]   Adaptive neural network finite-time control for nonlinear cyber-physical systems with external disturbances under malicious attacks [J].
Cuan, Zhaoyang ;
Ding, Da -Wei ;
Yang, Yongliang ;
Xia, Yunxia .
NEUROCOMPUTING, 2023, 518 :133-141
[5]   Distributed Cooperative Optimization for Nonlinear Heterogeneous MASs Under Intermittent Communication [J].
Deng, Chao ;
Xu, Lei ;
Yang, Tao ;
Yue, Dong ;
Chai, Tianyou .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2024, 69 (04) :2737-2744
[6]   Stuxnet and the Future of Cyber War [J].
Farwell, James P. ;
Rohozinski, Rafal .
SURVIVAL, 2011, 53 (01) :23-40
[7]   Optimal Allocation of False Data Injection Attacks for Networked Control Systems With Two Communication Channels [J].
Guo, Li ;
Yu, Hao ;
Hao, Fei .
IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, 2021, 8 (01) :2-14
[8]   Event-triggered control for stochastic networked control systems against Denial-of-Service attacks [J].
Guo, Li ;
Yu, Hao ;
Hao, Fei .
INFORMATION SCIENCES, 2020, 527 :51-69
[9]   Worst-case stealthy innovation-based linear attack on remote state estimation [J].
Guo, Ziyang ;
Shi, Dawei ;
Johansson, Karl Henrik ;
Shi, Ling .
AUTOMATICA, 2018, 89 :117-124
[10]   Optimal Linear Cyber-Attack on Remote State Estimation [J].
Guo, Ziyang ;
Shi, Dawei ;
Johansson, Karl Henrik ;
Shi, Ling .
IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, 2017, 4 (01) :4-13