Hybrid Stealthy Attacks on Stochastic Event-Based Remote Estimation Under Packet Dropouts

被引:4
作者
Lian, Zhi [1 ]
Shi, Peng [2 ]
Lim, Chee Peng [3 ]
Rudas, Imre J. [4 ]
Agarwal, Ramesh K. [5 ]
机构
[1] Nanjing Univ Aeronaut & Astronaut, Coll Automat Engn, Nanjing 210016, Peoples R China
[2] Univ Adelaide, Sch Elect & Mech Engn, Adelaide, SA 5005, Australia
[3] Swinburne Univ Technol, Dept Comp Technol, Hawthorn, Vic 3122, Australia
[4] Obuda Univ, Res & Innovat Ctr, H-1034 Budapest, Hungary
[5] Washington Univ St Louis Campus, Dept Mech Engn, St Louis, MO 63130 USA
来源
IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING | 2024年 / 11卷 / 06期
基金
中国国家自然科学基金; 澳大利亚研究理事会;
关键词
remote state estimation; Packet dropouts; stealthy attacks; stochastic event trigger;
D O I
10.1109/TNSE.2024.3457911
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Security related issues of cyber-physical systems are important and interesting from the perspectives of both attackers and defenders. In this paper, we design a stochastic event-based stealthy hybrid attack scheme for remote state estimation in the event of packet dropouts. The objective of the attacker is to maximize the performance degradation while remaining stealthy. Firstly, attack stealthiness is characterized based on the probability distribution and transmission rate. With the stealthiness constraints, an innovation-based stealthy attack model is designed under the assumption that attackers can intercept and modify the measurement innovations. Then, an optimal hybrid attack technique is proposed to maximize the estimation error. With the developed attack strategy, attackers can launch hybrid attacks, including denial-of-service attacks and/or false data injection attacks, to block the network communication channel and compromise the transmitted measurements, therefore degrading and even destroying the system performance. Verification examples are given to illustrate the effectiveness of the attack design performance.
引用
收藏
页码:5829 / 5838
页数:10
相关论文
共 34 条
[1]   Data-based optimal Denial-of-Service attack scheduling against robust control based on Q-learning [J].
An, Liwei ;
Yang, Guang-Hong .
INTERNATIONAL JOURNAL OF ROBUST AND NONLINEAR CONTROL, 2019, 29 (15) :5178-5194
[2]   Impact Assessment and Defense for Smart Grids With FDIA Against AMI [J].
Bi, Jichao ;
Luo, Fengji ;
Liang, Gaoqi ;
Yang, Xiaofan ;
He, Shibo ;
Dong, Zhao Yang .
IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2023, 10 (02) :578-591
[3]   An Event-Based Stealthy Attack on Remote State Estimation [J].
Cheng, Peng ;
Yang, Zeyu ;
Chen, Jiming ;
Qi, Yifei ;
Shi, Ling .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2020, 65 (10) :4348-4355
[4]   A Hierarchical Security Control Framework of Nonlinear CPSs Against DoS Attacks With Application to Power Sharing of AC Microgrids [J].
Deng, Chao ;
Wen, Changyun ;
Zou, Ying ;
Wang, Wei ;
Li, Xinyao .
IEEE TRANSACTIONS ON CYBERNETICS, 2022, 52 (06) :5255-5266
[5]  
Franklin G, 2006, Feedback Control of Dynamic Systems
[6]   Worst-Case Innovation-Based Integrity Attacks With Side Information on Remote State Estimation [J].
Guo, Ziyang ;
Shi, Dawei ;
Johansson, Karl Henrik ;
Shi, Ling .
IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, 2019, 6 (01) :48-59
[7]   Optimal Linear Cyber-Attack on Remote State Estimation [J].
Guo, Ziyang ;
Shi, Dawei ;
Johansson, Karl Henrik ;
Shi, Ling .
IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, 2017, 4 (01) :4-13
[8]   Stochastic Event-Triggered Sensor Schedule for Remote State Estimation [J].
Han, Duo ;
Mo, Yilin ;
Wu, Junfeng ;
Weerakkody, Sean ;
Sinopoli, Bruno ;
Shi, Ling .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2015, 60 (10) :2661-2675
[9]   IRS-Driven Cybersecurity of Healthcare Cyber Physical Systems [J].
Ji, Baofeng ;
Wang, Yanan ;
Xing, Ling ;
Li, Chunguo ;
Wang, Yi ;
Wen, Hong .
IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2023, 10 (05) :2564-2573
[10]   Learning-Based Model-Free Adaptive Control for Nonlinear Discrete-Time Networked Control Systems Under Hybrid Cyber Attacks [J].
Li, Fanghui ;
Hou, Zhongsheng .
IEEE TRANSACTIONS ON CYBERNETICS, 2024, 54 (03) :1560-1570