Optimal Innovation-Based Deception Attacks on Multi-Channel Cyber-Physical Systems

被引:0
作者
Yang, Xinhe [1 ]
Ren, Zhu [1 ]
Zhou, Jingquan [2 ]
Huang, Jing [1 ]
机构
[1] Zhejiang Sci Tech Univ, Sch Informat Sci & Engn, Sch Cyber Sci & Technol, Hangzhou 310018, Peoples R China
[2] Zhejiang Sci Tech Univ, Sch Comp Sci & Technol, Sch Artificial Intelligence, Hangzhou 310018, Peoples R China
关键词
remote state estimation; cyber-physical systems; stealthy attacks; energy restrictions; DATA INJECTION ATTACKS; STATE ESTIMATION; SENSORS;
D O I
10.3390/electronics14081569
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This article addresses the optimal scheduling problem for linear deception attacks in multi-channel cyber-physical systems. The scenario where the attacker can only attack part of the channels due to energy constraints is considered. The effectiveness and stealthiness of attacks are quantified using state estimation error and Kullback-Leibler divergence, respectively. Unlike existing strategies relying on zero-mean Gaussian distributions, we propose a generalized attack model with Gaussian distributions characterized by time-varying means. Based on this model, an optimal stealthy attack strategy is designed to maximize remote estimation error while ensuring stealthiness. By analyzing correlations among variables in the objective function, the solution is decomposed into a semi-definite programming problem and a 0-1 programming problem. This approach yields the modified innovation and an attack scheduling matrix. Finally, numerical simulations validate the theoretical results.
引用
收藏
页数:22
相关论文
共 32 条
[1]   Optimal Attack Schedule for Two Sensors State Estimation Under Jamming Attack [J].
Ai, Zidong ;
Peng, Lianghong ;
Cao, Menglong .
IEEE ACCESS, 2019, 7 :75741-75748
[2]   Effective Intrusion Detection System to Secure Data in Cloud Using Machine Learning [J].
Aldallal, Ammar ;
Alisa, Faisal .
SYMMETRY-BASEL, 2021, 13 (12)
[3]  
Anderson B.D., 1979, Optimal filtering, 1st ed, P103
[4]   Goals and Challenges in Cyber-Physical Systems Research Editorial of the Editor in Chief [J].
Antsaklis, Panos .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2014, 59 (12) :3117-3119
[5]   Data-Driven-Based Cooperative Resilient Learning Method for Nonlinear MASs Under DoS Attacks [J].
Deng, Chao ;
Jin, Xiao-Zheng ;
Wu, Zheng-Guang ;
Che, Wei-Wei .
IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, 2024, 35 (09) :12107-12116
[6]   Design and Analysis of Secure Distributed Estimator for Vehicular Platooning in Adversarial Environment [J].
Dutta, Raj Gautam ;
Hu, Yaodan ;
Yu, Feng ;
Zhang, Teng ;
Jin, Yier .
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2022, 23 (04) :3418-3429
[7]   SMART SENSORS IN INDUSTRY [J].
FAVENNEC, JM .
JOURNAL OF PHYSICS E-SCIENTIFIC INSTRUMENTS, 1987, 20 (09) :1087-1090
[8]   Stealthy false data injection attacks with resource constraints against multi-sensor estimation systems [J].
Guo, Haibin ;
Sun, Jian ;
Pang, Zhong-Hua .
ISA TRANSACTIONS, 2022, 127 :32-40
[9]   Worst-case stealthy innovation-based linear attack on remote state estimation [J].
Guo, Ziyang ;
Shi, Dawei ;
Johansson, Karl Henrik ;
Shi, Ling .
AUTOMATICA, 2018, 89 :117-124
[10]   Optimal Linear Cyber-Attack on Remote State Estimation [J].
Guo, Ziyang ;
Shi, Dawei ;
Johansson, Karl Henrik ;
Shi, Ling .
IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, 2017, 4 (01) :4-13