Optimal Injection Attack Strategy for Cyber-Physical Systems Under Resource Constraint: A Game Approach

被引:11
作者
Gao, Sheng [1 ]
Zhang, Hao [1 ]
Wang, Zhuping [1 ]
Huang, Chao [1 ]
Yan, Huaicheng [2 ]
机构
[1] Tongji Univ, Coll Elect & Informat Engn, Dept Control Sci & Engn, Shanghai 200092, Peoples R China
[2] East China Univ Sci & Technol, Sch Informat Sci & Engn, Shanghai 200237, Peoples R China
来源
IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS | 2023年 / 10卷 / 02期
基金
中国国家自然科学基金;
关键词
Cyber-physical systems (CPSs); false data injection (FDI) attack; saturation constraint; switching condition; zero-sum game; NETWORKED CONTROL-SYSTEMS;
D O I
10.1109/TCNS.2022.3203909
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The security problem of cyber-physical systems (CPSs) under the injection attack is investigated in this article. A switching data injection attack strategy based on the game approach is proposed, which makes the attacker consume less energy and more difficult to defend. In addition, the constraint of the limited attack resources is considered. Noting that the attacker and the defender are antagonistic in this article, the framework of a zero-sum game is used to describe this relation, and a finite-horizon quadratic cost function is also defined. The objective of this article is to find an appropriate offensive and defensive strategy to optimize this function. Different from the existing games, the upper bound on the energy consumption of each attack is considered. Pontryagin's maximum principle and saturation equivalent approach are used to solve this game problem. Thus, the optimal offensive and defensive strategy can be derived. Finally, a numerical simulation and a physical experiment with the wheeled mobile robot (WMR) validate the effectiveness of the proposed scheme.
引用
收藏
页码:636 / 646
页数:11
相关论文
共 30 条
[1]  
Basar T., 1999, Dynamic Noncooperative Game Theory: Second Edition
[2]  
Basar Tamer., 2008, H-infinity optimal control and related minimax design problems: a dynamic game approach, DOI [10.1007/978-0-8176-4757-5, DOI 10.1007/978-0-8176-4757-5]
[3]   Risk-Sensitive Control Under Markov Modulated Denial-of-Service (DoS) Attack Strategies [J].
Befekadu, Getachew K. ;
Gupta, Vijay ;
Antsaklis, Panos J. .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2015, 60 (12) :3299-3304
[4]   Secure Fusion Estimation for Bandwidth Constrained Cyber-Physical Systems Under Replay Attacks [J].
Chen, Bo ;
Ho, Daniel W. C. ;
Hu, Guoqiang ;
Yu, Li .
IEEE TRANSACTIONS ON CYBERNETICS, 2018, 48 (06) :1862-1876
[5]   Cyber-Physical Attacks With Control Objectives [J].
Chen, Yuan ;
Kar, Soummya ;
Moura, Jose M. F. .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2018, 63 (05) :1418-1425
[6]  
CSIS, 2021, Center for Strategic and International Studies Report
[7]   A multi-channel transmission schedule for remote state estimation under DoS attacks [J].
Ding, Kemi ;
Li, Yuzhe ;
Quevedo, Daniel E. ;
Dey, Subhrakanti ;
Shi, Ling .
AUTOMATICA, 2017, 78 :194-201
[8]   Bad Data Injection Attack and Defense in Electricity Market Using Game Theory Study [J].
Esmalifalak, Mohammad ;
Shi, Ge ;
Han, Zhu ;
Song, Lingyang .
IEEE TRANSACTIONS ON SMART GRID, 2013, 4 (01) :160-169
[9]   An Output-Coding-Based Detection Scheme Against Replay Attacks in Cyber-Physical Systems [J].
Guo, Haibin ;
Pang, Zhong-Hua ;
Sun, Jian ;
Li, Jun .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-EXPRESS BRIEFS, 2021, 68 (10) :3306-3310
[10]   Optimal Linear Cyber-Attack on Remote State Estimation [J].
Guo, Ziyang ;
Shi, Dawei ;
Johansson, Karl Henrik ;
Shi, Ling .
IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, 2017, 4 (01) :4-13