False Data Injection Attack for Switched Systems

被引:2
作者
Zhao, Rui [1 ]
Zuo, Zhiqiang [1 ]
Wang, Yijing [1 ]
Zhang, Wentao [2 ,3 ]
机构
[1] Tianjin Univ, Sch Elect & Informat Engn, Tianjin Key Lab Intelligent Unmanned Swarm Technol, Tianjin, Peoples R China
[2] Tianjin Univ, Sch Elect & Informat Engn, Tianjin 300072, Peoples R China
[3] Nanyang Technol Univ, Sch Elect & Elect Engn, Singapore 639798, Singapore
来源
IEEE CONTROL SYSTEMS LETTERS | 2023年 / 7卷
基金
中国国家自然科学基金;
关键词
Detectors; Switches; Switched systems; Control systems; Estimation; System performance; System dynamics; False data injection attack; switched system; joint attack; stealthy attack;
D O I
10.1109/LCSYS.2023.3280342
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The letter studies the secure state estimation problem for switched systems. The single/joint false data injection attacks are designed with the aim at altering the sensor signal and/or switching signal. Firstly, it is shown that the attack will steer system state to infinity but could be detectable by ?2 detector when only the switching signal is attacked. In addition, the attack acting on sensor signal is designed, which can be recognized by the summation (SUM) detector but fails by ?2 detector. Then a joint attack strategy is devised and a sufficient condition is given to guarantee that the joint attack is strictly stealthy. The joint attack performs well since it can launch a strictly stealthy attack compared with the sensor signal attack. Finally, a numerical example is given to verify the theoretical results.
引用
收藏
页码:1754 / 1759
页数:6
相关论文
共 31 条
[1]  
[Anonymous], 2010, 1 WORKSH SEC CONTR S
[2]   Application of the unified control and detection framework to detecting stealthy integrity cyber-attacks on feedback control systems [J].
Ding, Steven X. ;
Li, Linlin ;
Zhao, Dong ;
Louen, Chris ;
Liu, Tianyu .
AUTOMATICA, 2022, 142
[3]   Resilient Stabilization of Switched Linear Control Systems Against Adversarial Switching [J].
Hu, Jianghai ;
Shen, Jinglai ;
Lee, Donghwan .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2017, 62 (08) :3820-3834
[4]   State estimation under false data injection attacks: Security analysis and system protection [J].
Hu, Liang ;
Wang, Zidong ;
Han, Qing-Long ;
Liu, Xiaohui .
AUTOMATICA, 2018, 87 :176-183
[5]   Distributed Deception Attack Detection in Platoon-Based Connected Vehicle Systems [J].
Ju, Zhiyang ;
Zhang, Hui ;
Tan, Ying .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2020, 69 (05) :4609-4620
[6]  
Kim H, 2017, P AMER CONTR CONF, P4328, DOI 10.23919/ACC.2017.7963621
[7]   The Performance and Limitations of ε-Stealthy Attacks on Higher Order Systems [J].
Kung, Enoch ;
Dey, Subhrakanti ;
Shi, Ling .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2017, 62 (02) :941-947
[8]   Stuxnet: Dissecting a Cyberwarfare Weapon [J].
Langner, Ralph .
IEEE SECURITY & PRIVACY, 2011, 9 (03) :49-51
[9]   Detection of False Data Injection Attacks on Smart Grids: A Resilience-Enhanced Scheme [J].
Li, Beibei ;
Lu, Rongxing ;
Xiao, Gaoxi ;
Li, Tao ;
Choo, Kim-Kwang Raymond .
IEEE TRANSACTIONS ON POWER SYSTEMS, 2022, 37 (04) :2679-2692
[10]   Deception Attacks on Remote Estimation With Disclosure and Disruption Resources [J].
Li, Yuzhe ;
Yang, Yake ;
Zhao, Zhengen ;
Zhou, Jing ;
Quevedo, Daniel E. .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2023, 68 (07) :4096-4112