A class of stealthy attacks on remote state estimation with intermittent observation

被引:5
|
作者
Lv, Yujiao [1 ]
Lu, Jianquan [2 ,3 ]
Liu, Yang [4 ]
Zhang, Lingzhong [5 ]
机构
[1] Southeast Univ, Sch Cyber Sci & Engn, Nanjing 210096, Peoples R China
[2] Southeast Univ, Sch Math, Nanjing 210096, Peoples R China
[3] Linyi Univ, Sch Automat & Elect Engn, Linyi 276005, Peoples R China
[4] Zhejiang Normal Univ, Sch Math Sci, Jinhua 321004, Peoples R China
[5] Changshu Inst Technol, Sch Elect Engn & Automat, Changshu 215500, Peoples R China
基金
中国国家自然科学基金;
关键词
Network attack; Cyber-physical systems; State estimation;
D O I
10.1016/j.ins.2023.118964
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Network attacks always threaten economic operations and personal privacy, which have resulted in severe and irreparable damage. Therefore, the investigation of network attacks is essential for network security. This paper concentrates on designing two stealthy attack strategies for remote state estimation with intermittent observations, where the attackers can select one of the designed stealthy attack strategies depending on their capabilities, available resources, and information. Furthermore, for real-time communication rates, a novel detector is introduced to determine if the system is compromised by attackers at each moment. Then, an algorithm for state estimation is derived under the proposed stealthy attack strategies. Furthermore, the attack parameters in the proposed attack strategies are discussed by applying linear matrix inequalities. Finally, a numerical example illustrates the effects of the detector and attack strategies.
引用
收藏
页数:11
相关论文
共 50 条
  • [31] Optimal Privacy-Preserving Transmission Schedule Against Eavesdropping Attacks on Remote State Estimation
    Zou, Jiaying
    Liu, Hanxiao
    Liu, Chun
    Ren, Xiaoqiang
    Wang, Xiaofan
    IEEE CONTROL SYSTEMS LETTERS, 2024, 8 : 538 - 543
  • [32] Deception Attacks on Remote Estimation With Disclosure and Disruption Resources
    Li, Yuzhe
    Yang, Yake
    Zhao, Zhengen
    Zhou, Jing
    Quevedo, Daniel E.
    IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2023, 68 (07) : 4096 - 4112
  • [33] Optimal Stealthy Attack to Remote Estimator for Estimation Error Regulation
    Chen, Tao
    Wang, Lei
    Liu, Zhitao
    Wang, Wenhai
    Su, Hongye
    2023 AMERICAN CONTROL CONFERENCE, ACC, 2023, : 1998 - 2003
  • [34] Transmission Scheduling for Remote State Estimation in CPSs With Two-Hop Networks Subject to DoS Attacks
    Xing, Wei
    Zhao, Xudong
    IEEE-ACM TRANSACTIONS ON NETWORKING, 2024, : 5388 - 5398
  • [35] Optimal SINR-based DoS Attacks against Remote State Estimation
    Hua, Jinxing
    Hao, Fei
    2021 PROCEEDINGS OF THE 40TH CHINESE CONTROL CONFERENCE (CCC), 2021, : 8604 - 8609
  • [36] A Secure Encoding Mechanism Against Deception Attacks on Multisensor Remote State Estimation
    Zhou, Jiayu
    Ding, Wenjie
    Yang, Wen
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 17 : 1959 - 1969
  • [37] Design of Stealthy Attacks Against Interval Estimation for Cyber-Physical Systems
    Li, Zhi-Hui
    Yang, Guang-Hong
    IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2024, 11 (02): : 2215 - 2222
  • [38] Remote Robust State Estimation for Nonlinear Cyber-Physical Systems Under Denial-of-Service Attacks
    Wang, Min
    Liu, Huabo
    Huang, Keke
    Mao, Yao
    Yu, Haisheng
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS, 2024, 71 (09) : 4189 - 4198
  • [39] A multi-channel transmission schedule for remote state estimation under DoS attacks
    Ding, Kemi
    Li, Yuzhe
    Quevedo, Daniel E.
    Dey, Subhrakanti
    Shi, Ling
    AUTOMATICA, 2017, 78 : 194 - 201
  • [40] Linear Attacks Against Remote State Estimation: Performance Analysis Under an Encryption Scheme
    Liu, Hanxiao
    Ni, Yuqing
    Wang, Xiaofan
    Xie, Lihua
    IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, 2024, 11 (04): : 1812 - 1824