A class of stealthy attacks on remote state estimation with intermittent observation

被引:5
|
作者
Lv, Yujiao [1 ]
Lu, Jianquan [2 ,3 ]
Liu, Yang [4 ]
Zhang, Lingzhong [5 ]
机构
[1] Southeast Univ, Sch Cyber Sci & Engn, Nanjing 210096, Peoples R China
[2] Southeast Univ, Sch Math, Nanjing 210096, Peoples R China
[3] Linyi Univ, Sch Automat & Elect Engn, Linyi 276005, Peoples R China
[4] Zhejiang Normal Univ, Sch Math Sci, Jinhua 321004, Peoples R China
[5] Changshu Inst Technol, Sch Elect Engn & Automat, Changshu 215500, Peoples R China
基金
中国国家自然科学基金;
关键词
Network attack; Cyber-physical systems; State estimation;
D O I
10.1016/j.ins.2023.118964
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Network attacks always threaten economic operations and personal privacy, which have resulted in severe and irreparable damage. Therefore, the investigation of network attacks is essential for network security. This paper concentrates on designing two stealthy attack strategies for remote state estimation with intermittent observations, where the attackers can select one of the designed stealthy attack strategies depending on their capabilities, available resources, and information. Furthermore, for real-time communication rates, a novel detector is introduced to determine if the system is compromised by attackers at each moment. Then, an algorithm for state estimation is derived under the proposed stealthy attack strategies. Furthermore, the attack parameters in the proposed attack strategies are discussed by applying linear matrix inequalities. Finally, a numerical example illustrates the effects of the detector and attack strategies.
引用
收藏
页数:11
相关论文
共 50 条
  • [41] Time-Stamp Attacks on Remote State Estimation in Cyber-Physical Systems
    Qu, Fuyi
    Yang, Nachuan
    Liu, Hao
    Li, Yuzhe
    Quevedo, Daniel E.
    IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, 2024, 11 (01): : 450 - 461
  • [42] Deep Latent Space Clustering for Detection of Stealthy False Data Injection Attacks Against AC State Estimation in Power Systems
    Bhattacharjee, Arnab
    Mondal, Arnab Kumar
    Verma, Ashu
    Mishra, Sukumar
    Saha, Tapan K.
    IEEE TRANSACTIONS ON SMART GRID, 2023, 14 (03) : 2338 - 2351
  • [43] Distributed Sparse Undetectable Attacks Against State Estimation
    An, Liwei
    Yang, Guang-Hong
    IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, 2022, 9 (01): : 463 - 473
  • [44] Secure remote state estimation against linear man-in-the-middle attacks using watermarking
    Huang, Jiahao
    Ho, Daniel W. C.
    Li, Fangfei
    Yang, Wen
    Tang, Yang
    AUTOMATICA, 2020, 121
  • [45] Optimal stealthy attack against stochastic event-based scheduling for remote state estimation in cyber-physical systems
    Song, Yunbo
    Ye, Dan
    INTERNATIONAL JOURNAL OF ROBUST AND NONLINEAR CONTROL, 2022, 32 (06) : 3511 - 3526
  • [46] Transmission scheduling for privacy-optimal encryption against eavesdropping attacks on remote state estimation
    Wang, Le
    Cao, Xianghui
    Zhang, Heng
    Sun, Changyin
    Zheng, Wei Xing
    AUTOMATICA, 2022, 137
  • [47] Optimal acknowledgment signal attacks against remote estimation
    Yi, Guangmo
    Sun, Hui
    Yang, Yake
    JOURNAL OF THE FRANKLIN INSTITUTE-ENGINEERING AND APPLIED MATHEMATICS, 2023, 360 (13): : 9844 - 9862
  • [48] Sampled-data state estimation for a class of delayed complex networks via intermittent transmission
    Cui, Ying
    Liu, Yurong
    Zhang, Wenbing
    Hayat, Tasawar
    Alsaedi, Ahmed
    NEUROCOMPUTING, 2017, 260 : 211 - 220
  • [49] Malicious Attacks on State Estimation Against Distributed Control Systems
    Lu, An-Yang
    Yang, Guang-Hong
    IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2020, 65 (09) : 3911 - 3918
  • [50] State estimation for a class of nonlinear non-Gaussian cyber-physical systems under false data injection attacks
    Miao, Kelei
    Yan, Zejun
    Chen, Yourong
    Yin, Shu
    Zhang, Wen-An
    Han, Meng
    ASIAN JOURNAL OF CONTROL, 2024, 26 (02) : 1077 - 1087