Novel attack-defense framework for nonlinear complex networks: An important-data-based method

被引:38
作者
Wang, Xun [1 ]
Tian, Engang [1 ,3 ]
Wei, Bin [1 ]
Liu, Jinliang [2 ]
机构
[1] Univ Shanghai Sci & Technol, Sch Opt Elect & Comp Engn, Shanghai, Peoples R China
[2] Nanjing Univ Finance & Econ, Coll Informat Engn, Nanjing, Peoples R China
[3] Univ Shanghai Sci & Technol, Sch Opt Elect & Comp Engn, Shanghai 200093, Peoples R China
基金
上海市自然科学基金; 中国国家自然科学基金;
关键词
IDB attack strategy; nonlinear complex networks (CNs); resilient H8 estimator; INFINITY STATE ESTIMATION; DATA INJECTION ATTACKS; DOS ATTACK; SYSTEMS; DELAY;
D O I
10.1002/rnc.6551
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This article addresses the state estimation problem for a class of nonlinear complex networks (CNs) under attack. First, a novel important-data-based (IDB) attack strategy is skillfully proposed from the adversary's point of view to maximize the attack effect. Different from most existing attack models, the IDB attacker has the ability to eavesdrop measurements and only attacks the packets which play an important role in the system. As such, a larger system performance degradation can be expected. Second, a new kind of resilient H & INFIN;$$ {H}_{\infty } $$ estimator is designed, from the perspective of the defenders, to alleviate the negative effect of the attack. In a word, a novel unified attack-defense framework for nonlinear CNs is established. In order to make up for the defect that the IDB attacker's parameter is unknown to the defender, an algorithm is developed to approximate the attack parameter. With the help of the Lyapunov functional method, sufficient conditions are obtained to resist the proposed IDB attack and ensure the H & INFIN;$$ {H}_{\infty } $$ performance of the augmented system. At last, two examples are given to demonstrate the destructiveness of the proposed IDB attack strategy and the effectiveness of the developed resilient H & INFIN;$$ {H}_{\infty } $$ estimator, respectively.
引用
收藏
页码:2861 / 2878
页数:18
相关论文
共 43 条
  • [1] Hybrid-triggered-based security controller design for networked control system under multiple cyber attacks
    Cao, Jie
    Ding, Da
    Liu, Jinliang
    Tian, Engang
    Hu, Songlin
    Xie, Xiangpeng
    [J]. INFORMATION SCIENCES, 2021, 548 : 69 - 84
  • [2] Distributed Dimensionality Reduction Fusion Estimation for Cyber-Physical Systems Under DoS Attacks
    Chen, Bo
    Ho, Daniel W. C.
    Zhang, Wen-An
    Yu, Li
    [J]. IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2019, 49 (02): : 455 - 468
  • [3] A Joint Online Strategy of Measurement Outliers Diagnosis and State of Charge Estimation for Lithium-Ion Batteries
    Chen, Hui
    Tian, Engang
    Wang, Licheng
    Liu, Shuai
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2023, 19 (05) : 6387 - 6397
  • [4] Adaptive event-triggered state estimation for complex networks with nonlinearities against hybrid attacks
    Deng, Yahan
    Meng, Zhenhai
    Lu, Hongqian
    [J]. AIMS MATHEMATICS, 2022, 7 (02): : 2858 - 2877
  • [5] H∞ State Estimation for Discrete-Time Complex Networks With Randomly Occurring Sensor Saturations and Randomly Varying Sensor Delays
    Ding, Derui
    Wang, Zidong
    Shen, Bo
    Shu, Huisheng
    [J]. IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, 2012, 23 (05) : 725 - 736
  • [6] Optimizing Attack Schedules Based on Energy Dispatch Over Two-Hop Relay Networks
    Gan, Ruimeng
    Shao, Jinliang
    Xiao, Yue
    Zhang, Heng
    Zheng, Wei Xing
    [J]. IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2020, 65 (09) : 3832 - 3846
  • [7] Ge XH, 2023, IEEE-CAA J AUTOMATIC, V10, P1234, DOI [10.1109/JAS.2022.105845, 10.1109/JAS.2023.123507]
  • [8] Distributed Krein space-based attack detection over sensor networks under deception attacks
    Ge, Xiaohua
    Han, Qing-Long
    Zhong, Maiying
    Zhang, Xian-Ming
    [J]. AUTOMATICA, 2019, 109
  • [9] Segment-Weighted Information-Based Event-Triggered Mechanism for Networked Control Systems
    Gu, Zhou
    Yue, Dong
    Ahn, Choon Ki
    Yan, Shen
    Xie, Xiangpeng
    [J]. IEEE TRANSACTIONS ON CYBERNETICS, 2023, 53 (08) : 5336 - 5345
  • [10] Memory-Event-Triggered Fault Detection of Networked IT2 T-S Fuzzy Systems
    Gu, Zhou
    Yue, Dong
    Park, Ju H.
    Xie, Xiangpeng
    [J]. IEEE TRANSACTIONS ON CYBERNETICS, 2023, 53 (02) : 743 - 752