On scheduling of deception attacks for discrete-time networked systems equipped with attack detectors

被引:83
作者
Ding, Derui [1 ]
Wei, Guoliang [1 ]
Zhang, Sunjie [1 ]
Liu, Yurong [2 ,3 ]
Alsaadi, Fuad E. [3 ]
机构
[1] Univ Shanghai Sci & Technol, Dept Control Sci & Engn, Shanghai Key Lab Modern Opt Syst, Shanghai 200093, Peoples R China
[2] Yangzhou Univ, Dept Math, Yangzhou 225002, Jiangsu, Peoples R China
[3] King Abdulaziz Univ, Fac Engn, CSN Res Grp, Jeddah 21589, Saudi Arabia
基金
中国博士后科学基金; 中国国家自然科学基金;
关键词
Deception attack design; Consecutive attacks; Randomly launched deception attacks; The maximum number; Attack probability; RANDOMLY OCCURRING UNCERTAINTIES; DISTRIBUTED STATE ESTIMATION; MISSING MEASUREMENTS; NONLINEAR-SYSTEMS; MULTIPLICATIVE NOISES; PREDICTIVE CONTROL; SENSOR NETWORKS; PROBABILITY; DESIGN; DELAYS;
D O I
10.1016/j.neucom.2016.09.009
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper is concerned with the attack scheduling of deception attacks for discrete-time systems with attack detection. Specifically, for a class of Kalman filters with chi(2) detectors, an attacker with the given attack task needs to decide how many the maximum number is or how much the attack probability is for different kinds of attack scenarios (i.e. consecutive deception attacks or randomly launched deception attacks). Firstly, in light of the property of chi(2) distribution, the predictions of detection probabilities under attacks are calculated in mean-square sense for these two attack scenarios. Then, in terms of predicted probabilities, the deception attack schemes are designed in the framework of Kalman filtering. For the case of consecutive attacks, the maximum number of attacks is determined via recursive Riccati-like difference equations. For the case of randomly launched deception attacks, the desired attack probability is obtained by solving a Riccati-like equation. Finally, a numerical example on target tracking is presented to demonstrate the effectiveness of the proposed suboptimal attack schemes. (C) 2016 Elsevier B.V. All rights reserved.
引用
收藏
页码:99 / 106
页数:8
相关论文
共 31 条
[1]   Cyber Security of Water SCADA Systems-Part I: Analysis and Experimentation of Stealthy Deception Attacks [J].
Amin, Saurabh ;
Litrico, Xavier ;
Sastry, Shankar ;
Bayen, Alexandre M. .
IEEE TRANSACTIONS ON CONTROL SYSTEMS TECHNOLOGY, 2013, 21 (05) :1963-1970
[2]   Security of interdependent and identical networked control systems [J].
Amin, Saurabh ;
Schwartz, Galina A. ;
Sastry, S. Shankar .
AUTOMATICA, 2013, 49 (01) :186-192
[3]  
Befekadu GK, 2011, P AMER CONTR CONF, P643
[4]   Recursive state estimation for discrete time-varying stochastic nonlinear systems with randomly occurring deception attacks [J].
Ding, Derui ;
Shen, Yuxuan ;
Song, Yan ;
Wang, Yongxiong .
INTERNATIONAL JOURNAL OF GENERAL SYSTEMS, 2016, 45 (05) :548-560
[5]   Event-triggered consensus control for discrete-time stochastic multi-agent systems: The input-to-state stability in probability [J].
Ding, Derui ;
Wang, Zidong ;
Shen, Bo ;
Wei, Guoliang .
AUTOMATICA, 2015, 62 :284-291
[6]   H∞ state estimation with fading measurements, randomly varying nonlinearities and probabilistic distributed delays [J].
Ding, Derui ;
Wang, Zidong ;
Shen, Bo ;
Dong, Hongli .
INTERNATIONAL JOURNAL OF ROBUST AND NONLINEAR CONTROL, 2015, 25 (13) :2180-2195
[7]   Receding horizon filtering for a class of discrete time-varying nonlinear systems with multiple missing measurements [J].
Ding, Derui ;
Wang, Zidong ;
Alsaadi, Fuad E. ;
Shen, Bo .
INTERNATIONAL JOURNAL OF GENERAL SYSTEMS, 2015, 44 (02) :198-211
[8]   Event-Based H∞ Filter Design for a Class of Nonlinear Time-Varying Systems With Fading Channels and Multiplicative Noises [J].
Dong, Hongli ;
Wang, Zidong ;
Ding, Steven X. ;
Gao, Huijun .
IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2015, 63 (13) :3387-3395
[9]   Event-triggered robust distributed state estimation for sensor networks with state-dependent noises [J].
Dong, Hongli ;
Wang, Zidong ;
Alsaadi, Fuad E. ;
Ahmad, Bashir .
INTERNATIONAL JOURNAL OF GENERAL SYSTEMS, 2015, 44 (02) :254-266
[10]  
Foroush HS, 2012, IEEE DECIS CONTR P, P2551, DOI 10.1109/CDC.2012.6425868