Optimal innovation-based deception attacks with side information against remote state estimation in cyber-physical systems

被引:15
作者
Li, Yi-Gang [1 ]
Yang, Guang-Hong [2 ,3 ]
机构
[1] Shenyang Univ Technol, Sch Artificial Intelligence, Shenyang 110870, Peoples R China
[2] Northeastern Univ, Coll Informat Sci & Engn, Shenyang 110819, Peoples R China
[3] Northeastern Univ, State Key Lab Synthet Automat Proc Ind, Shenyang 110819, Peoples R China
基金
中国国家自然科学基金;
关键词
Deception attacks; Cyber-physical systems; Side information; Kalman filters; DATA-INJECTION ATTACKS; SMART SENSORS; PERFORMANCE;
D O I
10.1016/j.neucom.2022.05.085
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper, the problem of designing the optimal deception attacks against the remote state estimation in cyber-physical systems is investigated in the scenario where the attacker has the ability to acquire the side information about the system by employing an extra sensor. To degenerate the remote estimation performance, the attacker replaces the transmitted signals with the combination of the innovations from the system sensor and the extra sensor. Under the proposed attacks, the recursion of the error covariance of the remote estimates is derived by utilizing the orthogonality principle and the statistical properties of the related random variables. Then, the design of the attacks is transformed into a quadratic multivariate optimization problem and the optimal distribution of the modified innovations is found by taking advantage of the Lagrange multiplier method. Based on this, it is proved that the optimal policy is the solution to a semi-definite programming (SDP) problem, which results in the largest estimation errors and maintains the deceptiveness concurrently. Finally, simulation examples are given to verify the effectiveness of this work. (C) 2022 Elsevier B.V. All rights reserved.
引用
收藏
页码:461 / 470
页数:10
相关论文
共 51 条
[1]   Cyber Security of Water SCADA Systems-Part I: Analysis and Experimentation of Stealthy Deception Attacks [J].
Amin, Saurabh ;
Litrico, Xavier ;
Sastry, Shankar ;
Bayen, Alexandre M. .
IEEE TRANSACTIONS ON CONTROL SYSTEMS TECHNOLOGY, 2013, 21 (05) :1963-1970
[2]   Byzantine-resilient distributed state estimation: A min-switching approach [J].
An, Liwei ;
Yang, Guang-Hong .
AUTOMATICA, 2021, 129
[3]   Distributed secure state estimation for cyber-physical systems under sensor attacks [J].
An, Liwei ;
Yang, Guang-Hong .
AUTOMATICA, 2019, 107 :526-538
[4]  
Anderson BD., 2012, Optimal filtering
[5]  
[Anonymous], 2014, P 4 PROGRAM PROTECTI
[6]  
[Anonymous], 2010, 1 WORKSH SEC CONTR S
[7]  
[Anonymous], 2010, PROC 1 WORKSHOP SECU
[8]   On Kalman Filtering with Compromised Sensors: Attack Stealthiness and Performance Bounds [J].
Bai, Cheng-Zong ;
Gupta, Vijay ;
Pasqualetti, Fabio .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2017, 62 (12) :6641-6648
[9]   Data-injection attacks in stochastic control systems: Detectability and performance tradeoffs [J].
Bai, Cheng-Zong ;
Pasqualetti, Fabio ;
Gupta, Vijay .
AUTOMATICA, 2017, 82 :251-260
[10]   Information Leakage-Aware Computer-Aided Cyber-Physical Manufacturing [J].
Chhetri, Sujit Rokka ;
Faezi, Sina ;
Al Faruque, Mohammad Abdullah .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (09) :2333-2344