Optimal innovation-based deception attacks with side information against remote state estimation in cyber-physical systems

被引:11
作者
Li, Yi-Gang [1 ]
Yang, Guang-Hong [2 ,3 ]
机构
[1] Shenyang Univ Technol, Sch Artificial Intelligence, Shenyang 110870, Peoples R China
[2] Northeastern Univ, Coll Informat Sci & Engn, Shenyang 110819, Peoples R China
[3] Northeastern Univ, State Key Lab Synthet Automat Proc Ind, Shenyang 110819, Peoples R China
基金
中国国家自然科学基金;
关键词
Deception attacks; Cyber-physical systems; Side information; Kalman filters; DATA-INJECTION ATTACKS; SMART SENSORS; PERFORMANCE;
D O I
10.1016/j.neucom.2022.05.085
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper, the problem of designing the optimal deception attacks against the remote state estimation in cyber-physical systems is investigated in the scenario where the attacker has the ability to acquire the side information about the system by employing an extra sensor. To degenerate the remote estimation performance, the attacker replaces the transmitted signals with the combination of the innovations from the system sensor and the extra sensor. Under the proposed attacks, the recursion of the error covariance of the remote estimates is derived by utilizing the orthogonality principle and the statistical properties of the related random variables. Then, the design of the attacks is transformed into a quadratic multivariate optimization problem and the optimal distribution of the modified innovations is found by taking advantage of the Lagrange multiplier method. Based on this, it is proved that the optimal policy is the solution to a semi-definite programming (SDP) problem, which results in the largest estimation errors and maintains the deceptiveness concurrently. Finally, simulation examples are given to verify the effectiveness of this work. (C) 2022 Elsevier B.V. All rights reserved.
引用
收藏
页码:461 / 470
页数:10
相关论文
共 51 条
  • [1] Cyber Security of Water SCADA Systems-Part I: Analysis and Experimentation of Stealthy Deception Attacks
    Amin, Saurabh
    Litrico, Xavier
    Sastry, Shankar
    Bayen, Alexandre M.
    [J]. IEEE TRANSACTIONS ON CONTROL SYSTEMS TECHNOLOGY, 2013, 21 (05) : 1963 - 1970
  • [2] Byzantine-resilient distributed state estimation: A min-switching approach
    An, Liwei
    Yang, Guang-Hong
    [J]. AUTOMATICA, 2021, 129
  • [3] Distributed secure state estimation for cyber-physical systems under sensor attacks
    An, Liwei
    Yang, Guang-Hong
    [J]. AUTOMATICA, 2019, 107 : 526 - 538
  • [4] Anderson B.D., 2012, OPTIMAL FILTERING
  • [5] [Anonymous], 2014, P 4 PROGRAM PROTECTI
  • [6] On Kalman Filtering with Compromised Sensors: Attack Stealthiness and Performance Bounds
    Bai, Cheng-Zong
    Gupta, Vijay
    Pasqualetti, Fabio
    [J]. IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2017, 62 (12) : 6641 - 6648
  • [7] Data-injection attacks in stochastic control systems: Detectability and performance tradeoffs
    Bai, Cheng-Zong
    Pasqualetti, Fabio
    Gupta, Vijay
    [J]. AUTOMATICA, 2017, 82 : 251 - 260
  • [8] Information Leakage-Aware Computer-Aided Cyber-Physical Manufacturing
    Chhetri, Sujit Rokka
    Faezi, Sina
    Al Faruque, Mohammad Abdullah
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (09) : 2333 - 2344
  • [9] Recursive Secure Filtering Over Gilbert-Elliott Channels in Sensor Networks: The Distributed Case
    Ding, Derui
    Wang, Zidong
    Han, Qing-Long
    Zhang, Xian-Ming
    [J]. IEEE TRANSACTIONS ON SIGNAL AND INFORMATION PROCESSING OVER NETWORKS, 2021, 7 (75-86): : 75 - 86
  • [10] Secure State Estimation and Control of Cyber-Physical Systems: A Survey
    Ding, Derui
    Han, Qing-Long
    Ge, Xiaohua
    Wang, Jun
    [J]. IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2021, 51 (01): : 176 - 190