Optimal stealthy false data injection attacks in cyber-physical systems

被引:107
作者
Li, Yi-Gang [1 ]
Yang, Guang-Hong [1 ,2 ]
机构
[1] Northeastern Univ, Coll Informat Sci & Engn, Shenyang 110819, Liaoning, Peoples R China
[2] Northeastern Univ, State Key Lab Synthet Automat Proc Ind, Shenyang 110819, Liaoning, Peoples R China
基金
中国国家自然科学基金;
关键词
Cyber-physical systems; False data injection attacks; State estimation; Kullback-Leibler divergence; STATE ESTIMATION; SENSOR;
D O I
10.1016/j.ins.2019.01.001
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, the problem of false data injection attacks for cyber-physical systems is investigated. The Kullback-Leibler divergence is utilized to measure the stealthiness of the attacks. Different from the existing attack policies which are required to be zero-mean Gaussian distributed, a more general linear attack strategy based on Gaussian distribution with an arbitrary mean is proposed. Under the framework of the attacks, the degradation of system performance is analyzed by utilizing the statistical characteristics of the measurement innovation, and the optimal attack strategy is obtained by employing the Lagrange multiplier method to solve a constrained quadratic optimization problem. It is proved that the developed attack scheme can achieve the largest remote estimation error and guarantee the attack stealthiness simultaneously. Finally, simulation examples are provided to demonstrate the theoretical results. (C) 2019 Elsevier Inc. All rights reserved.
引用
收藏
页码:474 / 490
页数:17
相关论文
共 36 条
  • [1] Data-Driven Coordinated Attack Policy Design Based on Adaptive L2-Gain Optimal Theory
    An, Liwei
    Yang, Guang-Hong
    [J]. IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2018, 63 (06) : 1850 - 1857
  • [2] Secure State Estimation Against Sparse Sensor Attacks With Adaptive Switching Mechanism
    An, Liwei
    Yang, Guang-Hong
    [J]. IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2018, 63 (08) : 2596 - 2603
  • [3] Improved adaptive resilient control against sensor and actuator attacks
    An, Liwei
    Yang, Guang-Hong
    [J]. INFORMATION SCIENCES, 2018, 423 : 145 - 156
  • [4] Anderson Brian DO, 2012, Optimal filtering
  • [5] [Anonymous], 2012, ELEMENTS INFORM THEO
  • [6] Bai CZ, 2015, P AMER CONTR CONF, P195, DOI 10.1109/ACC.2015.7170734
  • [7] Bai CZ, 2014, P AMER CONTR CONF, P3029, DOI 10.1109/ACC.2014.6859155
  • [8] Cardenas Alvaro A., 2008, 2008 28th International Conference on Distributed Computing Systems Workshops (ICDCS Workshops), P495, DOI 10.1109/ICDCS.Workshops.2008.40
  • [9] Input-to-State Stabilizing Control Under Denial-of-Service
    De Persis, Claudio
    Tesi, Pietro
    [J]. IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2015, 60 (11) : 2930 - 2944
  • [10] Stuxnet and the Future of Cyber War
    Farwell, James P.
    Rohozinski, Rafal
    [J]. SURVIVAL, 2011, 53 (01) : 23 - 40