Optimal stealthy attack against stochastic event-based scheduling for remote state estimation in cyber-physical systems

被引:8
|
作者
Song, Yunbo [1 ]
Ye, Dan [1 ,2 ]
机构
[1] Northeastern Univ, Coll Informat Sci & Engn, Shenyang 110819, Liaoning, Peoples R China
[2] Northeastern Univ, State Key Lab Synthet Automat Proc Ind, Shenyang, Peoples R China
基金
中国国家自然科学基金;
关键词
cyber-physical systems; MMSE estimation; stealthy attack; stochastic event-based scheduling;
D O I
10.1002/rnc.5967
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This article concentrates on security issues of stochastic event-based (SEB) sensor scheduling in cyber-physical systems (CPSs). An SEB attack mechanism is proposed to compromise remote state estimation, in which the attacker can jam the feedback channel and inject false acknowledgments. Based on the Gaussian assumption, the minimum mean square error estimator under the SEB attack is obtained utilizing Bayes' theorem. In this article, the SEB attack stealthiness is composed of communication ratio invariance and anomaly detection invisibility with the forward channel. Furthermore, a double stealthy attack condition is given to complete persistent attacks from the perspective of the attacker. Aiming at maximizing average error covariances on the remote estimator, we design a generation algorithm of optimal SEB stealthy attack sequence and prove its optimality by rearrangement inequality and mathematical induction. Finally, the scalar and networked dc motor vector system simulations illustrate the corresponding theoretical results.
引用
收藏
页码:3511 / 3526
页数:16
相关论文
共 50 条
  • [21] Optimal Jamming Attack Schedule Against Wireless State Estimation in Cyber-Physical Systems
    Peng, Lianghong
    Cao, Xianghui
    Sun, Changyin
    Cheng, Yu
    WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, WASA 2016, 2016, 9798 : 318 - 330
  • [22] Stealthy switching attacks on sensors against state estimation in cyber-physical systems
    Huo, Jian-Ru
    Li, Xiao-Jian
    INTERNATIONAL JOURNAL OF ROBUST AND NONLINEAR CONTROL, 2023, 33 (02) : 1169 - 1183
  • [23] Energy efficient jamming attack schedule against remote state estimation in wireless cyber-physical systems
    Peng, Lianghong
    Cao, Xianghui
    Sun, Changyin
    Cheng, Yu
    Jin, Shi
    NEUROCOMPUTING, 2018, 272 : 571 - 583
  • [24] SAGE: Stealthy Attack Generation in cyber-physical systems
    Biehler, Michael
    Zhong, Zhen
    Shi, Jianjun
    IISE TRANSACTIONS, 2024, 56 (01) : 54 - 68
  • [25] A Stealthy Sensor Attack for Uncertain Cyber-Physical Systems
    Jeon, Heegyun
    Eun, Yongsoon
    IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (04) : 6345 - 6352
  • [26] A Finite-Time Stealthy Covert Attack Against Cyber-Physical Systems
    Gheitasi, Kian
    Lucia, Walter
    2020 7TH INTERNATIONAL CONFERENCE ON CONTROL, DECISION AND INFORMATION TECHNOLOGIES (CODIT'20), VOL 1, 2020, : 347 - 352
  • [27] Design of Stealthy Attacks Against Interval Estimation for Cyber-Physical Systems
    Li, Zhi-Hui
    Yang, Guang-Hong
    IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2024, 11 (02): : 2215 - 2222
  • [28] Data-driven Stealthy Actuator Attack against Cyber-Physical Systems
    Zhang, Zhixue
    Zhang, Qirui
    Liu, Tao
    Pang, Zhonghua
    Cui, Bing
    Jin, Shuxin
    Liu, Kun
    PROCEEDINGS OF THE 39TH CHINESE CONTROL CONFERENCE, 2020, : 4395 - 4399
  • [29] Event-Based Covert Cyber-Attack in Switching Cyber-Physical Systems: Design and Detection Mechanisms
    Eslami, Ali
    Kazemi, MohamadGhasem
    Khorasani, Khashayar
    18TH ANNUAL IEEE INTERNATIONAL SYSTEMS CONFERENCE, SYSCON 2024, 2024,
  • [30] Stochastic Stealthy False Data Injection Attacks Against Cyber-Physical Systems
    Liu, Ruirui
    Yu, Hao
    Hao, Fei
    IEEE SYSTEMS JOURNAL, 2022, 16 (04): : 6009 - 6020