Optimal stealthy switching location attacks against remote estimation in cyber-physical systems

被引:0
作者
Li, Yi-Gang [1 ]
Yang, Guang-Hong [1 ,2 ]
机构
[1] Northeastern Univ, Coll Informat Sci & Engn, Shenyang 110819, Peoples R China
[2] Northeastern Univ, State Key Lab Synthet Automat Proc Ind, Shenyang 110819, Liaoning, Peoples R China
基金
中国国家自然科学基金;
关键词
Stealthy attacks; Multi-channels; Estimation errors; Cyber-physical systems; DATA-INJECTION ATTACKS; SECURE STATE ESTIMATION; SMART SENSORS; POWER-CONTROL;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper studies the design of the optimal stealthy switching location attacks in cyber-physical systems with multi-channels. By introducing the Kullback-Leibler divergence to characterize the stealthiness, an attack strategy with the energy constraint is proposed, which is only able to modify a part of the channels at each time step. Under the proposed attacks, the terminal estimation error is analyzed by utilizing the statistical characteristics of the innovations. And then, different from the DoS attack scheduling problems in the related works, the optimal attack strategy is derived by solving a constrained optimization problem and a 0-1 programming problem, which maximizes the remote estimation error and keeps deceptive simultaneously. Finally, the results are illustrated via the simulation examples. (c) 2020 Elsevier B.V. All rights reserved.
引用
收藏
页码:183 / 194
页数:12
相关论文
共 53 条
[1]   Data-Driven Coordinated Attack Policy Design Based on Adaptive L2-Gain Optimal Theory [J].
An, Liwei ;
Yang, Guang-Hong .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2018, 63 (06) :1850-1857
[2]  
Anderson B.D.O., 1979, Optimal filtering
[3]  
[Anonymous], 2008, SMART SENSOR SYSTEMS
[4]  
[Anonymous], 2007, MEASUREMENT SYSTEMS
[5]  
[Anonymous], 2010, PROC 1 WORKSHOP SECU
[6]  
[Anonymous], 2018, IEEE T AUTOM CONTROL
[7]   Data-injection attacks in stochastic control systems: Detectability and performance tradeoffs [J].
Bai, Cheng-Zong ;
Pasqualetti, Fabio ;
Gupta, Vijay .
AUTOMATICA, 2017, 82 :251-260
[8]  
Bai CZ, 2015, P AMER CONTR CONF, P195, DOI 10.1109/ACC.2015.7170734
[9]   Remote Estimation With Noisy Measurements Subject to Packet Loss and Quantization Noise [J].
Dey, Subhrakanti ;
Chiuso, Alessandro ;
Schenato, Luca .
IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, 2014, 1 (03) :204-217
[10]   Stuxnet and the Future of Cyber War [J].
Farwell, James P. ;
Rohozinski, Rafal .
SURVIVAL, 2011, 53 (01) :23-40