Optimal Stealthy Innovation-Based Attacks With Historical Data in Cyber-Physical Systems

被引:71
作者
Li, Yi-Gang [1 ]
Yang, Guang-Hong [1 ,2 ]
机构
[1] Northeastern Univ, Coll Informat Sci & Engn, Shenyang 110819, Peoples R China
[2] Northeastern Univ, State Key Lab Synthet Automat Proc Ind, Shenyang 110819, Peoples R China
来源
IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS | 2021年 / 51卷 / 06期
基金
中国国家自然科学基金;
关键词
Technological innovation; Detectors; Security; State estimation; Kalman filters; Covariance matrices; Cyber-physical systems (CPSs); historical data; Kalman filter; remote state estimation; strictly stealthy attacks; DATA-INJECTION ATTACKS; RESILIENT CONTROL; STATE ESTIMATION; SENSOR;
D O I
10.1109/TSMC.2019.2924976
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The problem of stealthy innovation-based attacks in cyber-physical systems is studied in this paper. Different from the existing results which only utilize the current data, a more general attack strategy is designed by combining the historical and the current innovations to deteriorate the estimation performance and keep stealthy to the detector simultaneously. Under the framework of the attacks, the remote state estimation error is analyzed, and the optimal attack policy is derived by solving a convex optimization problem to achieve the maximal estimation error. Moreover, it is proved that the optimal attack strategy is piecewise constant, such that the attack is designed with low calculation cost. Finally, simulation examples are provided to demonstrate the theoretical results.
引用
收藏
页码:3401 / 3411
页数:11
相关论文
共 50 条
  • [31] Finite-Horizon Strictly Stealthy Deterministic Attacks on Cyber-Physical Systems
    Cheng, Donny
    Shang, Jun
    Chen, Tongwen
    [J]. IEEE CONTROL SYSTEMS LETTERS, 2022, 6 : 1640 - 1645
  • [32] Stealthy switching attacks on sensors against state estimation in cyber-physical systems
    Huo, Jian-Ru
    Li, Xiao-Jian
    [J]. INTERNATIONAL JOURNAL OF ROBUST AND NONLINEAR CONTROL, 2023, 33 (02) : 1169 - 1183
  • [33] Optimal Switching Attacks and Countermeasures in Cyber-Physical Systems
    Wu, Guangyu
    Wang, Gang
    Sun, Jian
    Xiong, Lu
    [J]. IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2021, 51 (08): : 4825 - 4835
  • [34] Detection of Perfect Stealthy Attacks on Cyber-Physical Systems Subject to Measurement Quantizations: A Watermark-Based Strategy
    Wang, Yu-Ang
    Wang, Zidong
    Zou, Lei
    Shen, Bo
    Dong, Hongli
    [J]. IEEE-CAA JOURNAL OF AUTOMATICA SINICA, 2025, 12 (01) : 114 - 125
  • [35] Detection of Stealthy False Data Injection Attacks Against Cyber-Physical Systems: A Stochastic Coding Scheme
    Guo, Haibin
    Pang, Zhonghua
    Sun, Jian
    Li, Jun
    [J]. JOURNAL OF SYSTEMS SCIENCE & COMPLEXITY, 2022, 35 (05) : 1668 - 1684
  • [36] Optimal encryption strategy for cyber-physical systems against stealthy attacks with energy constraints: A Stackelberg game approach
    Liu, Xuan
    Yang, Guang-Hong
    [J]. INFORMATION SCIENCES, 2022, 610 : 674 - 693
  • [37] On the Performance Degradation of Cyber-Physical Systems Under Stealthy Integrity Attacks
    Mo, Yilin
    Sinopoli, Bruno
    [J]. IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2016, 61 (09) : 2618 - 2624
  • [38] Stealthy Attacks and Robust Detectors for Cyber-Physical Systems With Bounded Disturbances: A Zonotope Approach
    Guo, Ziyi
    Zhou, Jing
    Chen, Tongwen
    [J]. IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, 2025, 12 (01): : 416 - 429
  • [39] Stealthy False Data Injection Attacks Detection and Classification in Cyber-Physical Systems Using Deep Reinforcement Learning
    Xin, Liang
    He, Guang
    Long, Zhiqiang
    [J]. IEEE TRANSACTIONS ON AUTOMATION SCIENCE AND ENGINEERING, 2025, 22 : 141 - 153
  • [40] The Vulnerability of Cyber-Physical System Under Stealthy Attacks
    Sui, Tianju
    Mo, Yilin
    Marelli, Damian
    Sun, Ximing
    Fu, Minyue
    [J]. IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2021, 66 (02) : 637 - 650