Optimal Stealthy Innovation-Based Attacks With Historical Data in Cyber-Physical Systems

被引:87
作者
Li, Yi-Gang [1 ]
Yang, Guang-Hong [1 ,2 ]
机构
[1] Northeastern Univ, Coll Informat Sci & Engn, Shenyang 110819, Peoples R China
[2] Northeastern Univ, State Key Lab Synthet Automat Proc Ind, Shenyang 110819, Peoples R China
来源
IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS | 2021年 / 51卷 / 06期
基金
中国国家自然科学基金;
关键词
Technological innovation; Detectors; Security; State estimation; Kalman filters; Covariance matrices; Cyber-physical systems (CPSs); historical data; Kalman filter; remote state estimation; strictly stealthy attacks; DATA-INJECTION ATTACKS; RESILIENT CONTROL; STATE ESTIMATION; SENSOR;
D O I
10.1109/TSMC.2019.2924976
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The problem of stealthy innovation-based attacks in cyber-physical systems is studied in this paper. Different from the existing results which only utilize the current data, a more general attack strategy is designed by combining the historical and the current innovations to deteriorate the estimation performance and keep stealthy to the detector simultaneously. Under the framework of the attacks, the remote state estimation error is analyzed, and the optimal attack policy is derived by solving a convex optimization problem to achieve the maximal estimation error. Moreover, it is proved that the optimal attack strategy is piecewise constant, such that the attack is designed with low calculation cost. Finally, simulation examples are provided to demonstrate the theoretical results.
引用
收藏
页码:3401 / 3411
页数:11
相关论文
共 50 条
[41]   On the Performance Degradation of Cyber-Physical Systems Under Stealthy Integrity Attacks [J].
Mo, Yilin ;
Sinopoli, Bruno .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2016, 61 (09) :2618-2624
[42]   Distributed Asymptotic Secure Estimation for Cyber-Physical Systems Under Stealthy Attacks: An Interval Observer-Based Method [J].
Li, Zhi-Hui ;
Yang, Guang-Hong .
IEEE INTERNET OF THINGS JOURNAL, 2025, 12 (13) :23627-23635
[43]   Stealthy Attacks and Robust Detectors for Cyber-Physical Systems With Bounded Disturbances: A Zonotope Approach [J].
Guo, Ziyi ;
Zhou, Jing ;
Chen, Tongwen .
IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, 2025, 12 (01) :416-429
[44]   Stealthy False Data Injection Attacks Detection and Classification in Cyber-Physical Systems Using Deep Reinforcement Learning [J].
Xin, Liang ;
He, Guang ;
Long, Zhiqiang .
IEEE TRANSACTIONS ON AUTOMATION SCIENCE AND ENGINEERING, 2025, 22 :141-153
[45]   The Vulnerability of Cyber-Physical System Under Stealthy Attacks [J].
Sui, Tianju ;
Mo, Yilin ;
Marelli, Damian ;
Sun, Ximing ;
Fu, Minyue .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2021, 66 (02) :637-650
[46]   Optimal Encryption Scheduling Policy Against Eavesdropping Attacks in Cyber-Physical Systems [J].
Tao, Fei ;
Ye, Dan .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2024, 20 (11) :13147-13157
[47]   Stealthy Attacks With Historical Data on Distributed State Estimation [J].
Xing, Jitao ;
Ye, Dan ;
Li, Pengyu .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2025, 20 :4541-4550
[48]   Stochastic Event-Based Physical Watermarks Against Replay Attacks in Cyber-Physical Systems [J].
Zhao, Xudong ;
Liu, Le ;
Xing, Wei ;
Xu, Ning .
IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, 2024, 11 (02) :1035-1045
[49]   Time-Stamp Attacks on Remote State Estimation in Cyber-Physical Systems [J].
Qu, Fuyi ;
Yang, Nachuan ;
Liu, Hao ;
Li, Yuzhe ;
Quevedo, Daniel E. .
IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, 2024, 11 (01) :450-461
[50]   Optimal Switching Integrity Attacks in Cyber-Physical Systems [J].
Wu, Guangyu ;
Sun, Jian .
2017 32ND YOUTH ACADEMIC ANNUAL CONFERENCE OF CHINESE ASSOCIATION OF AUTOMATION (YAC), 2017, :709-714