Data-driven attack policy design for cyber-physical systems under channel constraints

被引:0
|
作者
Liu, He [1 ]
Li, Xiao-Jian [1 ,2 ]
机构
[1] Northeastern Univ, Coll Informat Sci & Engn, Shenyang 110819, Peoples R China
[2] Northeastern Univ, State Key Lab Synthet Automat Proc Ind, Shenyang 110819, Peoples R China
关键词
Cyber-physical system security; Cyber-attacks; Data-driven technology; Optimization; DATA-INJECTION ATTACKS; REMOTE ESTIMATION; FAULT-DETECTION;
D O I
10.1016/j.ins.2024.120894
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper is concerned with the design of data -driven sensor injection attack for cyber-physical systems (CPSs) under channel constraints, where the attacker can only access a part of the sensor channels and the accessible channels switch over time. To enhance the attack's effectiveness while maintaining its stealthiness, the design problem is formulated as a constraint -type L 2 - gain optimization problem. Then, by optimizing the attack -direction matrix using the data -driven parametrization method, an attack policy with channel constraints is proposed. Specifically, the necessary and sufficient design conditions are established in terms of the attack stealthiness. Furthermore, the optimized attack stealthiness index and attack effectiveness index under channel constrains are obtained, and it is theoretically proven that the attack performance is reduced due to the passive channel switching. The effectiveness of the data -driven attack policy is illustrated by the IEEE 6 bus power system.
引用
收藏
页数:14
相关论文
共 50 条
  • [31] Data-Driven and Model-Based Quantitative Verification and Correct-by-Design Synthesis of Cyber-Physical Systems
    Abate, Alessandro
    ELECTRONIC PROCEEDINGS IN THEORETICAL COMPUTER SCIENCE, 2016, (232): : 5 - +
  • [32] HGCNN-LSTM: A Data-driven Approach for Cyberattack Detection in Cyber-Physical Systems
    S. Abinash
    N. Srivatsan
    S. K. Hemachandran
    S. Priyanga
    SN Computer Science, 6 (1)
  • [33] Electric power cyber-physical systems vulnerability assessment under cyber attack
    Qu, Zhengwei
    Sun, Wenting
    Dong, Jie
    Zhao, Jianjun
    Li, Yang
    FRONTIERS IN ENERGY RESEARCH, 2023, 10
  • [34] Cyber-Physical Production Systems for Data-Driven, Decentralized, and Secure Manufacturing-A Perspective
    Suvarna, Manu
    Yap, Ken Shaun
    Yang, Wentao
    Li, Jun
    Ng, Yen Ting
    Wang, Xiaonan
    ENGINEERING, 2021, 7 (09) : 1212 - 1223
  • [35] Efficient data-driven event-triggered predictive control for cyber-physical systems
    Li, Zhe
    Liu, Kexin
    Wang, Xudong
    Yuan, Xiaofang
    Wang, Yaonan
    JOURNAL OF CONTROL AND DECISION, 2024,
  • [36] Resilient DoS Attack Detector Design for Cyber-Physical Systems
    Li, Jin
    Zhang, Youmin
    2023 12TH INTERNATIONAL CONFERENCE ON RENEWABLE ENERGY RESEARCH AND APPLICATIONS, ICRERA, 2023, : 435 - 439
  • [37] Optimal stealthy attack with historical data on cyber-physical systems
    Ren, Xiu-Xiu
    Yang, Guang-Hong
    Zhang, Xiao-Guang
    AUTOMATICA, 2023, 151
  • [38] Optimal Data Integrity Attack on Actuators in Cyber-Physical Systems
    Wu, Guangyu
    Sun, Jian
    2016 AMERICAN CONTROL CONFERENCE (ACC), 2016, : 1160 - 1164
  • [39] Hybrid Robust Controller Design: Cyber Attack Attenuation for Cyber-Physical Systems
    Kwon, Cheolhyeon
    Hwang, Inseok
    2013 IEEE 52ND ANNUAL CONFERENCE ON DECISION AND CONTROL (CDC), 2013, : 188 - 193
  • [40] Study on attack paths of cyber attack in cyber-physical power systems
    Chen, Lei
    Yue, Dong
    Dou, Chunxia
    Chen, Jianbo
    Cheng, Zihao
    IET GENERATION TRANSMISSION & DISTRIBUTION, 2020, 14 (12) : 2352 - 2360