Optimal energy constrained deception attacks in cyber-physical systems with multiple channels: A fusion attack approach

被引:8
|
作者
Li, Yi-Gang [1 ]
Yang, Guang-Hong [2 ,3 ,4 ]
Wang, Xiangdong [1 ]
机构
[1] Shenyang Univ Technol, Sch Artificial Intelligence, Shenyang 110870, Peoples R China
[2] Northeastern Univ, Coll Informat Sci & Engn, Shenyang 110819, Peoples R China
[3] Northeastern Univ, State Key Lab Synthet Automat Proc Ind, Shenyang 110819, Peoples R China
[4] King Abdulaziz Univ, Dept Elect & Comp Engn, Jeddah 21589, Saudi Arabia
基金
中国国家自然科学基金;
关键词
Cyber-physical systems; Deception attacks; Remote state estimation; Kullback-Leibler divergence; Energy constraints; DATA-INJECTION ATTACKS; SECURE STATE ESTIMATION; REMOTE ESTIMATION; SENSORS;
D O I
10.1016/j.isatra.2023.01.020
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper studies the issue of developing the optimal deception attacks on the multiple channels in cyber-physical systems, where the attackers are limited by energy constraints. To fully utilize the eavesdropped data, by linearly combining the innovations from the different channels, a fusion attack model is proposed under the stealthiness condition. According to the statistical characteristics of the correlated stochastic variables and the orthogonality principle, the state estimation error is quantified and analyzed by deriving the iteration of the error covariance matrices of the remote estimators under the proposed attack framework. Moreover, by analyzing the correlations of the decision variables in the objective function, it is shown that the attack parameters and energy allocation strategy can be derived by two steps without loss of optimality, such that the optimal attack scheme is acquired by solving a multivariate semi-definite programming (SDP) problem and a linear 0-1 programming problem respectively. Finally, simulation examples are provided to illustrate the effectiveness of the proposed method.& COPY; 2023 ISA. Published by Elsevier Ltd. All rights reserved.
引用
收藏
页码:1 / 12
页数:12
相关论文
共 50 条
  • [1] Optimal Intermittent Deception Attacks With Energy Constraints for Cyber-Physical Systems
    Liu, Xuan
    Yang, Guang-Hong
    [J]. IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2024, 54 (10): : 5889 - 5900
  • [2] Stabilizing Control for Cyber-Physical Systems against Energy-Constrained Deception Attacks
    He, Jing
    Liang, Yan
    Xu, Linfeng
    Yan, Shi
    [J]. ICCAIS 2019: THE 8TH INTERNATIONAL CONFERENCE ON CONTROL, AUTOMATION AND INFORMATION SCIENCES, 2019,
  • [3] Optimal Stealthy Deception Attack Against Cyber-Physical Systems
    Zhang, Qirui
    Liu, Kun
    Xia, Yuanqing
    Ma, Aoyun
    [J]. IEEE TRANSACTIONS ON CYBERNETICS, 2020, 50 (09) : 3963 - 3972
  • [4] Optimal strictly stealthy attacks in cyber-physical systems with multiple channels under the energy constraint
    Dong, Sheng-Sheng
    Li, Yi-Gang
    An, Liwei
    [J]. INTERNATIONAL JOURNAL OF SYSTEMS SCIENCE, 2023, 54 (13) : 2608 - 2625
  • [5] Stealthy Deception Attacks for Cyber-Physical Systems
    Goes, Romulo Meira
    Kang, Eunsuk
    Kwong, Raymond
    Lafortune, Stephane
    [J]. 2017 IEEE 56TH ANNUAL CONFERENCE ON DECISION AND CONTROL (CDC), 2017,
  • [6] Optimal deception attacks against remote state estimation in cyber-physical systems
    Li, Yi-Gang
    Yang, Guang-Hong
    [J]. JOURNAL OF THE FRANKLIN INSTITUTE-ENGINEERING AND APPLIED MATHEMATICS, 2020, 357 (03): : 1832 - 1852
  • [7] A moving target defence approach for detecting deception attacks on cyber-physical systems
    Babadi, Narges
    Doustmohammadi, Ali
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2022, 100
  • [8] Attack detection and secure correction control for cyber-physical systems subject to actuator deception attacks
    He, Ke
    Long, Yue
    Li, Tieshan
    [J]. 2023 35TH CHINESE CONTROL AND DECISION CONFERENCE, CCDC, 2023, : 3356 - 3361
  • [9] Identification and analysis of stochastic deception attacks on cyber-physical systems
    Barchinezhad, Soheila
    Haghighi, Mohammad Sayad
    Puig, Vicenc
    [J]. JOURNAL OF THE FRANKLIN INSTITUTE-ENGINEERING AND APPLIED MATHEMATICS, 2024, 361 (08):
  • [10] Optimal ε -stealthy attack in cyber-physical systems
    Tu, Weiwei
    Dong, Jiuxiang
    Zhai, Ding
    [J]. JOURNAL OF THE FRANKLIN INSTITUTE-ENGINEERING AND APPLIED MATHEMATICS, 2021, 358 (01): : 151 - 171