A class of stealthy attacks on remote state estimation with intermittent observation

被引:5
|
作者
Lv, Yujiao [1 ]
Lu, Jianquan [2 ,3 ]
Liu, Yang [4 ]
Zhang, Lingzhong [5 ]
机构
[1] Southeast Univ, Sch Cyber Sci & Engn, Nanjing 210096, Peoples R China
[2] Southeast Univ, Sch Math, Nanjing 210096, Peoples R China
[3] Linyi Univ, Sch Automat & Elect Engn, Linyi 276005, Peoples R China
[4] Zhejiang Normal Univ, Sch Math Sci, Jinhua 321004, Peoples R China
[5] Changshu Inst Technol, Sch Elect Engn & Automat, Changshu 215500, Peoples R China
基金
中国国家自然科学基金;
关键词
Network attack; Cyber-physical systems; State estimation;
D O I
10.1016/j.ins.2023.118964
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Network attacks always threaten economic operations and personal privacy, which have resulted in severe and irreparable damage. Therefore, the investigation of network attacks is essential for network security. This paper concentrates on designing two stealthy attack strategies for remote state estimation with intermittent observations, where the attackers can select one of the designed stealthy attack strategies depending on their capabilities, available resources, and information. Furthermore, for real-time communication rates, a novel detector is introduced to determine if the system is compromised by attackers at each moment. Then, an algorithm for state estimation is derived under the proposed stealthy attack strategies. Furthermore, the attack parameters in the proposed attack strategies are discussed by applying linear matrix inequalities. Finally, a numerical example illustrates the effects of the detector and attack strategies.
引用
收藏
页数:11
相关论文
共 50 条
  • [1] Nonlinear stealthy attacks on remote state estimation☆
    Shang, Jun
    Zhou, Jing
    Chen, Tongwen
    AUTOMATICA, 2024, 167
  • [2] Optimal Stealthy Attacks With Energy Constraint Against Remote State Estimation
    Liu, Xuan
    Yang, Guang-Hong
    IEEE TRANSACTIONS ON CYBERNETICS, 2024, 54 (06) : 3577 - 3587
  • [3] Measurement-Based Optimal Stealthy Attacks on Remote State Estimation
    Li, Pengyu
    Ye, Dan
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 17 : 3365 - 3374
  • [4] Optimal Linear Encryption Against Stealthy Attacks on Remote State Estimation
    Shang, Jun
    Chen, Maoyin
    Chen, Tongwen
    IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2021, 66 (08) : 3592 - 3607
  • [5] Passive Attack Detection for a Class of Stealthy Intermittent Integrity Attacks
    Zhang, Kangkang
    Keliris, Christodoulos
    Parisini, Thomas
    Jiang, Bin
    Polycarpou, Marios M.
    IEEE-CAA JOURNAL OF AUTOMATICA SINICA, 2023, 10 (04) : 898 - 915
  • [6] Passive Attack Detection for a Class of Stealthy Intermittent Integrity Attacks
    Kangkang Zhang
    Christodoulos Keliris
    Thomas Parisini
    Bin Jiang
    Marios M.Polycarpou
    IEEE/CAAJournalofAutomaticaSinica, 2023, 10 (04) : 898 - 915
  • [7] Optimal stealthy integrity attacks on remote state estimation: The maximum utilization of historical data
    Shang, Jun
    Chen, Tongwen
    AUTOMATICA, 2021, 128
  • [8] Optimal stealthy integrity attacks on remote state estimation: The maximum utilization of historical data
    Shang, Jun
    Chen, Tongwen
    Automatica, 2021, 128
  • [9] Worst-Case Stealthy False-Data Injection Attacks on Remote State Estimation
    Zhou, Jing
    Shang, Jun
    Chen, Tongwen
    IECON 2021 - 47TH ANNUAL CONFERENCE OF THE IEEE INDUSTRIAL ELECTRONICS SOCIETY, 2021,
  • [10] Optimal Stealthy Linear Man-in-the-Middle Attacks With Resource Constraints on Remote State Estimation
    Zhang, Yingwen
    Peng, Zhaoxia
    Wen, Guoguang
    Wang, Jinhuan
    Huang, Tingwen
    IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2024, 54 (01): : 445 - 456