A class of stealthy attacks on remote state estimation with intermittent observation

被引:5
|
作者
Lv, Yujiao [1 ]
Lu, Jianquan [2 ,3 ]
Liu, Yang [4 ]
Zhang, Lingzhong [5 ]
机构
[1] Southeast Univ, Sch Cyber Sci & Engn, Nanjing 210096, Peoples R China
[2] Southeast Univ, Sch Math, Nanjing 210096, Peoples R China
[3] Linyi Univ, Sch Automat & Elect Engn, Linyi 276005, Peoples R China
[4] Zhejiang Normal Univ, Sch Math Sci, Jinhua 321004, Peoples R China
[5] Changshu Inst Technol, Sch Elect Engn & Automat, Changshu 215500, Peoples R China
基金
中国国家自然科学基金;
关键词
Network attack; Cyber-physical systems; State estimation;
D O I
10.1016/j.ins.2023.118964
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Network attacks always threaten economic operations and personal privacy, which have resulted in severe and irreparable damage. Therefore, the investigation of network attacks is essential for network security. This paper concentrates on designing two stealthy attack strategies for remote state estimation with intermittent observations, where the attackers can select one of the designed stealthy attack strategies depending on their capabilities, available resources, and information. Furthermore, for real-time communication rates, a novel detector is introduced to determine if the system is compromised by attackers at each moment. Then, an algorithm for state estimation is derived under the proposed stealthy attack strategies. Furthermore, the attack parameters in the proposed attack strategies are discussed by applying linear matrix inequalities. Finally, a numerical example illustrates the effects of the detector and attack strategies.
引用
收藏
页数:11
相关论文
共 50 条
  • [41] Optimal Stealthy Joint Attacks Against Distributed State Estimation in Cyber-Physical Systems
    Su, Guangzhen
    Liu, Kun
    Wang, Haojun
    Zhang, Qirui
    Xia, Yuanqing
    IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, 2024, 11 (03): : 1597 - 1609
  • [42] Optimal Deception Attacks on Remote State Estimation with Heterogeneous Vulnerabilities
    Wei, Jinyuan
    Zhou, Jing
    Chen, Tongwen
    INTELLIGENT NETWORKED THINGS, CINT 2024, PT II, 2024, 2139 : 188 - 200
  • [43] Event-Triggered Reverse Attacks on Remote State Estimation
    Zhao, Xudong
    Liu, Le
    Basin, Michael V.
    Fei, Zhongyang
    IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2024, 69 (02) : 998 - 1005
  • [44] The vulnerability of distributed state estimator under stealthy attacks
    Sui, Tianju
    Sun, Xi-Ming
    AUTOMATICA, 2021, 133
  • [45] Stealthy False Data Injection Attacks against State Estimation in Power Systems: Switching Network Topologies
    Wang, Shaocheng
    Ren, Wei
    2014 AMERICAN CONTROL CONFERENCE (ACC), 2014,
  • [46] Concurrent Receding Horizon Control and Estimation Against Stealthy Attacks
    Fotiadis, Filippos
    Vamvoudakis, Kyriakos. G.
    IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2023, 68 (06) : 3712 - 3719
  • [47] Worst-case stealthy innovation-based linear attack on remote state estimation
    Guo, Ziyang
    Shi, Dawei
    Johansson, Karl Henrik
    Shi, Ling
    AUTOMATICA, 2018, 89 : 117 - 124
  • [48] Stochastic Detector Against Linear Deception Attacks on Remote State Estimation
    Li, Yuzhe
    Chen, Tongwen
    2016 IEEE 55TH CONFERENCE ON DECISION AND CONTROL (CDC), 2016, : 6291 - 6296
  • [49] Defensive deception against reactive jamming attacks in remote state estimation
    Ding, Kemi
    Ren, Xiaoqiang
    Quevedo, Daniel E.
    Dey, Subhrakanti
    Shi, Ling
    AUTOMATICA, 2020, 113
  • [50] Allocation of Eavesdropping Attacks for Multi-System Remote State Estimation
    Chang, Xiaoyan
    Peng, Lianghong
    Zhang, Suzhen
    SENSORS, 2024, 24 (03)