Completely Stealthy FDI Attack Against State Estimation in Networked Control Systems

被引:11
|
作者
Liu, Yifa [1 ,2 ]
Cheng, Long [1 ,2 ,3 ]
机构
[1] Chinese Acad Sci, Inst Automat, State Key Lab Management & Control Complex Syst, Beijing, Peoples R China
[2] Univ Chinese Acad Sci, Sch Artificial Intelligence, Beijing 100049, Peoples R China
[3] Peng Cheng Lab, Dept Math & Theories, Shenzhen 518055, Peoples R China
基金
中国国家自然科学基金; 北京市自然科学基金;
关键词
False data injection attack; estimation; complete stealthiness; detection; networked control systems; DATA INJECTION ATTACKS; SECURITY;
D O I
10.1109/TCSII.2022.3217132
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
An effective false data injection attack should cause enough damage to the system while avoiding being spotted by detection methods. This brief proposes an extremely stealthy attack strategy, which can make the residual almost always unchanged to invalidate both the widely used ?(2) detector and the advanced summation detector and can eventually cause unbound state deviations. Compared with the existing attack methods, the proposed attack strategy can reduce the sum of cumulative residual increments by 85.39% while causing 9817001 times of the state deviations in the numerical simulations.
引用
收藏
页码:1114 / 1118
页数:5
相关论文
共 50 条
  • [31] Analysis of Stealthy False Data Injection Attacks Against Networked Control Systems: Three Case Studies
    Pang, Zhonghua
    Fu, Yuan
    Guo, Haibin
    Sun, Jian
    JOURNAL OF SYSTEMS SCIENCE & COMPLEXITY, 2023, 36 (04) : 1407 - 1422
  • [32] Optimal Stealthy Linear Attack on Remote State Estimation With Side Information
    Ye, Dan
    Yang, Bing
    Zhang, Tian-Yu
    IEEE SYSTEMS JOURNAL, 2022, 16 (01): : 1499 - 1507
  • [33] Optimal Jamming Attack System Against Remote State Estimation in Wireless Network Control Systems
    Yang, Li
    Wen, Chenglin
    IEEE ACCESS, 2021, 9 : 51679 - 51688
  • [34] Kullback-Leibler Divergence-Based Optimal Stealthy Sensor Attack Against Networked Linear Quadratic Gaussian Systems
    Ren, Xiu-Xiu
    Yang, Guang-Hong
    IEEE TRANSACTIONS ON CYBERNETICS, 2022, 52 (11) : 11539 - 11548
  • [35] Optimal Stealthy Attack With Side Information Against Remote State Estimation: A Corrupted Innovation-Based Strategy
    Mao, Li-Wei
    Yang, Guang-Hong
    IEEE TRANSACTIONS ON CYBERNETICS, 2025, 55 (02) : 897 - 904
  • [36] Data-Driven Detection of Stealthy False Data Injection Attack Against Power System State Estimation
    Chen, Chunyu
    Wang, Yunpeng
    Cui, Mingjian
    Zhao, Junbo
    Bi, Wenjun
    Chen, Yang
    Zhang, Xiao
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2022, 18 (12) : 8467 - 8476
  • [37] Optimal Stealthy Deception Attack Against Cyber-Physical Systems
    Zhang, Qirui
    Liu, Kun
    Xia, Yuanqing
    Ma, Aoyun
    IEEE TRANSACTIONS ON CYBERNETICS, 2020, 50 (09) : 3963 - 3972
  • [38] Improved Stealthy False Data Injection Attacks in Networked Control Systems
    Ning, Chuanyi
    Xi, Zhiyu
    IEEE SYSTEMS JOURNAL, 2024, 18 (01): : 505 - 515
  • [39] Resilient predictive control strategy of cyber-physical systems against FDI attack
    He, Ning
    Ma, Kai
    Li, Huiping
    IET CONTROL THEORY AND APPLICATIONS, 2022, 16 (11): : 1098 - 1109
  • [40] Attack-Resilient Control Against FDI Attacks in Cyber-Physical Systems
    Chen, Bo
    Tan, Yawen
    Sun, Zhe
    Yu, Li
    IEEE-CAA JOURNAL OF AUTOMATICA SINICA, 2022, 9 (06) : 1099 - 1102