Optimal Stealthy Linear Man-in-the-Middle Attacks With Resource Constraints on Remote State Estimation

被引:2
|
作者
Zhang, Yingwen [1 ]
Peng, Zhaoxia [1 ]
Wen, Guoguang [2 ]
Wang, Jinhuan [3 ]
Huang, Tingwen [4 ]
机构
[1] Beihang Univ, Sch Transportat Sci Engn, Beijing 100083, Peoples R China
[2] Beijing Jiaotong Univ, Sch Math & Stat, Beijing 100044, Peoples R China
[3] Hebei Univ Technol, Sch Sci, Tianjin 300401, Peoples R China
[4] Texas A&M Univ Qatar, Sci Program, Doha, Qatar
基金
中国国家自然科学基金;
关键词
Kullback-Leibler (KL) divergence; man-in-the-middle (MITM) attack; optimal stealthy attack; remote state estimator (RSE); resource constraint; NETWORKED CONTROL-SYSTEMS; DATA INJECTION ATTACKS; SECURE CONTROL;
D O I
10.1109/TSMC.2023.3311853
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This article studies the impact of constrained optimal stealthy attacks on the state estimator, where MITM attacks with a linear form can compromise innovations transmitted through a wireless network. First, a novel resource-constrained attack model is proposed, in which there are only a finite number of attack instants within a fixed interval. Second, the evolution of the estimation error covariance under attacks is obtained, and the covariance at the ultimate instant of the attack interval is regarded as the attacker's cost function. Moreover, a relaxed condition of the strict stealthiness, named KL divergence, is employed to describe the attacker's the stealthiness metric. Third, the one-time and holistic optimization problems of stealthy attacks are solved by exploiting the Lagrange multiplier method. Then the constrained optimal attack strategies are obtained to produce the largest ultimate estimation error covariance. Finally, two simulation cases are provided to confirm the correctness of the designed attack strategies.
引用
收藏
页码:445 / 456
页数:12
相关论文
共 50 条
  • [1] Secure remote state estimation against linear man-in-the-middle attacks using watermarking
    Huang, Jiahao
    Ho, Daniel W. C.
    Li, Fangfei
    Yang, Wen
    Tang, Yang
    [J]. AUTOMATICA, 2020, 121
  • [2] Optimal Linear Encryption Against Stealthy Attacks on Remote State Estimation
    Shang, Jun
    Chen, Maoyin
    Chen, Tongwen
    [J]. IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2021, 66 (08) : 3592 - 3607
  • [3] Optimal Stealthy Attacks With Energy Constraint Against Remote State Estimation
    Liu, Xuan
    Yang, Guang-Hong
    [J]. IEEE TRANSACTIONS ON CYBERNETICS, 2024, 54 (06) : 3577 - 3587
  • [4] Measurement-Based Optimal Stealthy Attacks on Remote State Estimation
    Li, Pengyu
    Ye, Dan
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 17 : 3365 - 3374
  • [5] Nonlinear stealthy attacks on remote state estimation☆
    Shang, Jun
    Zhou, Jing
    Chen, Tongwen
    [J]. AUTOMATICA, 2024, 167
  • [6] Optimal Stealthy Linear-Attack Schedules on Remote State Estimation
    Zhang, Junhui
    Sun, Jitao
    [J]. IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2021, 69 : 2807 - 2817
  • [7] Optimal Stealthy Linear Attack on Remote State Estimation With Side Information
    Ye, Dan
    Yang, Bing
    Zhang, Tian-Yu
    [J]. IEEE SYSTEMS JOURNAL, 2022, 16 (01): : 1499 - 1507
  • [8] Optimal stealthy integrity attacks on remote state estimation: The maximum utilization of historical data
    Shang, Jun
    Chen, Tongwen
    [J]. AUTOMATICA, 2021, 128
  • [9] Optimal stealthy integrity attacks on remote state estimation: The maximum utilization of historical data
    Shang, Jun
    Chen, Tongwen
    [J]. Automatica, 2021, 128
  • [10] A stealthy man-in-the-middle attack strategy for switched systems
    Sun, Dawei
    Hwang, Inseok
    Goppert, James
    [J]. INTERNATIONAL JOURNAL OF SYSTEMS SCIENCE, 2024, 55 (06) : 1206 - 1223