Improved Interval Estimation Method for Cyber-Physical Systems Under Stealthy Deception Attacks

被引:8
|
作者
Fan, Jianwei [1 ]
Huang, Jun [1 ]
Zhao, Xudong [2 ]
机构
[1] Soochow Univ, Dept Mech & Elect Engn, Suzhou 215131, Peoples R China
[2] Dalian Univ Technol, Sch Control Sci & Engn, Dalian 116000, Peoples R China
关键词
Cyber attacks; interval observers; reachable set analysis; SECURE STATE ESTIMATION; OBSERVER DESIGN; SENSOR ATTACKS;
D O I
10.1109/TSIPN.2021.3134097
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper investigates the problem of interval estimation for cyber-physical systems subject to stealthy deception attacks. The cyber-physical system is supposed to be compromised by malicious attackers and on the basis of that, a stealthy attack strategy is formulated. Moreover, the stealthiness of the attack strategy against chi(2)-detector is analyzed. To accomplish interval estimation, the interval observer is designed by the monotone system method. Then, a novel method which combines reachable set analysis with H-infinity technique is proposed. Theoretical comparison between the monotone system method and the proposed method is presented and it shows that the proposed method is able to improve the estimation accuracy. Finally, two illustrative examples are provided to demonstrate the superiority and effectiveness of the improved method.
引用
收藏
页码:1 / 11
页数:11
相关论文
共 50 条
  • [1] Secure iterative interval estimation method for cyber-physical systems subject to stealthy deception attacks
    Zhang, Tu
    Zhang, Guobao
    Huang, Yongming
    [J]. TRANSACTIONS OF THE INSTITUTE OF MEASUREMENT AND CONTROL, 2024, 46 (06) : 1084 - 1092
  • [2] Stealthy Deception Attacks for Cyber-Physical Systems
    Goes, Romulo Meira
    Kang, Eunsuk
    Kwong, Raymond
    Lafortune, Stephane
    [J]. 2017 IEEE 56TH ANNUAL CONFERENCE ON DECISION AND CONTROL (CDC), 2017,
  • [3] Design of Stealthy Attacks Against Interval Estimation for Cyber-Physical Systems
    Li, Zhi-Hui
    Yang, Guang-Hong
    [J]. IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2024, 11 (02): : 2215 - 2222
  • [4] Secure Interval Estimation for Event-Triggered Cyber-Physical Systems Under Stealthy Attacks
    Wang, Xudong
    Wang, Guoqi
    Fei, Zhongyang
    Li, Zhe
    [J]. IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, 2024, 11 (02): : 648 - 657
  • [5] Performance analysis for cyber-physical systems under two types of stealthy deception attacks
    Liu, Qingchen
    Wang, Jie
    Ni, Yuqing
    Zhang, Cong
    Shi, Ling
    Qin, Jiahu
    [J]. AUTOMATICA, 2024, 160
  • [6] Security Analysis for Cyber-Physical Systems against Stealthy Deception Attacks
    Kwon, Cheolhyeon
    Liu, Weiyi
    Hwang, Inseok
    [J]. 2013 AMERICAN CONTROL CONFERENCE (ACC), 2013, : 3344 - 3349
  • [7] Reachability Analysis of Cyber-Physical Systems Under Stealthy Attacks
    Zhang, Qirui
    Liu, Kun
    Pang, Zhonghua
    Xia, Yuanqing
    Liu, Tao
    [J]. IEEE TRANSACTIONS ON CYBERNETICS, 2022, 52 (06) : 4926 - 4934
  • [8] On the Performance Degradation of Cyber-Physical Systems Under Stealthy Integrity Attacks
    Mo, Yilin
    Sinopoli, Bruno
    [J]. IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2016, 61 (09) : 2618 - 2624
  • [9] The Vulnerability of Cyber-Physical System Under Stealthy Attacks
    Sui, Tianju
    Mo, Yilin
    Marelli, Damian
    Sun, Ximing
    Fu, Minyue
    [J]. IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2021, 66 (02) : 637 - 650
  • [10] Robust Stealthy Covert Attacks on Cyber-Physical Systems
    Li, Xuerong
    Zhang, Ping
    Dong, Hongli
    [J]. IFAC PAPERSONLINE, 2022, 55 (06): : 520 - 525