Optimal stealthy switching location attacks against remote estimation in cyber-physical systems

被引:0
|
作者
Li, Yi-Gang [1 ]
Yang, Guang-Hong [1 ,2 ]
机构
[1] Northeastern Univ, Coll Informat Sci & Engn, Shenyang 110819, Peoples R China
[2] Northeastern Univ, State Key Lab Synthet Automat Proc Ind, Shenyang 110819, Liaoning, Peoples R China
基金
中国国家自然科学基金;
关键词
Stealthy attacks; Multi-channels; Estimation errors; Cyber-physical systems; DATA-INJECTION ATTACKS; SECURE STATE ESTIMATION; SMART SENSORS; POWER-CONTROL;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper studies the design of the optimal stealthy switching location attacks in cyber-physical systems with multi-channels. By introducing the Kullback-Leibler divergence to characterize the stealthiness, an attack strategy with the energy constraint is proposed, which is only able to modify a part of the channels at each time step. Under the proposed attacks, the terminal estimation error is analyzed by utilizing the statistical characteristics of the innovations. And then, different from the DoS attack scheduling problems in the related works, the optimal attack strategy is derived by solving a constrained optimization problem and a 0-1 programming problem, which maximizes the remote estimation error and keeps deceptive simultaneously. Finally, the results are illustrated via the simulation examples. (c) 2020 Elsevier B.V. All rights reserved.
引用
收藏
页码:183 / 194
页数:12
相关论文
共 50 条
  • [31] DDAF: Deceptive Data Acquisition Framework against Stealthy Attacks in Cyber-Physical Systems
    Shahriar, Md Hasan
    Rahman, Mohammad Ashiqur
    Haque, Nur Imtiazul
    Chowdhury, Badrul
    [J]. 2021 IEEE 45TH ANNUAL COMPUTERS, SOFTWARE, AND APPLICATIONS CONFERENCE (COMPSAC 2021), 2021, : 725 - 734
  • [32] Coding Schemes for Securing Cyber-Physical Systems Against Stealthy Data Injection Attacks
    Miao, Fei
    Zhu, Quanyan
    Pajic, Miroslav
    Pappas, George J.
    [J]. IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, 2017, 4 (01): : 106 - 117
  • [33] Reachability Analysis of Cyber-Physical Systems Under Stealthy Attacks
    Zhang, Qirui
    Liu, Kun
    Pang, Zhonghua
    Xia, Yuanqing
    Liu, Tao
    [J]. IEEE TRANSACTIONS ON CYBERNETICS, 2022, 52 (06) : 4926 - 4934
  • [34] Stealthy Targeted Local Covert Attacks on Cyber-Physical Systems
    Mikhaylenko, Dina
    Krames, Marcel
    Zhang, Ping
    [J]. 2021 60TH IEEE CONFERENCE ON DECISION AND CONTROL (CDC), 2021, : 3462 - 3467
  • [35] Optimal innovation-based deception attacks with side information against remote state estimation in cyber-physical systems
    Li, Yi-Gang
    Yang, Guang-Hong
    [J]. NEUROCOMPUTING, 2022, 500 : 461 - 470
  • [36] Secure State Estimation of Cyber-Physical Systems Under Switching Attacks
    Forti, N.
    Battistelli, G.
    Chisci, L.
    Sinopoli, B.
    [J]. IFAC PAPERSONLINE, 2017, 50 (01): : 4979 - 4986
  • [37] Optimal Power Allocation for Jamming Attack against Remote Estimation in Cyber-Physical Systems
    Shi, Hongbao
    Cao, Xianghui
    Sun, Changyin
    [J]. 2017 CHINESE AUTOMATION CONGRESS (CAC), 2017, : 7156 - 7161
  • [38] Dynamic State Recovery for Cyber-Physical Systems Under Switching Location Attacks
    Liu, Chensheng
    Wu, Jing
    Long, Chengnian
    Wang, Yebin
    [J]. IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, 2017, 4 (01): : 14 - 22
  • [39] Optimal strictly stealthy attacks in cyber-physical systems with multiple channels under the energy constraint
    Dong, Sheng-Sheng
    Li, Yi-Gang
    An, Liwei
    [J]. INTERNATIONAL JOURNAL OF SYSTEMS SCIENCE, 2023, 54 (13) : 2608 - 2625
  • [40] Secure iterative interval estimation method for cyber-physical systems subject to stealthy deception attacks
    Zhang, Tu
    Zhang, Guobao
    Huang, Yongming
    [J]. TRANSACTIONS OF THE INSTITUTE OF MEASUREMENT AND CONTROL, 2024, 46 (06) : 1084 - 1092