Optimal filter design for cyber-physical systems under stealthy hybrid attacks

被引:13
|
作者
Li, Yuman [1 ]
Lin, Hong [2 ]
Lam, James [1 ]
机构
[1] Univ Hong Kong, Dept Mech Engn, Pokfulam Rd, Hong Kong, Peoples R China
[2] Shenzhen Polytech, Inst Intelligence Sci & Engn, Shenzhen, Peoples R China
关键词
cyber-physical systems; optimal filter; optimal linear filter; stability; stealthy hybrid attacks; NETWORKED CONTROL-SYSTEMS; SECURE ESTIMATION; CONVERGENCE; STABILITY;
D O I
10.1002/rnc.5351
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This article studies the optimal filtering problem for cyber-physical systems under stealthy hybrid cyber-attacks. Due to the stealthiness of cyber-attacks, the optimal filter (OF) consists of an exponentially increasing number of terms, which makes it computationally infeasible in practice. To address this computational issue, an optimal linear filter (OLF) is developed with its estimation performance fairly close to the optimal one. Furthermore, for a system under the stealthy hybrid cyber-attacks, it is proved that when the system is stable, the exponentially increasing number of terms remain bounded, making the OF stable; and that the OLF is stable if and only if the system is stable. Finally, numerical examples are employed to illustrate the effectiveness of the proposed two filters.
引用
下载
收藏
页码:1340 / 1357
页数:18
相关论文
共 50 条
  • [1] Reachability Analysis of Cyber-Physical Systems Under Stealthy Attacks
    Zhang, Qirui
    Liu, Kun
    Pang, Zhonghua
    Xia, Yuanqing
    Liu, Tao
    IEEE TRANSACTIONS ON CYBERNETICS, 2022, 52 (06) : 4926 - 4934
  • [2] Stealthy Deception Attacks for Cyber-Physical Systems
    Goes, Romulo Meira
    Kang, Eunsuk
    Kwong, Raymond
    Lafortune, Stephane
    2017 IEEE 56TH ANNUAL CONFERENCE ON DECISION AND CONTROL (CDC), 2017,
  • [3] Optimal stealthy false data injection attacks in cyber-physical systems
    Li, Yi-Gang
    Yang, Guang-Hong
    INFORMATION SCIENCES, 2019, 481 : 474 - 490
  • [4] Optimal strictly stealthy attacks in cyber-physical systems with multiple channels under the energy constraint
    Dong, Sheng-Sheng
    Li, Yi-Gang
    An, Liwei
    INTERNATIONAL JOURNAL OF SYSTEMS SCIENCE, 2023, 54 (13) : 2608 - 2625
  • [5] On the Performance Degradation of Cyber-Physical Systems Under Stealthy Integrity Attacks
    Mo, Yilin
    Sinopoli, Bruno
    IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2016, 61 (09) : 2618 - 2624
  • [6] Design of Stealthy Attacks Against Interval Estimation for Cyber-Physical Systems
    Li, Zhi-Hui
    Yang, Guang-Hong
    IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2024, 11 (02): : 2215 - 2222
  • [7] Optimal design and allocation of stealthy attacks against remote state estimation for cyber-physical systems
    Liu, Xuan
    Yang, Guang-Hong
    INFORMATION SCIENCES, 2024, 676
  • [8] The Vulnerability of Cyber-Physical System Under Stealthy Attacks
    Sui, Tianju
    Mo, Yilin
    Marelli, Damian
    Sun, Ximing
    Fu, Minyue
    IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2021, 66 (02) : 637 - 650
  • [9] Robust Stealthy Covert Attacks on Cyber-Physical Systems
    Li, Xuerong
    Zhang, Ping
    Dong, Hongli
    IFAC PAPERSONLINE, 2022, 55 (06): : 520 - 525
  • [10] Stealthy Local Covert Attacks on Cyber-Physical Systems
    Mikhaylenko, Dina
    Zhang, Ping
    IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2022, 67 (12) : 6778 - 6785