Optimal Stealthy Innovation-Based Attacks With Historical Data in Cyber-Physical Systems

被引:71
|
作者
Li, Yi-Gang [1 ]
Yang, Guang-Hong [1 ,2 ]
机构
[1] Northeastern Univ, Coll Informat Sci & Engn, Shenyang 110819, Peoples R China
[2] Northeastern Univ, State Key Lab Synthet Automat Proc Ind, Shenyang 110819, Peoples R China
基金
中国国家自然科学基金;
关键词
Technological innovation; Detectors; Security; State estimation; Kalman filters; Covariance matrices; Cyber-physical systems (CPSs); historical data; Kalman filter; remote state estimation; strictly stealthy attacks; DATA-INJECTION ATTACKS; RESILIENT CONTROL; STATE ESTIMATION; SENSOR;
D O I
10.1109/TSMC.2019.2924976
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The problem of stealthy innovation-based attacks in cyber-physical systems is studied in this paper. Different from the existing results which only utilize the current data, a more general attack strategy is designed by combining the historical and the current innovations to deteriorate the estimation performance and keep stealthy to the detector simultaneously. Under the framework of the attacks, the remote state estimation error is analyzed, and the optimal attack policy is derived by solving a convex optimization problem to achieve the maximal estimation error. Moreover, it is proved that the optimal attack strategy is piecewise constant, such that the attack is designed with low calculation cost. Finally, simulation examples are provided to demonstrate the theoretical results.
引用
收藏
页码:3401 / 3411
页数:11
相关论文
共 50 条
  • [31] Geometry-Based Data-Driven Complete Stealthy Attacks Against Cyber-Physical Systems
    Wang, Kaiyu
    Ye, Dan
    IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2024, 11 (06): : 5839 - 5849
  • [32] Optimal strictly stealthy attacks in cyber-physical systems with multiple channels under the energy constraint
    Dong, Sheng-Sheng
    Li, Yi-Gang
    An, Liwei
    INTERNATIONAL JOURNAL OF SYSTEMS SCIENCE, 2023, 54 (13) : 2608 - 2625
  • [33] Optimal design and allocation of stealthy attacks against remote state estimation for cyber-physical systems
    Liu, Xuan
    Yang, Guang-Hong
    INFORMATION SCIENCES, 2024, 676
  • [34] Detection and Performance Compensation for Linear ?-Stealthy Attacks in Cyber-Physical Systems
    Li, Pengyu
    Ye, Dan
    IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, 2023, 10 (03): : 1338 - 1349
  • [35] A Moving Target Defense to Detect Stealthy Attacks in Cyber-Physical Systems
    Giraldo, J.
    Cardenas, A.
    Sanfelice, R. G.
    2019 AMERICAN CONTROL CONFERENCE (ACC), 2019, : 391 - 396
  • [36] Security Analysis for Cyber-Physical Systems against Stealthy Deception Attacks
    Kwon, Cheolhyeon
    Liu, Weiyi
    Hwang, Inseok
    2013 AMERICAN CONTROL CONFERENCE (ACC), 2013, : 3344 - 3349
  • [37] Design of Stealthy Attacks Against Interval Estimation for Cyber-Physical Systems
    Li, Zhi-Hui
    Yang, Guang-Hong
    IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2024, 11 (02): : 2215 - 2222
  • [38] On the Performance Degradation of Cyber-Physical Systems Under Stealthy Integrity Attacks
    Mo, Yilin
    Sinopoli, Bruno
    IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2016, 61 (09) : 2618 - 2624
  • [39] Optimal Stealthy Deterministic Attack Strategies on Cyber-Physical Systems
    Cheng, Donny
    Shang, Jun
    Chen, Tongwen
    IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, 2025, 12 (01): : 152 - 164
  • [40] Optimal Stealthy Deception Attack Against Cyber-Physical Systems
    Zhang, Qirui
    Liu, Kun
    Xia, Yuanqing
    Ma, Aoyun
    IEEE TRANSACTIONS ON CYBERNETICS, 2020, 50 (09) : 3963 - 3972