Optimal Stealthy Innovation-Based Attacks With Historical Data in Cyber-Physical Systems

被引:71
|
作者
Li, Yi-Gang [1 ]
Yang, Guang-Hong [1 ,2 ]
机构
[1] Northeastern Univ, Coll Informat Sci & Engn, Shenyang 110819, Peoples R China
[2] Northeastern Univ, State Key Lab Synthet Automat Proc Ind, Shenyang 110819, Peoples R China
基金
中国国家自然科学基金;
关键词
Technological innovation; Detectors; Security; State estimation; Kalman filters; Covariance matrices; Cyber-physical systems (CPSs); historical data; Kalman filter; remote state estimation; strictly stealthy attacks; DATA-INJECTION ATTACKS; RESILIENT CONTROL; STATE ESTIMATION; SENSOR;
D O I
10.1109/TSMC.2019.2924976
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The problem of stealthy innovation-based attacks in cyber-physical systems is studied in this paper. Different from the existing results which only utilize the current data, a more general attack strategy is designed by combining the historical and the current innovations to deteriorate the estimation performance and keep stealthy to the detector simultaneously. Under the framework of the attacks, the remote state estimation error is analyzed, and the optimal attack policy is derived by solving a convex optimization problem to achieve the maximal estimation error. Moreover, it is proved that the optimal attack strategy is piecewise constant, such that the attack is designed with low calculation cost. Finally, simulation examples are provided to demonstrate the theoretical results.
引用
收藏
页码:3401 / 3411
页数:11
相关论文
共 50 条
  • [41] Comparison of Corrupted Sensor Data Detection Methods in Detecting Stealthy Attacks on Cyber-Physical Systems
    Sabaliauskaite, Giedre
    Ng, Geok See
    Ruths, Justin
    Mathur, Aditya
    2017 IEEE 22ND PACIFIC RIM INTERNATIONAL SYMPOSIUM ON DEPENDABLE COMPUTING (PRDC 2017), 2017, : 235 - 244
  • [42] The Vulnerability of Cyber-Physical System Under Stealthy Attacks
    Sui, Tianju
    Mo, Yilin
    Marelli, Damian
    Sun, Ximing
    Fu, Minyue
    IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2021, 66 (02) : 637 - 650
  • [43] Vulnerability analysis for a class of nonlinear cyber-physical systems under stealthy attacks
    Zhang, Qirui
    Dai, Wei
    Yang, Chunyu
    Chen, Xinkai
    AUTOMATICA, 2024, 167
  • [44] Distributionally Robust Tuning of Anomaly Detectors in Cyber-Physical Systems with Stealthy Attacks
    Renganathan, Venkatraman
    Hashemi, Navid
    Ruths, Justin
    Summers, Tyler H.
    2020 AMERICAN CONTROL CONFERENCE (ACC), 2020, : 1247 - 1252
  • [45] Optimal Switching Integrity Attacks in Cyber-Physical Systems
    Wu, Guangyu
    Sun, Jian
    2017 32ND YOUTH ACADEMIC ANNUAL CONFERENCE OF CHINESE ASSOCIATION OF AUTOMATION (YAC), 2017, : 709 - 714
  • [46] Finite-Horizon Strictly Stealthy Deterministic Attacks on Cyber-Physical Systems
    Cheng, Donny
    Shang, Jun
    Chen, Tongwen
    IEEE CONTROL SYSTEMS LETTERS, 2022, 6 : 1640 - 1645
  • [47] Stealthy switching attacks on sensors against state estimation in cyber-physical systems
    Huo, Jian-Ru
    Li, Xiao-Jian
    INTERNATIONAL JOURNAL OF ROBUST AND NONLINEAR CONTROL, 2023, 33 (02) : 1169 - 1183
  • [48] Optimal Switching Attacks and Countermeasures in Cyber-Physical Systems
    Wu, Guangyu
    Wang, Gang
    Sun, Jian
    Xiong, Lu
    IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2021, 51 (08): : 4825 - 4835
  • [49] Clustering-based detection algorithm of remote state estimation under stealthy innovation-based attacks with historical data
    Chen, Shan
    Ni, Yuqing
    Huang, Lingying
    Luan, Xiaoli
    Liu, Fei
    NEUROCOMPUTING, 2025, 616
  • [50] Stealthy multiplicative attacks against cyber-physical systems: A gap metric approach
    Zhao, Zhengen
    Xu, Yunsong
    Li, Yuzhe
    Cui, Lei
    Huang, Yimin
    Zhen, Ziyang
    INTERNATIONAL JOURNAL OF ROBUST AND NONLINEAR CONTROL, 2022, 32 (13) : 7336 - 7347