Optimal completely stealthy attacks against remote estimation in cyber-physical systems

被引:27
|
作者
Li, Yi-Gang [1 ]
Yang, Guang-Hong [2 ,3 ]
机构
[1] Shenyang Univ Technol, Sch Artificial Intelligence, Shenyang 110870, Liaoning, Peoples R China
[2] Northeastern Univ, Coll Informat Sci & Engn, Shenyang 110819, Peoples R China
[3] Northeastern Univ, State Key Lab Synthet Automat Proc Ind, Shenyang 110819, Peoples R China
基金
中国国家自然科学基金;
关键词
Cyber-physical system; completely stealthy attack; estimation errorv chi(2)-detector; COMPENSATION;
D O I
10.1016/j.ins.2022.01.014
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper investigates the problem of designing the optimal completely stealthy attacks in cyber-physical systems. Different from the strictly stealthy attacks in the existing results which still have the possibilities to trigger the alarm and be invalid, a completely stealthy attack model is proposed such that the attack signals are able to bypass the detector successfully without being detected. Under the framework of the attacks, the remote estimation error is analyzed by deriving the recursion of the error covariance matrix, based on which the problem of attack design is transformed into a constrained optimization problem. By employing the Lagrange multiplier method, the optimal attack policy is derived which maximizes the remote estimation error and guarantees the complete stealthiness to the detector concurrently. Finally, simulation examples are provided to illustrate the effectiveness of this work. (C) 2022 Elsevier Inc. All rights reserved.
引用
收藏
页码:15 / 28
页数:14
相关论文
共 50 条
  • [41] On the Performance Degradation of Cyber-Physical Systems Under Stealthy Integrity Attacks
    Mo, Yilin
    Sinopoli, Bruno
    [J]. IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2016, 61 (09) : 2618 - 2624
  • [42] A Privacy-Preserving Approach Against Eavesdropping Attacks on Remote State Estimation for Cyber-Physical Systems
    Liu, Hanxiao
    Zou, Jiaying
    Ren, Xiaoqiang
    Wang, Xiaofan
    [J]. IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-EXPRESS BRIEFS, 2024, 71 (03) : 1221 - 1225
  • [43] Kullback-Leibler-Divergence-Based Attacks Against Remote State Estimation in Cyber-Physical Systems
    Zhang, Xiao-Guang
    Yang, Guang-Hong
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2022, 69 (05) : 5353 - 5363
  • [44] Time-Stamp Attacks on Remote State Estimation in Cyber-Physical Systems
    Qu, Fuyi
    Yang, Nachuan
    Liu, Hao
    Li, Yuzhe
    Quevedo, Daniel E.
    [J]. IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, 2024, 11 (01): : 450 - 461
  • [45] Resilient and secure remote monitoring for a class of cyber-physical systems against attacks
    Ge, Xiaohua
    Han, Qing-Long
    Zhang, Xian-Ming
    Ding, Derui
    Yang, Fuwen
    [J]. INFORMATION SCIENCES, 2020, 512 : 1592 - 1605
  • [46] The Vulnerability of Cyber-Physical System Under Stealthy Attacks
    Sui, Tianju
    Mo, Yilin
    Marelli, Damian
    Sun, Ximing
    Fu, Minyue
    [J]. IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2021, 66 (02) : 637 - 650
  • [47] Detection of Stealthy False Data Injection Attacks Against Cyber-Physical Systems: A Stochastic Coding Scheme
    GUO Haibin
    PANG Zhonghua
    SUN Jian
    LI Jun
    [J]. Journal of Systems Science & Complexity, 2022, 35 (05) : 1668 - 1684
  • [48] Detection of Stealthy False Data Injection Attacks Against Cyber-Physical Systems: A Stochastic Coding Scheme
    Guo, Haibin
    Pang, Zhonghua
    Sun, Jian
    Li, Jun
    [J]. JOURNAL OF SYSTEMS SCIENCE & COMPLEXITY, 2022, 35 (05) : 1668 - 1684
  • [49] Detection of Stealthy False Data Injection Attacks Against Cyber-Physical Systems: A Stochastic Coding Scheme
    Haibin Guo
    Zhonghua Pang
    Jian Sun
    Jun Li
    [J]. Journal of Systems Science and Complexity, 2022, 35 : 1668 - 1684
  • [50] Optimal Encryption Scheduling Policy Against Eavesdropping Attacks in Cyber-Physical Systems
    Tao, Fei
    Ye, Dan
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2024,