Optimal innovation-based attacks against remote state estimation with side information and historical data

被引:0
|
作者
Shan, Hua-Sheng [1 ]
Li, Yi-Gang [1 ]
An, Liwei [2 ]
机构
[1] Shenyang Univ Technol, Sch Artificial Intelligence, Shenyang 110870, Peoples R China
[2] Northeastern Univ, Coll Informat Sci & Engn, Shenyang, Peoples R China
基金
中国国家自然科学基金;
关键词
Cyber-physical systems; remote state estimation; false data injection attacks; Kullback-Leibler divergence; historical data; side information; DATA-INJECTION ATTACKS; CONTROL-SYSTEMS; INTEGRITY ATTACKS; SECURITY;
D O I
10.1080/00207721.2024.2395931
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This work investigates the attack strategy design problem of the false data injection attack against the cyber-physical system. Distinct from the relevant results which utilise the current intercepted data or additionally consider side information, a more universal attack model is proposed which combines historical data and side information with the current intercepted data to synergistically deteriorate the system estimation performance. In order to quantify the impact resulting from the proposed attack strategy, the optimisation objective is characterised by deriving the error covariance matrix under the attacks, which becomes more intricate since the proposed attack model introduces more decision variables and coupled terms. Take the stealthiness which is characterised by Kullback-Leibler divergence as the constraints, the problem investigated in this work is equivalently transformed into the constrained multi-variable non-convex optimisation problems, which are not able to be solved directly by the methods in the relevant results. By utilising the Lagrange multiplier method, the structural characteristic of the optimal mean and the optimal covariance which only related to the Lagrange multiplier are derived, such that the optimal distribution of the modified innovation is able to be obtained by a simple search procedure. Following that, the design of the optimal attack strategy is completed by using semi-definite programming to derive the optimal attack matrices. Finally, the simulation examples are given such that the validity of the results is verified.
引用
收藏
页码:544 / 560
页数:17
相关论文
共 50 条
  • [1] Optimal innovation-based deception attacks with side information against remote state estimation in cyber-physical systems
    Li, Yi-Gang
    Yang, Guang-Hong
    NEUROCOMPUTING, 2022, 500 : 461 - 470
  • [2] Consequence Analysis of Innovation-based Integrity Attacks with Side Information on Remote State Estimation
    Guo, Ziyang
    Shi, Dawei
    Johansson, Karl Henrik
    Shi, Ling
    IFAC PAPERSONLINE, 2017, 50 (01): : 8399 - 8404
  • [3] Optimal Stealthy Attack With Side Information Against Remote State Estimation: A Corrupted Innovation-Based Strategy
    Mao, Li-Wei
    Yang, Guang-Hong
    IEEE TRANSACTIONS ON CYBERNETICS, 2025, 55 (02) : 897 - 904
  • [4] Worst-Case Innovation-Based Integrity Attacks With Side Information on Remote State Estimation
    Guo, Ziyang
    Shi, Dawei
    Johansson, Karl Henrik
    Shi, Ling
    IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, 2019, 6 (01): : 48 - 59
  • [5] Clustering-based detection algorithm of remote state estimation under stealthy innovation-based attacks with historical data
    Chen, Shan
    Ni, Yuqing
    Huang, Lingying
    Luan, Xiaoli
    Liu, Fei
    NEUROCOMPUTING, 2025, 616
  • [6] Optimal Innovation-Based Deception Attack on Remote State Estimation
    Wu, Shuang
    Guo, Ziyang
    Shi, Dawei
    Johansson, Karl Henrik
    Shi, Ling
    2017 AMERICAN CONTROL CONFERENCE (ACC), 2017, : 3017 - 3022
  • [7] Single-dimensional encryption against innovation-based stealthy attacks on remote state estimation
    Shang, Jun
    Zhou, Jing
    Chen, Tongwen
    AUTOMATICA, 2022, 136
  • [8] Optimal Stealthy Innovation-Based Attacks With Historical Data in Cyber-Physical Systems
    Li, Yi-Gang
    Yang, Guang-Hong
    IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2021, 51 (06): : 3401 - 3411
  • [9] Optimal Deception Attacks Against Remote State Estimation: An Information-Based Approach
    Zhou, Jing
    Shang, Jun
    Chen, Tongwen
    IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2023, 68 (07) : 3947 - 3962
  • [10] Innovation-Based Remote State Estimation Secrecy With No Acknowledgments
    Kennedy, Justin M.
    Ford, Jason J.
    Quevedo, Daniel E.
    Dressler, Falko
    IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2024, 69 (11) : 7433 - 7448