Optimal innovation-based attacks against remote state estimation with side information and historical data

被引:0
|
作者
Shan, Hua-Sheng [1 ]
Li, Yi-Gang [1 ]
An, Liwei [2 ]
机构
[1] Shenyang Univ Technol, Sch Artificial Intelligence, Shenyang 110870, Peoples R China
[2] Northeastern Univ, Coll Informat Sci & Engn, Shenyang, Peoples R China
基金
中国国家自然科学基金;
关键词
Cyber-physical systems; remote state estimation; false data injection attacks; Kullback-Leibler divergence; historical data; side information; DATA-INJECTION ATTACKS; CONTROL-SYSTEMS; INTEGRITY ATTACKS; SECURITY;
D O I
10.1080/00207721.2024.2395931
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This work investigates the attack strategy design problem of the false data injection attack against the cyber-physical system. Distinct from the relevant results which utilise the current intercepted data or additionally consider side information, a more universal attack model is proposed which combines historical data and side information with the current intercepted data to synergistically deteriorate the system estimation performance. In order to quantify the impact resulting from the proposed attack strategy, the optimisation objective is characterised by deriving the error covariance matrix under the attacks, which becomes more intricate since the proposed attack model introduces more decision variables and coupled terms. Take the stealthiness which is characterised by Kullback-Leibler divergence as the constraints, the problem investigated in this work is equivalently transformed into the constrained multi-variable non-convex optimisation problems, which are not able to be solved directly by the methods in the relevant results. By utilising the Lagrange multiplier method, the structural characteristic of the optimal mean and the optimal covariance which only related to the Lagrange multiplier are derived, such that the optimal distribution of the modified innovation is able to be obtained by a simple search procedure. Following that, the design of the optimal attack strategy is completed by using semi-definite programming to derive the optimal attack matrices. Finally, the simulation examples are given such that the validity of the results is verified.
引用
收藏
页码:544 / 560
页数:17
相关论文
共 50 条
  • [21] Event-Based Optimal Stealthy False Data-Injection Attacks Against Remote State Estimation Systems
    Guo, Haibin
    Sun, Jian
    Pang, Zhong-Hua
    Liu, Guo-Ping
    IEEE TRANSACTIONS ON CYBERNETICS, 2023, 53 (10) : 6714 - 6724
  • [22] Worst-case stealthy innovation-based linear attack on remote state estimation
    Guo, Ziyang
    Shi, Dawei
    Johansson, Karl Henrik
    Shi, Ling
    AUTOMATICA, 2018, 89 : 117 - 124
  • [23] Optimal Stealthy Linear Attack on Remote State Estimation With Side Information
    Ye, Dan
    Yang, Bing
    Zhang, Tian-Yu
    IEEE SYSTEMS JOURNAL, 2022, 16 (01): : 1499 - 1507
  • [24] Innovation-based stealthy attack against distributed state estimation over sensor networks
    Niu, Mengfei
    Wen, Guanghui
    Lv, Yuezu
    Chen, Guanrong
    AUTOMATICA, 2023, 152
  • [25] Measurement-Based Optimal Stealthy Attacks on Remote State Estimation
    Li, Pengyu
    Ye, Dan
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 17 : 3365 - 3374
  • [26] Optimal acknowledgment signal attacks against remote estimation
    Yi, Guangmo
    Sun, Hui
    Yang, Yake
    JOURNAL OF THE FRANKLIN INSTITUTE-ENGINEERING AND APPLIED MATHEMATICS, 2023, 360 (13): : 9844 - 9862
  • [27] Optimal deception attacks against remote state estimation in cyber-physical systems
    Li, Yi-Gang
    Yang, Guang-Hong
    JOURNAL OF THE FRANKLIN INSTITUTE-ENGINEERING AND APPLIED MATHEMATICS, 2020, 357 (03): : 1832 - 1852
  • [28] Optimal Innovation-Based Stealthy Attacks in Networked LQG Systems With Attack Cost
    Jin, Kaijing
    Ye, Dan
    IEEE TRANSACTIONS ON CYBERNETICS, 2024, 54 (02) : 787 - 796
  • [29] Optimal DoS Attacks on Remote State Estimation with a Router
    Wang, Jiazheng
    Shi, Ling
    2018 IEEE CONFERENCE ON DECISION AND CONTROL (CDC), 2018, : 6384 - 6389
  • [30] Worst-case Analysis of Innovation-based Linear Attack on Remote State Estimation with Resource Constraint
    Guo, Ziyang
    Shi, Dawei
    Johansson, Karl Henrik
    Shi, Ling
    2016 IEEE 55TH CONFERENCE ON DECISION AND CONTROL (CDC), 2016, : 6303 - 6308