Optimal innovation-based attacks against remote state estimation with side information and historical data

被引:0
|
作者
Shan, Hua-Sheng [1 ]
Li, Yi-Gang [1 ]
An, Liwei [2 ]
机构
[1] Shenyang Univ Technol, Sch Artificial Intelligence, Shenyang 110870, Peoples R China
[2] Northeastern Univ, Coll Informat Sci & Engn, Shenyang, Peoples R China
基金
中国国家自然科学基金;
关键词
Cyber-physical systems; remote state estimation; false data injection attacks; Kullback-Leibler divergence; historical data; side information; DATA-INJECTION ATTACKS; CONTROL-SYSTEMS; INTEGRITY ATTACKS; SECURITY;
D O I
10.1080/00207721.2024.2395931
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This work investigates the attack strategy design problem of the false data injection attack against the cyber-physical system. Distinct from the relevant results which utilise the current intercepted data or additionally consider side information, a more universal attack model is proposed which combines historical data and side information with the current intercepted data to synergistically deteriorate the system estimation performance. In order to quantify the impact resulting from the proposed attack strategy, the optimisation objective is characterised by deriving the error covariance matrix under the attacks, which becomes more intricate since the proposed attack model introduces more decision variables and coupled terms. Take the stealthiness which is characterised by Kullback-Leibler divergence as the constraints, the problem investigated in this work is equivalently transformed into the constrained multi-variable non-convex optimisation problems, which are not able to be solved directly by the methods in the relevant results. By utilising the Lagrange multiplier method, the structural characteristic of the optimal mean and the optimal covariance which only related to the Lagrange multiplier are derived, such that the optimal distribution of the modified innovation is able to be obtained by a simple search procedure. Following that, the design of the optimal attack strategy is completed by using semi-definite programming to derive the optimal attack matrices. Finally, the simulation examples are given such that the validity of the results is verified.
引用
收藏
页码:544 / 560
页数:17
相关论文
共 50 条
  • [31] DoS Attacks on Remote State Estimation With Asymmetric Information
    Ding, Kemi
    Ren, Xiaoqiang
    Quevedo, Daniel E.
    Dey, Subhrakanti
    Shi, Ling
    IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, 2019, 6 (02): : 653 - 666
  • [32] Optimal Stealthy Attack With Side Information Under the Energy Constraint on Remote State Estimation
    Dong, Sheng-Sheng
    Li, Yi-Gang
    Chen, Li
    Zhang, Xiaoling
    INTERNATIONAL JOURNAL OF CONTROL AUTOMATION AND SYSTEMS, 2024, 22 (09) : 2723 - 2733
  • [33] False Data Attacks Against AC State Estimation With Incomplete Network Information
    Liu, Xuan
    Li, Zuyi
    IEEE TRANSACTIONS ON SMART GRID, 2017, 8 (05) : 2239 - 2248
  • [34] Transmission scheduling for privacy-optimal encryption against eavesdropping attacks on remote state estimation
    Wang, Le
    Cao, Xianghui
    Zhang, Heng
    Sun, Changyin
    Zheng, Wei Xing
    AUTOMATICA, 2022, 137
  • [35] Optimal Privacy-Preserving Transmission Schedule Against Eavesdropping Attacks on Remote State Estimation
    Zou, Jiaying
    Liu, Hanxiao
    Liu, Chun
    Ren, Xiaoqiang
    Wang, Xiaofan
    IEEE CONTROL SYSTEMS LETTERS, 2024, 8 : 538 - 543
  • [36] Optimal Deception Attacks on Remote State Estimation with Heterogeneous Vulnerabilities
    Wei, Jinyuan
    Zhou, Jing
    Chen, Tongwen
    INTELLIGENT NETWORKED THINGS, CINT 2024, PT II, 2024, 2139 : 188 - 200
  • [37] False Data Injection Attacks with Local Topology Information against Linear State Estimation
    Sun, Ying
    Li, Wen-Tai
    Song, Wentu
    Yuen, Chau
    2015 IEEE INNOVATIVE SMART GRID TECHNOLOGIES - ASIA (ISGT ASIA), 2015,
  • [38] Optimal design and allocation of stealthy attacks against remote state estimation for cyber-physical systems
    Liu, Xuan
    Yang, Guang-Hong
    INFORMATION SCIENCES, 2024, 676
  • [39] Stochastic Detector Against Linear Deception Attacks on Remote State Estimation
    Li, Yuzhe
    Chen, Tongwen
    2016 IEEE 55TH CONFERENCE ON DECISION AND CONTROL (CDC), 2016, : 6291 - 6296
  • [40] Defensive deception against reactive jamming attacks in remote state estimation
    Ding, Kemi
    Ren, Xiaoqiang
    Quevedo, Daniel E.
    Dey, Subhrakanti
    Shi, Ling
    AUTOMATICA, 2020, 113