Geometry-Based Data-Driven Complete Stealthy Attacks Against Cyber-Physical Systems

被引:0
|
作者
Wang, Kaiyu [1 ]
Ye, Dan [1 ,2 ]
机构
[1] Northeastern Univ, Coll Informat Sci & Engn, Shenyang 110819, Peoples R China
[2] Northeastern Univ, State Key Lab Synthet Automat Proc Ind, Shenyang 110819, Peoples R China
基金
中国国家自然科学基金;
关键词
State estimation; Vectors; Geometry; Detectors; Actuators; Estimation error; Simulation; Cyber-physical systems (CPSs); complete stealthy; data-driven; false data injection attack; geometry;
D O I
10.1109/TNSE.2024.3458095
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
This paper proposes a data-driven complete stealthy attack strategy against cyber-physical systems (CPSs) based on the geometric approach. The attacker aims to degrade estimation performance and maintain stealthiness by compromising partial communication links of the actuator and sensor. Different from the classic analysis methods that require accurate model parameters, we focus on how to establish the connection between geometry and data-driven approaches to represent the malicious behavior of attacks on state estimation. First of all, the existence of complete stealthy attacks is analyzed. Then, the maximal attached stealthy subspace and the set of estimation errors under complete stealthy attacks are analyzed intuitively from the geometric point of view. On this basis, the complete stealthy subspace is constructed with the subspace identification method, which is applied to generate the corresponding stealthy attack sequence through the collected system input-output data. Finally, simulation results are provided to illustrate the effectiveness of the proposed strategies.
引用
收藏
页码:5839 / 5849
页数:11
相关论文
共 50 条
  • [41] A Moving Target Defense to Detect Stealthy Attacks in Cyber-Physical Systems
    Giraldo, J.
    Cardenas, A.
    Sanfelice, R. G.
    2019 AMERICAN CONTROL CONFERENCE (ACC), 2019, : 391 - 396
  • [42] Optimal design and allocation of stealthy attacks against remote state estimation for cyber-physical systems
    Liu, Xuan
    Yang, Guang-Hong
    INFORMATION SCIENCES, 2024, 676
  • [43] On the Performance Degradation of Cyber-Physical Systems Under Stealthy Integrity Attacks
    Mo, Yilin
    Sinopoli, Bruno
    IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2016, 61 (09) : 2618 - 2624
  • [44] Data-driven anomaly detection in cyber-physical production systems
    Niggemann, Oliver
    Frey, Christian
    AT-AUTOMATISIERUNGSTECHNIK, 2015, 63 (10) : 821 - 832
  • [45] Secure Data Transmission and Trustworthiness Judgement Approaches Against Cyber-Physical Attacks in an Integrated Data-Driven Framework
    Jiang, Yuchen
    Wu, Shimeng
    Yang, Hongyan
    Luo, Hao
    Chen, Zhiwen
    Yin, Shen
    Kaynak, Okyay
    IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2022, 52 (12): : 7799 - 7809
  • [46] Optimal Stealthy Deception Attack Against Cyber-Physical Systems
    Zhang, Qirui
    Liu, Kun
    Xia, Yuanqing
    Ma, Aoyun
    IEEE TRANSACTIONS ON CYBERNETICS, 2020, 50 (09) : 3963 - 3972
  • [47] Comparison of Corrupted Sensor Data Detection Methods in Detecting Stealthy Attacks on Cyber-Physical Systems
    Sabaliauskaite, Giedre
    Ng, Geok See
    Ruths, Justin
    Mathur, Aditya
    2017 IEEE 22ND PACIFIC RIM INTERNATIONAL SYMPOSIUM ON DEPENDABLE COMPUTING (PRDC 2017), 2017, : 235 - 244
  • [48] Data-Driven Output-Feedback LQ Secure Control for Unknown Cyber-Physical Systems Against Sparse Actuator Attacks
    Shen, Xin-Yu
    Li, Xiao-Jian
    IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2021, 51 (09): : 5708 - 5720
  • [49] The Vulnerability of Cyber-Physical System Under Stealthy Attacks
    Sui, Tianju
    Mo, Yilin
    Marelli, Damian
    Sun, Ximing
    Fu, Minyue
    IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2021, 66 (02) : 637 - 650
  • [50] Adaptive integral sliding-mode control strategy of data-driven cyber-physical systems against a class of actuator attacks
    Huang, Xin
    Zhai, Ding
    Dong, Jiuxiang
    IET CONTROL THEORY AND APPLICATIONS, 2018, 12 (10): : 1440 - 1447