A class of stealthy attacks on remote state estimation with intermittent observation

被引:5
|
作者
Lv, Yujiao [1 ]
Lu, Jianquan [2 ,3 ]
Liu, Yang [4 ]
Zhang, Lingzhong [5 ]
机构
[1] Southeast Univ, Sch Cyber Sci & Engn, Nanjing 210096, Peoples R China
[2] Southeast Univ, Sch Math, Nanjing 210096, Peoples R China
[3] Linyi Univ, Sch Automat & Elect Engn, Linyi 276005, Peoples R China
[4] Zhejiang Normal Univ, Sch Math Sci, Jinhua 321004, Peoples R China
[5] Changshu Inst Technol, Sch Elect Engn & Automat, Changshu 215500, Peoples R China
基金
中国国家自然科学基金;
关键词
Network attack; Cyber-physical systems; State estimation;
D O I
10.1016/j.ins.2023.118964
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Network attacks always threaten economic operations and personal privacy, which have resulted in severe and irreparable damage. Therefore, the investigation of network attacks is essential for network security. This paper concentrates on designing two stealthy attack strategies for remote state estimation with intermittent observations, where the attackers can select one of the designed stealthy attack strategies depending on their capabilities, available resources, and information. Furthermore, for real-time communication rates, a novel detector is introduced to determine if the system is compromised by attackers at each moment. Then, an algorithm for state estimation is derived under the proposed stealthy attack strategies. Furthermore, the attack parameters in the proposed attack strategies are discussed by applying linear matrix inequalities. Finally, a numerical example illustrates the effects of the detector and attack strategies.
引用
收藏
页数:11
相关论文
共 50 条
  • [21] Optimal Stealthy Linear-Attack Schedules on Remote State Estimation
    Zhang, Junhui
    Sun, Jitao
    IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2021, 69 : 2807 - 2817
  • [22] State estimation with remote sensors and intermittent transmissions
    Battistelli, G.
    Benavoli, A.
    Chisci, L.
    SYSTEMS & CONTROL LETTERS, 2012, 61 (01) : 155 - 164
  • [23] Research on Secure State Estimation and Recovery Control for CPS under Stealthy Attacks
    Yang, Biao
    Xin, Liang
    Long, Zhiqiang
    ACTUATORS, 2023, 12 (11)
  • [24] Optimal Stealthy Linear Attack on Remote State Estimation With Side Information
    Ye, Dan
    Yang, Bing
    Zhang, Tian-Yu
    IEEE SYSTEMS JOURNAL, 2022, 16 (01): : 1499 - 1507
  • [25] Clustering-based detection algorithm of remote state estimation under stealthy innovation-based attacks with historical data
    Chen, Shan
    Ni, Yuqing
    Huang, Lingying
    Luan, Xiaoli
    Liu, Fei
    NEUROCOMPUTING, 2025, 616
  • [26] Optimal stealthy switching location attacks against remote estimation in cyber-physical systems
    Li Y.-G.
    Yang G.-H.
    Neurocomputing, 2021, 421 : 183 - 194
  • [27] Optimal stealthy switching location attacks against remote estimation in cyber-physical systems
    Li, Yi-Gang
    Yang, Guang-Hong
    NEUROCOMPUTING, 2021, 421 : 183 - 194
  • [28] Hybrid Stealthy Attacks on Stochastic Event-Based Remote Estimation Under Packet Dropouts
    Lian, Zhi
    Shi, Peng
    Lim, Chee Peng
    Rudas, Imre J.
    Agarwal, Ramesh K.
    IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2024, 11 (06): : 5829 - 5838
  • [29] Worst-Case Stealthy Attacks on Stochastic Event-Based State Estimation
    Shang, Jun
    Yu, Hao
    Chen, Tongwen
    IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2022, 67 (04) : 2052 - 2059
  • [30] Joint interval estimation of state and fault for networked control systems under stealthy attacks
    Li J.
    Jiang S.
    Pan F.
    Kongzhi yu Juece/Control and Decision, 2023, 38 (12): : 3418 - 3426