On scheduling of deception attacks for discrete-time networked systems equipped with attack detectors

被引:81
|
作者
Ding, Derui [1 ]
Wei, Guoliang [1 ]
Zhang, Sunjie [1 ]
Liu, Yurong [2 ,3 ]
Alsaadi, Fuad E. [3 ]
机构
[1] Univ Shanghai Sci & Technol, Dept Control Sci & Engn, Shanghai Key Lab Modern Opt Syst, Shanghai 200093, Peoples R China
[2] Yangzhou Univ, Dept Math, Yangzhou 225002, Jiangsu, Peoples R China
[3] King Abdulaziz Univ, Fac Engn, CSN Res Grp, Jeddah 21589, Saudi Arabia
基金
中国博士后科学基金; 中国国家自然科学基金;
关键词
Deception attack design; Consecutive attacks; Randomly launched deception attacks; The maximum number; Attack probability; RANDOMLY OCCURRING UNCERTAINTIES; DISTRIBUTED STATE ESTIMATION; MISSING MEASUREMENTS; NONLINEAR-SYSTEMS; MULTIPLICATIVE NOISES; PREDICTIVE CONTROL; SENSOR NETWORKS; PROBABILITY; DESIGN; DELAYS;
D O I
10.1016/j.neucom.2016.09.009
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper is concerned with the attack scheduling of deception attacks for discrete-time systems with attack detection. Specifically, for a class of Kalman filters with chi(2) detectors, an attacker with the given attack task needs to decide how many the maximum number is or how much the attack probability is for different kinds of attack scenarios (i.e. consecutive deception attacks or randomly launched deception attacks). Firstly, in light of the property of chi(2) distribution, the predictions of detection probabilities under attacks are calculated in mean-square sense for these two attack scenarios. Then, in terms of predicted probabilities, the deception attack schemes are designed in the framework of Kalman filtering. For the case of consecutive attacks, the maximum number of attacks is determined via recursive Riccati-like difference equations. For the case of randomly launched deception attacks, the desired attack probability is obtained by solving a Riccati-like equation. Finally, a numerical example on target tracking is presented to demonstrate the effectiveness of the proposed suboptimal attack schemes. (C) 2016 Elsevier B.V. All rights reserved.
引用
收藏
页码:99 / 106
页数:8
相关论文
共 50 条
  • [1] Security control of networked systems with deception attacks and packet dropouts: A discrete-time approach
    Hu, Zhipei
    Deng, Feiqi
    Su, Yongkang
    Zhang, Jin
    Hu, Songlin
    JOURNAL OF THE FRANKLIN INSTITUTE-ENGINEERING AND APPLIED MATHEMATICS, 2021, 358 (16): : 8193 - 8206
  • [2] Security Control for Discrete-Time Stochastic Nonlinear Systems Subject to Deception Attacks
    Ding, Derui
    Wang, Zidong
    Han, Qing-Long
    Wei, Guoliang
    IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2018, 48 (05): : 779 - 789
  • [3] Distributed filtering for discrete-time systems with deception attacks and limited communication resource
    Guo, Hang
    Zhang, Qirui
    Liu, Kun
    Xia, Yuanqing
    2018 37TH CHINESE CONTROL CONFERENCE (CCC), 2018, : 6561 - 6566
  • [4] Discrete-time Networked Control Systems under Stochastic Scheduling Constraints
    Liu, Kim
    Pan, Xia
    Liu, Yang
    Xia, Yuanqing
    PROCEEDINGS OF THE 35TH CHINESE CONTROL CONFERENCE 2016, 2016, : 7369 - 7374
  • [5] On Scheduling Actuator Data Transmission in Discrete-Time Networked Adaptive Systems
    Dogan, K. Merve
    Yucelen, Tansel
    Muse, Jonathan A.
    2021 AMERICAN CONTROL CONFERENCE (ACC), 2021, : 1107 - 1112
  • [6] Dynamic event-triggered networked predictive control for discrete-time NCSs under deception attacks
    Wu, Zhiying
    Wang, Zhe
    Wang, Yan
    Xiong, Junlin
    Xie, Min
    INTERNATIONAL JOURNAL OF ROBUST AND NONLINEAR CONTROL, 2023, 33 (04) : 2682 - 2702
  • [7] Stability of Discrete-time Networked Control Systems under Denial of Service Attacks
    Niemoczynski, Bogdan
    Biswas, Saroj
    Kamer, James
    2016 RESILIENCE WEEK (RWS), 2016, : 119 - 124
  • [8] Iterative learning security control for discrete-time systems subject to deception and DoS attacks
    Wenjun XIONG
    Zijian LUO
    Guanghui WEN
    Tao YANG
    ScienceChina(InformationSciences), 2023, 66 (09) : 94 - 95
  • [9] Iterative learning security control for discrete-time systems subject to deception and DoS attacks
    Xiong, Wenjun
    Luo, Zijian
    Wen, Guanghui
    Yang, Tao
    SCIENCE CHINA-INFORMATION SCIENCES, 2023, 66 (09)
  • [10] Data-Driven Methods for Stealthy Attacks on TCP/IP-Based Networked Control Systems Equipped With Attack Detectors
    Wang, Jun-Sheng
    Yang, Guang-Hong
    IEEE TRANSACTIONS ON CYBERNETICS, 2019, 49 (08) : 3020 - 3031