On scheduling of deception attacks for discrete-time networked systems equipped with attack detectors

被引:81
|
作者
Ding, Derui [1 ]
Wei, Guoliang [1 ]
Zhang, Sunjie [1 ]
Liu, Yurong [2 ,3 ]
Alsaadi, Fuad E. [3 ]
机构
[1] Univ Shanghai Sci & Technol, Dept Control Sci & Engn, Shanghai Key Lab Modern Opt Syst, Shanghai 200093, Peoples R China
[2] Yangzhou Univ, Dept Math, Yangzhou 225002, Jiangsu, Peoples R China
[3] King Abdulaziz Univ, Fac Engn, CSN Res Grp, Jeddah 21589, Saudi Arabia
基金
中国博士后科学基金; 中国国家自然科学基金;
关键词
Deception attack design; Consecutive attacks; Randomly launched deception attacks; The maximum number; Attack probability; RANDOMLY OCCURRING UNCERTAINTIES; DISTRIBUTED STATE ESTIMATION; MISSING MEASUREMENTS; NONLINEAR-SYSTEMS; MULTIPLICATIVE NOISES; PREDICTIVE CONTROL; SENSOR NETWORKS; PROBABILITY; DESIGN; DELAYS;
D O I
10.1016/j.neucom.2016.09.009
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper is concerned with the attack scheduling of deception attacks for discrete-time systems with attack detection. Specifically, for a class of Kalman filters with chi(2) detectors, an attacker with the given attack task needs to decide how many the maximum number is or how much the attack probability is for different kinds of attack scenarios (i.e. consecutive deception attacks or randomly launched deception attacks). Firstly, in light of the property of chi(2) distribution, the predictions of detection probabilities under attacks are calculated in mean-square sense for these two attack scenarios. Then, in terms of predicted probabilities, the deception attack schemes are designed in the framework of Kalman filtering. For the case of consecutive attacks, the maximum number of attacks is determined via recursive Riccati-like difference equations. For the case of randomly launched deception attacks, the desired attack probability is obtained by solving a Riccati-like equation. Finally, a numerical example on target tracking is presented to demonstrate the effectiveness of the proposed suboptimal attack schemes. (C) 2016 Elsevier B.V. All rights reserved.
引用
收藏
页码:99 / 106
页数:8
相关论文
共 50 条
  • [31] Output Feedback Control of Discrete-Time Systems in Networked Environments
    Peng, Chen
    Tian, Yu-Chu
    Yue, Dong
    IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART A-SYSTEMS AND HUMANS, 2011, 41 (01): : 185 - 190
  • [32] Stabilization of Discrete-time Networked Control Systems with Nonlinear Perturbation
    Zhou Lei
    Zhang Zhenjuan
    Lu Guoping
    Xiao Xiaoqing
    PROCEEDINGS OF THE 27TH CHINESE CONTROL CONFERENCE, VOL 2, 2008, : 266 - +
  • [33] Detecting and Isolating Attacks of Deception in Networked Control Systems
    Kiriakidis, Kiriakos
    Severson, Tracie
    Connett, Brian
    2016 IEEE INTERNATIONAL CONFERENCE ON AUTONOMIC COMPUTING (ICAC), 2016, : 269 - 274
  • [34] Discrete-Time Reset Control Applied to Networked Control Systems
    Banos, Alfonso
    Perez, Felix
    Cervera, Joaquin
    IECON: 2009 35TH ANNUAL CONFERENCE OF IEEE INDUSTRIAL ELECTRONICS, VOLS 1-6, 2009, : 2825 - +
  • [35] Robust stabilisation control for discrete-time networked control systems
    Wu, Dongxiao
    Wu, Jun
    Chen, Sheng
    INTERNATIONAL JOURNAL OF CONTROL, 2010, 83 (09) : 1885 - 1894
  • [36] Recovery after Attacks of Deception on Networked Control Systems
    Rodriguez-Seda, Erick J.
    Severson, Trade
    Kiriakidis, Kiriakos
    2016 RESILIENCE WEEK (RWS), 2016, : 109 - 114
  • [37] Optimal deception attacks on remote state estimators equipped with interval anomaly detectors
    Zhou, Jing
    Shang, Jun
    Chen, Tongwen
    AUTOMATICA, 2023, 148
  • [38] Asynchronous Sliding-Mode Control for Discrete-Time Networked Hidden Stochastic Jump Systems With Cyber Attacks
    Qi, Wenhai
    Zhang, Ning
    Zong, Guangdeng
    Su, Shun-Feng
    Cao, Jinde
    Cheng, Jun
    IEEE TRANSACTIONS ON CYBERNETICS, 2024, 54 (03) : 1934 - 1946
  • [39] Optimal scheduling of discrete-time switched linear systems
    Xu, Wei
    Feng, Zhi Guo
    Lin, Gui-Hua
    Yu, Liying
    IMA JOURNAL OF MATHEMATICAL CONTROL AND INFORMATION, 2020, 37 (01) : 1 - 18
  • [40] Security-guaranteed filtering for discrete-time stochastic delayed systems with randomly occurring sensor saturations and deception attacks
    Wang, Dong
    Wang, Zidong
    Shen, Bo
    Alsaadi, Fuad E.
    INTERNATIONAL JOURNAL OF ROBUST AND NONLINEAR CONTROL, 2017, 27 (07) : 1194 - 1208