On scheduling of deception attacks for discrete-time networked systems equipped with attack detectors

被引:81
|
作者
Ding, Derui [1 ]
Wei, Guoliang [1 ]
Zhang, Sunjie [1 ]
Liu, Yurong [2 ,3 ]
Alsaadi, Fuad E. [3 ]
机构
[1] Univ Shanghai Sci & Technol, Dept Control Sci & Engn, Shanghai Key Lab Modern Opt Syst, Shanghai 200093, Peoples R China
[2] Yangzhou Univ, Dept Math, Yangzhou 225002, Jiangsu, Peoples R China
[3] King Abdulaziz Univ, Fac Engn, CSN Res Grp, Jeddah 21589, Saudi Arabia
基金
中国博士后科学基金; 中国国家自然科学基金;
关键词
Deception attack design; Consecutive attacks; Randomly launched deception attacks; The maximum number; Attack probability; RANDOMLY OCCURRING UNCERTAINTIES; DISTRIBUTED STATE ESTIMATION; MISSING MEASUREMENTS; NONLINEAR-SYSTEMS; MULTIPLICATIVE NOISES; PREDICTIVE CONTROL; SENSOR NETWORKS; PROBABILITY; DESIGN; DELAYS;
D O I
10.1016/j.neucom.2016.09.009
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper is concerned with the attack scheduling of deception attacks for discrete-time systems with attack detection. Specifically, for a class of Kalman filters with chi(2) detectors, an attacker with the given attack task needs to decide how many the maximum number is or how much the attack probability is for different kinds of attack scenarios (i.e. consecutive deception attacks or randomly launched deception attacks). Firstly, in light of the property of chi(2) distribution, the predictions of detection probabilities under attacks are calculated in mean-square sense for these two attack scenarios. Then, in terms of predicted probabilities, the deception attack schemes are designed in the framework of Kalman filtering. For the case of consecutive attacks, the maximum number of attacks is determined via recursive Riccati-like difference equations. For the case of randomly launched deception attacks, the desired attack probability is obtained by solving a Riccati-like equation. Finally, a numerical example on target tracking is presented to demonstrate the effectiveness of the proposed suboptimal attack schemes. (C) 2016 Elsevier B.V. All rights reserved.
引用
收藏
页码:99 / 106
页数:8
相关论文
共 50 条
  • [41] Filter design for a class of singular discrete-time Markovian jump systems with randomly occurring sensor saturation and deception attacks
    Zhao, Junjie
    Li, Bo
    2022 41ST CHINESE CONTROL CONFERENCE (CCC), 2022, : 1230 - 1237
  • [42] Networked Realization of Discrete-Time Controllers
    Miao, Fei
    Pajic, Miroslav
    Mangharam, Rahul
    Pappas, George J.
    2013 AMERICAN CONTROL CONFERENCE (ACC), 2013, : 2996 - 3001
  • [43] Time-Domain Smith Predictor in Discrete-time Networked Control Systems
    Zhang, Hui
    Chang, Yuan
    Wang, Junmin
    Shi, Yang
    2014 11TH WORLD CONGRESS ON INTELLIGENT CONTROL AND AUTOMATION (WCICA), 2014, : 1089 - 1094
  • [44] Protocol-Based Control for Discrete-Time Positive Markovian Switching Models With Deception Attacks
    Qi, Wenhai
    Yi, Yanjing
    Park, Ju H.
    Yan, Huaicheng
    Cheng, Jun
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-EXPRESS BRIEFS, 2023, 70 (04) : 1485 - 1489
  • [45] Resilient Consensus of Discrete-Time Complex Cyber-Physical Networks Under Deception Attacks
    Fu, Weiming
    Qin, Jiahu
    Shi, Yang
    Zheng, Wei Xing
    Kang, Yu
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2020, 16 (07) : 4868 - 4877
  • [46] Dynamic event-triggered predictive control for DoS attacks-based discrete-time networked linear systems
    Yu, Yang
    Ding, Sanbo
    TRANSACTIONS OF THE INSTITUTE OF MEASUREMENT AND CONTROL, 2024, 46 (02) : 351 - 358
  • [47] Suboptimal Filtering of Networked Discrete-Time Systems with Random Observation Losses
    Gao, Shouwan
    Chen, Pengpeng
    MATHEMATICAL PROBLEMS IN ENGINEERING, 2014, 2014
  • [48] Fault Detection Filter Design for Discrete-Time Networked Control Systems
    Wang, Yu-Long
    Han, Qing-Long
    Liu, Wei-Ting
    PROCEEDINGS OF THE 2012 24TH CHINESE CONTROL AND DECISION CONFERENCE (CCDC), 2012, : 2472 - 2477
  • [49] Feedback Stabilization of Discrete-Time Networked Systems Over Fading Channels
    Xiao, Nan
    Xie, Lihua
    Qiu, Li
    IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2012, 57 (09) : 2176 - 2189
  • [50] H∞ filter design for discrete-time networked systems with adaptive event-triggered mechanism and hybrid cyber attacks
    Liu, Jinliang
    Zhang, Nan
    Li, Yan
    Xie, Xiangpeng
    JOURNAL OF THE FRANKLIN INSTITUTE-ENGINEERING AND APPLIED MATHEMATICS, 2021, 358 (17): : 9325 - 9345