IEEE Transactions on Network Science and Engineering,
Journal Year:
2023,
Volume and Issue:
11(2), P. 2215 - 2222
Published: Dec. 12, 2023
This
paper
focuses
on
the
design
of
stealthy
attacks
for
cyber-physical
systems
(CPSs)
with
unknown
but
bounded
process
disturbances
and
measurement
noises.
To
effectively
address
impact
state
estimation,
interval
estimation
techniques
are
utilized.
In
this
work,
optimal
attack
objective
that
forces
system
out
range
is
obtained,
as
adversaries
do
not
need
to
require
information
about
estimator
coordinate
transformation.
Then,
considering
detection
based
decoupled
parity
equations,
final
sequence
derived
by
iteratively
solving
linear
programming
problem,
constraints
remain
at
current
time
affect
residuals
afterward.
Furthermore,
condition
existence
satisfying
presented.
Finally,
effectiveness
proposed
strategy
verified
a
numerical
example.
IEEE Transactions on Cybernetics,
Journal Year:
2023,
Volume and Issue:
54(3), P. 1934 - 1946
Published: Aug. 21, 2023
In
this
study,
asynchronous
sliding-mode
control
(SMC)
for
discrete-time
networked
hidden
stochastic
jump
systems
subjected
to
the
semi-Markov
kernel
(SMK)
and
cyber
attacks
is
investigated.
Considering
statistical
characteristic
of
SMK,
which
challenging
acquire
in
engineering,
study
recognizes
SMK
be
incomplete.
Due
mode
mismatch
between
original
system
law
operating
process,
a
model
proposed
describe
considered
situation.
The
main
aim
construct
an
SMC
mechanism
based
on
incomplete
framework
under
condition
random
denial-of-service
so
that
resulting
closed-loop
can
realize
mean-square
stability.
By
virtue
upper
bound
sojourn
time
each
mode,
innovative
techniques
are
developed
stability
analysis
SMK.
Furthermore,
scheme
designed
achieve
reachability
quasi-sliding
mode.
Finally,
effectiveness
verified
using
electronic
throttle
model.
IEEE/CAA Journal of Automatica Sinica,
Journal Year:
2023,
Volume and Issue:
10(5), P. 1181 - 1191
Published: May 1, 2023
This
paper
investigates
the
security
issue
of
multi-sensor
remote
estimation
systems.
An
optimal
stealthy
false
data
injection
(FDI)
attack
scheme
based
on
historical
and
current
residuals,
which
only
tampers
with
measurement
residuals
partial
sensors
due
to
limited
resources,
is
proposed
maximally
degrade
system
performance.
The
stealthiness
condition
given,
then
error
covariance
in
compromised
state
derived
quantify
performance
under
attack.
strategy
obtained
by
solving
several
convex
optimization
problems
maximize
trace
subject
condition.
Moreover,
constraint
selection
principle
attacked
sensor
provided
determine
so
as
hold
most
impact
Finally,
simulation
results
are
presented
verify
theoretical
analysis.
IEEE/CAA Journal of Automatica Sinica,
Journal Year:
2024,
Volume and Issue:
11(4), P. 851 - 865
Published: March 18, 2024
Cyber-physical
systems
(CPSs)
have
emerged
as
an
essential
area
of
research
in
the
last
decade,
providing
a
new
paradigm
for
integration
computational
and
physical
units
modern
control
systems.
Remote
state
estimation
(RSE)
is
indispensable
functional
module
CPSs.
Recently,
it
has
been
demonstrated
that
malicious
agents
can
manipulate
data
packets
transmitted
through
unreliable
channels
RSE,
leading
to
severe
performance
degradation.
This
paper
aims
present
overview
recent
advances
cyber-attacks
defensive
countermeasures,
with
specific
focus
on
integrity
attacks
against
RSE.
Firstly,
two
representative
frameworks
synthesis
optimal
deception
various
metrics
stealthiness
constraints
are
discussed,
which
provide
deeper
insight
into
vulnerabilities
Secondly,
detailed
review
typical
attack
detection
resilient
algorithms
included,
illustrating
latest
measures
safeguarding
RSE
from
adversaries.
Thirdly,
some
prevalent
impairing
confidentiality
availability
examined
both
attackers'
defenders'
perspectives.
Finally,
several
challenges
open
problems
presented
inspire
further
exploration
future
this
field.
International Journal of Systems Science,
Journal Year:
2023,
Volume and Issue:
54(13), P. 2608 - 2625
Published: Aug. 18, 2023
AbstractThis
work
considers
an
innovation-based
attack
policy
in
cyber-physical
systems
with
multiple
channels.
The
linear
deception
only
allows
the
partial
channels
to
be
compromised
at
each
step
due
energy
constraint
Compared
existing
results
single
channel,
matrices
and
positions
are
time-varying
this
work.
For
multi-channel
under
constraint,
is
designed
determine
optimal
locations
degrade
estimation
performance
of
system
most
extent.
Then,
it
proved
that
achieving
equivalent
solving
a
limited
optimisation
problem
0–1
programming
problem,
respectively.
Furthermore,
simulated
examples
presented
illustrate
developed
results.Keywords:
Cyber-physical
(CPSs)strictly
stealthy
attacksmultiple
channelsenergy
constraintremote
state
estimationKalman
filters
Disclosure
statementNo
potential
conflict
interest
was
reported
by
author(s).Data
availability
statementThe
authors
confirm
data
supporting
findings
study
available
within
article
its
supplementary
materials.Additional
informationFundingThis
supported
part
Funds
National
Natural
Science
Foundation
China
[grant
number
62103089],
Liaoning
province
2022-BS-178].Notes
on
contributorsSheng-Sheng
DongSheng-Sheng
Dong
received
B.S.
degree
automation
from
University
Technology
Liaoning,
Anshan,
China,
2021.
He
currently
pursuing
M.S.
control
theory
engineering
Shenyang
Technology,
Shenyang,
China.
current
research
interests
focus
security
systems.Yi-Gang
LiYi-Gang
Li
born
1992.
Northeastern
University,
2014,
2017
Ph.D.
From
September
2021
until
now,
he
joined
School
Artificial
Intelligence,
as
lecturer.
His
include
CPSs
security,
attacks
design
remote
estimation.Liwei
AnLiwei
An
degrees
Mathematics,
Navigation,
Guidance
Control
2016
2020,
Postdoctoral
Research
Fellow
College
Information
Engineering,
adaptive
control,
distributed
optimisation,
unmanned
privacy
systems.
honorable
mention
Guan
Zhao-Zhi
Best
Paper
Award
39th
Chinese
Conference
2020.
IEEE Transactions on Signal and Information Processing over Networks,
Journal Year:
2024,
Volume and Issue:
10, P. 527 - 538
Published: Jan. 1, 2024
remote
state
estimation
for
an
arbitrary
tree
topology
in
cyber-physical
systems
(CPSs)
subject
to
Denial-of-Service
(DoS)
attacks.
A
sensor
transmits
its
local
the
root
node
of
tree,
and
optimal
child
nodes
until
leaf
are
reached.
In
meanwhile,
a
malicious
attacker
can
jam
all
communication
channels
strategically
connected
attacked
node.
With
energy
constraints
mind,
both
defender
adopt
strategies
that
involve
allocating
determine
which
protect
or
attack
at
each
time
step.
Bayesian
Stackelberg
game
(BSG)
framework
with
incomplete
information
is
implemented,
where
has
no
access
available
exactly
except
probability
distribution.
addition,
Markov
decision
process
(MDP)
Q-learning
algorithm
presented
obtain
equilibrium
(SE)
policy
over
finite
horizon.
Finally,
numerical
example
provided
demonstrate
our
main
results.
IEEE Transactions on Circuits & Systems II Express Briefs,
Journal Year:
2023,
Volume and Issue:
71(1), P. 206 - 210
Published: Aug. 4, 2023
This
paper
studies
the
security
issue
of
remote
state
estimation
cyber-physical
systems
under
replay
attacks,
where
measurement
residual
is
computed
in
smart
sensors
and
then
transmitted
to
a
estimator.
Firstly,
compromised
error
covariance
derived
analyze
effect
attacks
on
system
performance.
Next,
estimate
based
coding
detection
scheme
proposed,
which
utilizes
information
encode
decode
residual.
Compared
with
existing
works,
developed
only
uses
information,
not
introduces
extra
information.
Furthermore,
design
principle
matrix
deduced
for
sake
being
able
assist
residual-based
detector
successfully
expose
such
attacks.
Finally,
simulation
results
are
provided
verify
performance
effectiveness
scheme.
IEEE Transactions on Cybernetics,
Journal Year:
2023,
Volume and Issue:
54(6), P. 3577 - 3587
Published: Sept. 28, 2023
This
article
investigates
the
problem
of
energy-constrained
stealthy
attack
strategy
against
remote
state
estimation
for
cyber-physical
systems.
Taking
into
account
energy
constraint,
malicious
attacker
is
required
to
schedule
off-line
generated
signals
modify
transmitted
data
with
limited
times
over
a
finite-time
horizon
under
stealthiness
condition,
which
makes
design
more
complex.
Different
from
schedules
are
studied
on
basis
prescribed
in
existing
results,
presented
framework
collaborative
deteriorate
performance
largest
extent,
yet
leads
coupling
between
and
signals.
To
overcome
difficulty
without
sacrificing
optimality,
solved
two
steps.
First,
analyze
given
derive
optimal
Then,
obtained
by
efficiently
solving
nonlinear
0–1
programming
based
algorithm
reducing
search
space
designed
eliminate
part
nonoptimal
solutions.
demonstrate
theoretical
simulation
example
provided.
IEEE/CAA Journal of Automatica Sinica,
Journal Year:
2024,
Volume and Issue:
11(4), P. 1054 - 1056
Published: March 18, 2024
Dear
Editor,
This
letter
investigates
a
novel
stealthy
false
data
injection
(FDI)
attack
scheme
based
on
side
information
to
deteriorate
the
multi-sensor
estimation
performance
of
cyber-physical
systems
(CPSs).
Compared
with
most
existing
works
depending
full
system
knowledge,
this
is
only
related
attackers'
sensor
and
physical
process
model.
The
design
principle
signal
derived
diverge
performance.
Next,
it
proven
that
proposed
can
successfully
bypass
residual-based
detector.
Finally,
all
theoretical
results
are
verified
by
numerical
simulation.