Design of Stealthy Attacks Against Interval Estimation for Cyber-Physical Systems DOI

Zhihui Li,

Guang‐Hong Yang

IEEE Transactions on Network Science and Engineering, Journal Year: 2023, Volume and Issue: 11(2), P. 2215 - 2222

Published: Dec. 12, 2023

This paper focuses on the design of stealthy attacks for cyber-physical systems (CPSs) with unknown but bounded process disturbances and measurement noises. To effectively address impact state estimation, interval estimation techniques are utilized. In this work, optimal attack objective that forces system out range is obtained, as adversaries do not need to require information about estimator coordinate transformation. Then, considering detection based decoupled parity equations, final sequence derived by iteratively solving linear programming problem, constraints remain at current time affect residuals afterward. Furthermore, condition existence satisfying presented. Finally, effectiveness proposed strategy verified a numerical example.

Language: Английский

Asynchronous Sliding-Mode Control for Discrete-Time Networked Hidden Stochastic Jump Systems With Cyber Attacks DOI
Wenhai Qi, Ning Zhang, Guangdeng Zong

et al.

IEEE Transactions on Cybernetics, Journal Year: 2023, Volume and Issue: 54(3), P. 1934 - 1946

Published: Aug. 21, 2023

In this study, asynchronous sliding-mode control (SMC) for discrete-time networked hidden stochastic jump systems subjected to the semi-Markov kernel (SMK) and cyber attacks is investigated. Considering statistical characteristic of SMK, which challenging acquire in engineering, study recognizes SMK be incomplete. Due mode mismatch between original system law operating process, a model proposed describe considered situation. The main aim construct an SMC mechanism based on incomplete framework under condition random denial-of-service so that resulting closed-loop can realize mean-square stability. By virtue upper bound sojourn time each mode, innovative techniques are developed stability analysis SMK. Furthermore, scheme designed achieve reachability quasi-sliding mode. Finally, effectiveness verified using electronic throttle model.

Language: Английский

Citations

31

Analysis of Stealthy False Data Injection Attacks Against Networked Control Systems: Three Case Studies DOI
Zhong‐Hua Pang, Yuan Fu, Haibin Guo

et al.

Journal of Systems Science and Complexity, Journal Year: 2023, Volume and Issue: 36(4), P. 1407 - 1422

Published: April 2, 2023

Language: Английский

Citations

30

Residual-Based False Data Injection Attacks Against Multi-Sensor Estimation Systems DOI
Haibin Guo, Jian Sun, Zhong‐Hua Pang

et al.

IEEE/CAA Journal of Automatica Sinica, Journal Year: 2023, Volume and Issue: 10(5), P. 1181 - 1191

Published: May 1, 2023

This paper investigates the security issue of multi-sensor remote estimation systems. An optimal stealthy false data injection (FDI) attack scheme based on historical and current residuals, which only tampers with measurement residuals partial sensors due to limited resources, is proposed maximally degrade system performance. The stealthiness condition given, then error covariance in compromised state derived quantify performance under attack. strategy obtained by solving several convex optimization problems maximize trace subject condition. Moreover, constraint selection principle attacked sensor provided determine so as hold most impact Finally, simulation results are presented verify theoretical analysis.

Language: Английский

Citations

22

Cybersecurity Landscape on Remote State Estimation: A Comprehensive Review DOI
Jing Zhou, Jun Shang, Tongwen Chen

et al.

IEEE/CAA Journal of Automatica Sinica, Journal Year: 2024, Volume and Issue: 11(4), P. 851 - 865

Published: March 18, 2024

Cyber-physical systems (CPSs) have emerged as an essential area of research in the last decade, providing a new paradigm for integration computational and physical units modern control systems. Remote state estimation (RSE) is indispensable functional module CPSs. Recently, it has been demonstrated that malicious agents can manipulate data packets transmitted through unreliable channels RSE, leading to severe performance degradation. This paper aims present overview recent advances cyber-attacks defensive countermeasures, with specific focus on integrity attacks against RSE. Firstly, two representative frameworks synthesis optimal deception various metrics stealthiness constraints are discussed, which provide deeper insight into vulnerabilities Secondly, detailed review typical attack detection resilient algorithms included, illustrating latest measures safeguarding RSE from adversaries. Thirdly, some prevalent impairing confidentiality availability examined both attackers' defenders' perspectives. Finally, several challenges open problems presented inspire further exploration future this field.

Language: Английский

Citations

7

Optimal strictly stealthy attacks in cyber-physical systems with multiple channels under the energy constraint DOI

Sheng‐Sheng Dong,

Yigang Li, Liwei An

et al.

International Journal of Systems Science, Journal Year: 2023, Volume and Issue: 54(13), P. 2608 - 2625

Published: Aug. 18, 2023

AbstractThis work considers an innovation-based attack policy in cyber-physical systems with multiple channels. The linear deception only allows the partial channels to be compromised at each step due energy constraint Compared existing results single channel, matrices and positions are time-varying this work. For multi-channel under constraint, is designed determine optimal locations degrade estimation performance of system most extent. Then, it proved that achieving equivalent solving a limited optimisation problem 0–1 programming problem, respectively. Furthermore, simulated examples presented illustrate developed results.Keywords: Cyber-physical (CPSs)strictly stealthy attacksmultiple channelsenergy constraintremote state estimationKalman filters Disclosure statementNo potential conflict interest was reported by author(s).Data availability statementThe authors confirm data supporting findings study available within article its supplementary materials.Additional informationFundingThis supported part Funds National Natural Science Foundation China [grant number 62103089], Liaoning province 2022-BS-178].Notes on contributorsSheng-Sheng DongSheng-Sheng Dong received B.S. degree automation from University Technology Liaoning, Anshan, China, 2021. He currently pursuing M.S. control theory engineering Shenyang Technology, Shenyang, China. current research interests focus security systems.Yi-Gang LiYi-Gang Li born 1992. Northeastern University, 2014, 2017 Ph.D. From September 2021 until now, he joined School Artificial Intelligence, as lecturer. His include CPSs security, attacks design remote estimation.Liwei AnLiwei An degrees Mathematics, Navigation, Guidance Control 2016 2020, Postdoctoral Research Fellow College Information Engineering, adaptive control, distributed optimisation, unmanned privacy systems. honorable mention Guan Zhao-Zhi Best Paper Award 39th Chinese Conference 2020.

Language: Английский

Citations

12

Remote State Estimation Under DoS Attacks in CPSs With Arbitrary Tree Topology: A Bayesian Stackelberg Game Approach DOI
Yuhan Wang, Wei Xing, Junfeng Zhang

et al.

IEEE Transactions on Signal and Information Processing over Networks, Journal Year: 2024, Volume and Issue: 10, P. 527 - 538

Published: Jan. 1, 2024

remote state estimation for an arbitrary tree topology in cyber-physical systems (CPSs) subject to Denial-of-Service (DoS) attacks. A sensor transmits its local the root node of tree, and optimal child nodes until leaf are reached. In meanwhile, a malicious attacker can jam all communication channels strategically connected attacked node. With energy constraints mind, both defender adopt strategies that involve allocating determine which protect or attack at each time step. Bayesian Stackelberg game (BSG) framework with incomplete information is implemented, where has no access available exactly except probability distribution. addition, Markov decision process (MDP) Q-learning algorithm presented obtain equilibrium (SE) policy over finite horizon. Finally, numerical example provided demonstrate our main results.

Language: Английский

Citations

4

Optimal Non-strict Stealthy Attacks With Utilization of Side Information and Maximum Integration of Historical Data in Cyber-physical Systems DOI

Hua-Sheng Shan,

Yi-Gang Li,

Ping Sun

et al.

International Journal of Control Automation and Systems, Journal Year: 2025, Volume and Issue: 23(4), P. 1118 - 1128

Published: April 12, 2025

Language: Английский

Citations

0

Analysis of Replay Attacks With Countermeasure for State Estimation of Cyber-Physical Systems DOI
Haibin Guo, Jian Sun, Zhong‐Hua Pang

et al.

IEEE Transactions on Circuits & Systems II Express Briefs, Journal Year: 2023, Volume and Issue: 71(1), P. 206 - 210

Published: Aug. 4, 2023

This paper studies the security issue of remote state estimation cyber-physical systems under replay attacks, where measurement residual is computed in smart sensors and then transmitted to a estimator. Firstly, compromised error covariance derived analyze effect attacks on system performance. Next, estimate based coding detection scheme proposed, which utilizes information encode decode residual. Compared with existing works, developed only uses information, not introduces extra information. Furthermore, design principle matrix deduced for sake being able assist residual-based detector successfully expose such attacks. Finally, simulation results are provided verify performance effectiveness scheme.

Language: Английский

Citations

7

Optimal Stealthy Attacks With Energy Constraint Against Remote State Estimation DOI
Xuan Liu, Guang‐Hong Yang

IEEE Transactions on Cybernetics, Journal Year: 2023, Volume and Issue: 54(6), P. 3577 - 3587

Published: Sept. 28, 2023

This article investigates the problem of energy-constrained stealthy attack strategy against remote state estimation for cyber-physical systems. Taking into account energy constraint, malicious attacker is required to schedule off-line generated signals modify transmitted data with limited times over a finite-time horizon under stealthiness condition, which makes design more complex. Different from schedules are studied on basis prescribed in existing results, presented framework collaborative deteriorate performance largest extent, yet leads coupling between and signals. To overcome difficulty without sacrificing optimality, solved two steps. First, analyze given derive optimal Then, obtained by efficiently solving nonlinear 0–1 programming based algorithm reducing search space designed eliminate part nonoptimal solutions. demonstrate theoretical simulation example provided.

Language: Английский

Citations

7

Side Information-Based Stealthy False Data Injection Attacks Against Multi-Sensor Remote Estimation DOI Open Access
Haibin Guo, Zhong‐Hua Pang, Li Chao

et al.

IEEE/CAA Journal of Automatica Sinica, Journal Year: 2024, Volume and Issue: 11(4), P. 1054 - 1056

Published: March 18, 2024

Dear Editor, This letter investigates a novel stealthy false data injection (FDI) attack scheme based on side information to deteriorate the multi-sensor estimation performance of cyber-physical systems (CPSs). Compared with most existing works depending full system knowledge, this is only related attackers' sensor and physical process model. The design principle signal derived diverge performance. Next, it proven that proposed can successfully bypass residual-based detector. Finally, all theoretical results are verified by numerical simulation.

Language: Английский

Citations

2