Design of Stealthy Attacks Against Interval Estimation for Cyber-Physical Systems DOI

Zhihui Li,

Guang‐Hong Yang

IEEE Transactions on Network Science and Engineering, Journal Year: 2023, Volume and Issue: 11(2), P. 2215 - 2222

Published: Dec. 12, 2023

This paper focuses on the design of stealthy attacks for cyber-physical systems (CPSs) with unknown but bounded process disturbances and measurement noises. To effectively address impact state estimation, interval estimation techniques are utilized. In this work, optimal attack objective that forces system out range is obtained, as adversaries do not need to require information about estimator coordinate transformation. Then, considering detection based decoupled parity equations, final sequence derived by iteratively solving linear programming problem, constraints remain at current time affect residuals afterward. Furthermore, condition existence satisfying presented. Finally, effectiveness proposed strategy verified a numerical example.

Language: Английский

Decentralized switching-type adaptive event-triggered-based non-recursive control for interconnected cyber-physical systems against multiple cyber attacks DOI
Haibin Sun,

Yahui Cui,

Linlin Hou

et al.

IEEE Transactions on Industrial Cyber-Physical Systems, Journal Year: 2024, Volume and Issue: 2, P. 350 - 361

Published: Jan. 1, 2024

Language: Английский

Citations

2

Secure defense control for memristive recurrent neural networks under denial-of-service attacks with quantized sampled-data signals DOI
Di Dong, Ruimei Zhang,

Yunjia Cheng

et al.

Neural Computing and Applications, Journal Year: 2024, Volume and Issue: 36(11), P. 6147 - 6163

Published: Jan. 19, 2024

Language: Английский

Citations

1

An Optimal Attack Strategy Based on Adversary-Modified Historical Innovations DOI
Haoran Wang, Yuwei Ren, Yixian Fang

et al.

IEEE Internet of Things Journal, Journal Year: 2024, Volume and Issue: 11(20), P. 33337 - 33345

Published: July 10, 2024

This paper primarily explores the challenge of stealthy innovation-based attacks within cyber–physical systems. An optimal covert false data injection attack strategy is proposed, which involves modifying historical and current system innovations by adversary. The approach differs from existing ones in that it combines innovation results. Utilizing less prior knowledge to obtain made adversary previous time step integrating them with innovations, a more generalized devised, leading further performance enhancement estimation. Through design an strategy, aims ensure stealthiness while maximizing remote state estimation error covariance system. Subsequently, formulated as convex optimization problem achieve maximum error. Finally, two simulation examples, integrated real-world systems, were utilized validate theoretical

Language: Английский

Citations

1

A new bi-level model for the false data injection attack on real-time electricity market considering uncertainties DOI
Ali Farahani, Hamed Delkhosh, Hossein Seifi

et al.

Computers & Electrical Engineering, Journal Year: 2024, Volume and Issue: 118, P. 109468 - 109468

Published: July 17, 2024

Language: Английский

Citations

1

Stealthy False Data Injection Attacks against the Summation Detector in Cyber-Physical Systems DOI
Yifa Liu, Long Cheng, Dan Ye

et al.

IEEE Transactions on Industrial Cyber-Physical Systems, Journal Year: 2024, Volume and Issue: 2, P. 391 - 403

Published: Jan. 1, 2024

Language: Английский

Citations

1

Prescribed performance‐based resilient model‐free adaptive control for CPSs against aperiodic DoS attacks DOI
S.Q. Sun, Yuan‐Xin Li, Zhongsheng Hou

et al.

International Journal of Robust and Nonlinear Control, Journal Year: 2023, Volume and Issue: 34(5), P. 3335 - 3350

Published: Dec. 18, 2023

Abstract This paper presents a prescribed performance‐based model‐free adaptive resilient control (MFARC) algorithm to address the realization of trajectory tracking for nonlinear cyber‐physical systems (CPSs) under aperiodic denial‐of‐service (DoS) attacks. Firstly, an equivalent linear model is constructed by utilizing dynamic linearization technique, and novel output transformation approach applied convert constrained system unconstrained one MFARC framework. Then, attack compensation mechanism presented estimate unavailable signal when attacks are active, such that negative impact DoS can be compensated. Based on mechanism, strategy steer error predetermined neighborhood around origin in presence A major improvement our result over previous studies introduction performance (PPC) into while reasonably restricting transient steady‐state even occur. Additionally, we utilize matrix inequality (LMI) toolbox obtain better suitably adjusting time‐varying parameters, which superior practical applications. Ultimately, results indicate consistently remains within predefined bound.

Language: Английский

Citations

2

Robust corrective control against fundamental and non-fundamental mode attacks with application to an asynchronous digital system DOI
Jung‐Min Yang,

Seong Woo Kwak

Information Sciences, Journal Year: 2024, Volume and Issue: 661, P. 120145 - 120145

Published: Jan. 18, 2024

Language: Английский

Citations

0

Secure state estimation with disturbance rejection against switched sparse sensor attacks DOI
Qingdong Sun, Guang‐Hong Yang, Georgi M. Dimirovski

et al.

Information Sciences, Journal Year: 2024, Volume and Issue: 675, P. 120709 - 120709

Published: May 14, 2024

Language: Английский

Citations

0

Optimal stealthy deception attack strategy under energy constraints DOI
Xin Chen, Lianghong Peng,

Y. G. Yi

et al.

Communications in Nonlinear Science and Numerical Simulation, Journal Year: 2024, Volume and Issue: unknown, P. 108423 - 108423

Published: Nov. 1, 2024

Language: Английский

Citations

0

Optimal Stealthy Attack With Side Information Against Remote State Estimation: A Corrupted Innovation-Based Strategy DOI
L.Y. Mao, Guang‐Hong Yang

IEEE Transactions on Cybernetics, Journal Year: 2024, Volume and Issue: 55(2), P. 897 - 904

Published: Dec. 3, 2024

This article studies the problem of designing optimal strictly stealthy attack against remote state estimation in cyber-physical systems, where attacker possesses both intercepted information and side sensed by an additional sensor. Combining with information, a novel corrupted innovation-based model higher-design flexibility is proposed, analytical strategy derived. Compared existing results based on nominal innovation, proposed eliminates need for filter to calculate which saves computational resources, can achieve greater performance degradation estimation. Finally, order verify superiority effectiveness results, numerical examples are given.

Language: Английский

Citations

0