{"title":"Two-channel stealthy false data injection attacks design without estimator knowledge","authors":"Haoran Wang, Yuwei Ren, Yixian Fang, Ang Liu","doi":"10.1002/asjc.3409","DOIUrl":null,"url":null,"abstract":"<p>This paper primarily focuses on designing stealthy false data injection attacks targeting two communication channels in cyber-physical systems equipped with state estimators and attack detectors. It introduces the concept of perfect attacks, rendering the attack detector unable to detect the designed attack signals, thereby enabling attackers to further destabilize the system. Through the error model designed by the attacker, the designed attack does not require knowledge of the state estimator. By injecting a carefully designed perfect attack into the communication channel, it is possible to extend the state estimation error of a residual detector system based on the Kalman filter to infinity. Moreover, this designed attack can bypass the residual-based detector, thus achieving a completely stealthy attack. Finally, the results of theoretical derivations are validated by a numerical example and a practical case.</p>","PeriodicalId":55453,"journal":{"name":"Asian Journal of Control","volume":"26 6","pages":"3314-3326"},"PeriodicalIF":2.7000,"publicationDate":"2024-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Asian Journal of Control","FirstCategoryId":"94","ListUrlMain":"https://onlinelibrary.wiley.com/doi/10.1002/asjc.3409","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"AUTOMATION & CONTROL SYSTEMS","Score":null,"Total":0}
引用次数: 0
Abstract
This paper primarily focuses on designing stealthy false data injection attacks targeting two communication channels in cyber-physical systems equipped with state estimators and attack detectors. It introduces the concept of perfect attacks, rendering the attack detector unable to detect the designed attack signals, thereby enabling attackers to further destabilize the system. Through the error model designed by the attacker, the designed attack does not require knowledge of the state estimator. By injecting a carefully designed perfect attack into the communication channel, it is possible to extend the state estimation error of a residual detector system based on the Kalman filter to infinity. Moreover, this designed attack can bypass the residual-based detector, thus achieving a completely stealthy attack. Finally, the results of theoretical derivations are validated by a numerical example and a practical case.
期刊介绍:
The Asian Journal of Control, an Asian Control Association (ACA) and Chinese Automatic Control Society (CACS) affiliated journal, is the first international journal originating from the Asia Pacific region. The Asian Journal of Control publishes papers on original theoretical and practical research and developments in the areas of control, involving all facets of control theory and its application.
Published six times a year, the Journal aims to be a key platform for control communities throughout the world.
The Journal provides a forum where control researchers and practitioners can exchange knowledge and experiences on the latest advances in the control areas, and plays an educational role for students and experienced researchers in other disciplines interested in this continually growing field. The scope of the journal is extensive.
Topics include:
The theory and design of control systems and components, encompassing:
Robust and distributed control using geometric, optimal, stochastic and nonlinear methods
Game theory and state estimation
Adaptive control, including neural networks, learning, parameter estimation
and system fault detection
Artificial intelligence, fuzzy and expert systems
Hierarchical and man-machine systems
All parts of systems engineering which consider the reliability of components and systems
Emerging application areas, such as:
Robotics
Mechatronics
Computers for computer-aided design, manufacturing, and control of
various industrial processes
Space vehicles and aircraft, ships, and traffic
Biomedical systems
National economies
Power systems
Agriculture
Natural resources.