{"title":"Optimal Stealthy Attack With Side Information Against Remote State Estimation: A Corrupted Innovation-Based Strategy","authors":"Li-Wei Mao;Guang-Hong Yang","doi":"10.1109/TCYB.2024.3502790","DOIUrl":null,"url":null,"abstract":"This article studies the problem of designing the optimal strictly stealthy attack against remote state estimation in cyber-physical systems, where the attacker possesses both the intercepted information and the side information sensed by an additional sensor. Combining the intercepted information with the side information, a novel corrupted innovation-based attack model with higher-design flexibility is proposed, and the analytical optimal attack strategy is derived. Compared with the existing results based on nominal innovation, the proposed attack model eliminates the need for an additional filter to calculate nominal innovation, which saves computational resources, and can achieve greater performance degradation of remote state estimation. Finally, in order to verify the superiority and effectiveness of the results, the numerical examples are given.","PeriodicalId":13112,"journal":{"name":"IEEE Transactions on Cybernetics","volume":"55 2","pages":"897-904"},"PeriodicalIF":9.4000,"publicationDate":"2024-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Transactions on Cybernetics","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10772658/","RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"AUTOMATION & CONTROL SYSTEMS","Score":null,"Total":0}
引用次数: 0
Abstract
This article studies the problem of designing the optimal strictly stealthy attack against remote state estimation in cyber-physical systems, where the attacker possesses both the intercepted information and the side information sensed by an additional sensor. Combining the intercepted information with the side information, a novel corrupted innovation-based attack model with higher-design flexibility is proposed, and the analytical optimal attack strategy is derived. Compared with the existing results based on nominal innovation, the proposed attack model eliminates the need for an additional filter to calculate nominal innovation, which saves computational resources, and can achieve greater performance degradation of remote state estimation. Finally, in order to verify the superiority and effectiveness of the results, the numerical examples are given.
期刊介绍:
The scope of the IEEE Transactions on Cybernetics includes computational approaches to the field of cybernetics. Specifically, the transactions welcomes papers on communication and control across machines or machine, human, and organizations. The scope includes such areas as computational intelligence, computer vision, neural networks, genetic algorithms, machine learning, fuzzy systems, cognitive systems, decision making, and robotics, to the extent that they contribute to the theme of cybernetics or demonstrate an application of cybernetics principles.