Ting-Ting Wang , Guang-Hong Yang , Georgi Marko Dimirovski
{"title":"Stealthy false data injection attack scheduling design for multi-sensor systems with resource constraints","authors":"Ting-Ting Wang , Guang-Hong Yang , Georgi Marko Dimirovski","doi":"10.1016/j.jfranklin.2024.107445","DOIUrl":null,"url":null,"abstract":"<div><div>This paper studies the optimal false data injection (FDI) attack scheduling problem for multi-sensor cyber–physical systems (CPSs), where the communication bandwidth and energy constraints are considered simultaneously. A novel event-based attack scheduling strategy is proposed to allocate the energy effectively under the bandwidth constraint. Based on which, the optimal stealthy attack parameters are presented analytically, where the remote state estimation error is maximized and the attack stealthiness is guaranteed. Compared with the existing works, the proposed attack strategy can save attack resources significantly while ensuring attack performance. Finally, the simulations are presented to verify the proposed results.</div></div>","PeriodicalId":17283,"journal":{"name":"Journal of The Franklin Institute-engineering and Applied Mathematics","volume":"362 1","pages":"Article 107445"},"PeriodicalIF":3.7000,"publicationDate":"2025-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of The Franklin Institute-engineering and Applied Mathematics","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S0016003224008664","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"AUTOMATION & CONTROL SYSTEMS","Score":null,"Total":0}
引用次数: 0
Abstract
This paper studies the optimal false data injection (FDI) attack scheduling problem for multi-sensor cyber–physical systems (CPSs), where the communication bandwidth and energy constraints are considered simultaneously. A novel event-based attack scheduling strategy is proposed to allocate the energy effectively under the bandwidth constraint. Based on which, the optimal stealthy attack parameters are presented analytically, where the remote state estimation error is maximized and the attack stealthiness is guaranteed. Compared with the existing works, the proposed attack strategy can save attack resources significantly while ensuring attack performance. Finally, the simulations are presented to verify the proposed results.
期刊介绍:
The Journal of The Franklin Institute has an established reputation for publishing high-quality papers in the field of engineering and applied mathematics. Its current focus is on control systems, complex networks and dynamic systems, signal processing and communications and their applications. All submitted papers are peer-reviewed. The Journal will publish original research papers and research review papers of substance. Papers and special focus issues are judged upon possible lasting value, which has been and continues to be the strength of the Journal of The Franklin Institute.