{"title":"Optimal Fusion Deception Attacks Design and Game Analysis in Multi-Sensor Systems","authors":"Chuanyi Ning;Fei Hao;Jiping Yang","doi":"10.1109/TNSE.2025.3565903","DOIUrl":null,"url":null,"abstract":"In this paper, the problems of designing fusion deception attacks against multi-sensor systems are investigated. Some new fusion deception attack models have been designed. The trace of the estimation error is used to evaluate the attack performance and the Kullback-Leibler (K-L) divergence is utilized to evaluate the stealthiness. The benchmarking is to compare the estimation errors under the same stealthiness constraint. It has been verified that the proposed attack schemes perform better than the existing ones. Besides, the consideration of correlation help to improve the attack performance as well. A game framework was also established to study the interaction between the attacker and the defender. Based on the game analysis, optimal attack scheme and defense policy are simultaneously derived to achieve a Nash equilibrium. Finally, simulation results are provided to illustrate the theoretical results.","PeriodicalId":54229,"journal":{"name":"IEEE Transactions on Network Science and Engineering","volume":"12 5","pages":"3837-3849"},"PeriodicalIF":7.9000,"publicationDate":"2025-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Transactions on Network Science and Engineering","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10980462/","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"ENGINEERING, MULTIDISCIPLINARY","Score":null,"Total":0}
引用次数: 0
Abstract
In this paper, the problems of designing fusion deception attacks against multi-sensor systems are investigated. Some new fusion deception attack models have been designed. The trace of the estimation error is used to evaluate the attack performance and the Kullback-Leibler (K-L) divergence is utilized to evaluate the stealthiness. The benchmarking is to compare the estimation errors under the same stealthiness constraint. It has been verified that the proposed attack schemes perform better than the existing ones. Besides, the consideration of correlation help to improve the attack performance as well. A game framework was also established to study the interaction between the attacker and the defender. Based on the game analysis, optimal attack scheme and defense policy are simultaneously derived to achieve a Nash equilibrium. Finally, simulation results are provided to illustrate the theoretical results.
期刊介绍:
The proposed journal, called the IEEE Transactions on Network Science and Engineering (TNSE), is committed to timely publishing of peer-reviewed technical articles that deal with the theory and applications of network science and the interconnections among the elements in a system that form a network. In particular, the IEEE Transactions on Network Science and Engineering publishes articles on understanding, prediction, and control of structures and behaviors of networks at the fundamental level. The types of networks covered include physical or engineered networks, information networks, biological networks, semantic networks, economic networks, social networks, and ecological networks. Aimed at discovering common principles that govern network structures, network functionalities and behaviors of networks, the journal seeks articles on understanding, prediction, and control of structures and behaviors of networks. Another trans-disciplinary focus of the IEEE Transactions on Network Science and Engineering is the interactions between and co-evolution of different genres of networks.