{"title":"Optimal off-line generated ϵ-stealthy attacks under the energy constraint in cyber-physical systems.","authors":"Hua-Sheng Shan, Ping Sun, Yi-Gang Li","doi":"10.1016/j.isatra.2025.09.004","DOIUrl":null,"url":null,"abstract":"<p><p>The malicious attack design helps to accurately assess the vulnerability of cyber-physical systems under attacks. Based on this, an off-line generated attack model with time-varying covariance is proposed under the energy constraint, which aims to maximize the system estimation error while satisfying the ϵ-stealthiness. Subsequently, the problem is equivalently transformed by quantifying the optimization objective based on the derivation of error covariance and deriving the stealthiness condition according to the statistical properties of mutual information and Kullback-Leibler divergence. Due to the coupling relationship between the designed covariance and scheduling, the covariance is derived as a function of the attack scheduling by the Lagrange multiplier method. Then, the optimal attack scheduling is proved to be fixed according to the uniqueness of the optimal parameters. Finally, some numerical simulations are given to validate the effectiveness of results.</p>","PeriodicalId":94059,"journal":{"name":"ISA transactions","volume":" ","pages":""},"PeriodicalIF":6.5000,"publicationDate":"2025-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"ISA transactions","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1016/j.isatra.2025.09.004","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
The malicious attack design helps to accurately assess the vulnerability of cyber-physical systems under attacks. Based on this, an off-line generated attack model with time-varying covariance is proposed under the energy constraint, which aims to maximize the system estimation error while satisfying the ϵ-stealthiness. Subsequently, the problem is equivalently transformed by quantifying the optimization objective based on the derivation of error covariance and deriving the stealthiness condition according to the statistical properties of mutual information and Kullback-Leibler divergence. Due to the coupling relationship between the designed covariance and scheduling, the covariance is derived as a function of the attack scheduling by the Lagrange multiplier method. Then, the optimal attack scheduling is proved to be fixed according to the uniqueness of the optimal parameters. Finally, some numerical simulations are given to validate the effectiveness of results.