An Optimal Hybrid Fake-Acknowledgment Attack Strategy on State Estimation With Energy Constraint

IF 3.9 2区 工程技术 Q2 ENGINEERING, ELECTRICAL & ELECTRONIC
Yao Li;Jiaxin Zhang;Xiaolin Wang;Xinping Guan
{"title":"An Optimal Hybrid Fake-Acknowledgment Attack Strategy on State Estimation With Energy Constraint","authors":"Yao Li;Jiaxin Zhang;Xiaolin Wang;Xinping Guan","doi":"10.1109/LSP.2025.3606839","DOIUrl":null,"url":null,"abstract":"Security issues of cyber-physical systems have attracted more and more attentions these years. In this letter, we investigate an energy-constrained optimal hybrid fake-acknowledge attack strategy on state estimation over infinite-time domain, where an attacker will choose certain time instants to generate or block (denoted as Phase I and Phase II, respectively) the feedback flag-acknowledgment (ACK) signals based on a given sensory transmission schedule (STS). We first provide an explicit threshold form of the optimal STS under power constraint. Based on this, the optimal attack strategy for Phase I is presented and proved to satisfy a threshold form. We continue to discuss the optimal state distribution at the threshold, which contributes as a bridge to link these two phases, and consequently derive out the optimal attack strategy for Phase II. Moreover, the condition of convergence is also analytically provided. Comparisons with other feasible schedules are accomplished to verify the correctness and effectiveness of our proposed results.","PeriodicalId":13154,"journal":{"name":"IEEE Signal Processing Letters","volume":"32 ","pages":"3804-3808"},"PeriodicalIF":3.9000,"publicationDate":"2025-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Signal Processing Letters","FirstCategoryId":"5","ListUrlMain":"https://ieeexplore.ieee.org/document/11153083/","RegionNum":2,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"ENGINEERING, ELECTRICAL & ELECTRONIC","Score":null,"Total":0}
引用次数: 0

Abstract

Security issues of cyber-physical systems have attracted more and more attentions these years. In this letter, we investigate an energy-constrained optimal hybrid fake-acknowledge attack strategy on state estimation over infinite-time domain, where an attacker will choose certain time instants to generate or block (denoted as Phase I and Phase II, respectively) the feedback flag-acknowledgment (ACK) signals based on a given sensory transmission schedule (STS). We first provide an explicit threshold form of the optimal STS under power constraint. Based on this, the optimal attack strategy for Phase I is presented and proved to satisfy a threshold form. We continue to discuss the optimal state distribution at the threshold, which contributes as a bridge to link these two phases, and consequently derive out the optimal attack strategy for Phase II. Moreover, the condition of convergence is also analytically provided. Comparisons with other feasible schedules are accomplished to verify the correctness and effectiveness of our proposed results.
一种带能量约束的状态估计混合伪确认攻击策略
近年来,网络物理系统的安全问题越来越受到人们的关注。在这封信中,我们研究了一种基于无限时域状态估计的能量约束最优混合假承认攻击策略,其中攻击者将根据给定的感觉传输调度(STS)选择特定的时间瞬间来生成或阻止(分别表示为阶段I和阶段II)反馈标志确认(ACK)信号。首先给出了功率约束下最优STS的显式阈值形式。在此基础上,提出了第一阶段的最优攻击策略,并证明了该策略满足阈值形式。我们继续讨论阈值处的最优状态分布,作为连接这两个阶段的桥梁,从而推导出阶段II的最优攻击策略。并给出了收敛的条件。通过与其他可行方案的比较,验证了所提结果的正确性和有效性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
IEEE Signal Processing Letters
IEEE Signal Processing Letters 工程技术-工程:电子与电气
CiteScore
7.40
自引率
12.80%
发文量
339
审稿时长
2.8 months
期刊介绍: The IEEE Signal Processing Letters is a monthly, archival publication designed to provide rapid dissemination of original, cutting-edge ideas and timely, significant contributions in signal, image, speech, language and audio processing. Papers published in the Letters can be presented within one year of their appearance in signal processing conferences such as ICASSP, GlobalSIP and ICIP, and also in several workshop organized by the Signal Processing Society.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信