无需估算器知识的双通道隐形虚假数据注入攻击设计

IF 2.7 4区 计算机科学 Q2 AUTOMATION & CONTROL SYSTEMS
Haoran Wang, Yuwei Ren, Yixian Fang, Ang Liu
{"title":"无需估算器知识的双通道隐形虚假数据注入攻击设计","authors":"Haoran Wang,&nbsp;Yuwei Ren,&nbsp;Yixian Fang,&nbsp;Ang Liu","doi":"10.1002/asjc.3409","DOIUrl":null,"url":null,"abstract":"<p>This paper primarily focuses on designing stealthy false data injection attacks targeting two communication channels in cyber-physical systems equipped with state estimators and attack detectors. It introduces the concept of perfect attacks, rendering the attack detector unable to detect the designed attack signals, thereby enabling attackers to further destabilize the system. Through the error model designed by the attacker, the designed attack does not require knowledge of the state estimator. By injecting a carefully designed perfect attack into the communication channel, it is possible to extend the state estimation error of a residual detector system based on the Kalman filter to infinity. Moreover, this designed attack can bypass the residual-based detector, thus achieving a completely stealthy attack. Finally, the results of theoretical derivations are validated by a numerical example and a practical case.</p>","PeriodicalId":55453,"journal":{"name":"Asian Journal of Control","volume":"26 6","pages":"3314-3326"},"PeriodicalIF":2.7000,"publicationDate":"2024-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Two-channel stealthy false data injection attacks design without estimator knowledge\",\"authors\":\"Haoran Wang,&nbsp;Yuwei Ren,&nbsp;Yixian Fang,&nbsp;Ang Liu\",\"doi\":\"10.1002/asjc.3409\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<p>This paper primarily focuses on designing stealthy false data injection attacks targeting two communication channels in cyber-physical systems equipped with state estimators and attack detectors. It introduces the concept of perfect attacks, rendering the attack detector unable to detect the designed attack signals, thereby enabling attackers to further destabilize the system. Through the error model designed by the attacker, the designed attack does not require knowledge of the state estimator. By injecting a carefully designed perfect attack into the communication channel, it is possible to extend the state estimation error of a residual detector system based on the Kalman filter to infinity. Moreover, this designed attack can bypass the residual-based detector, thus achieving a completely stealthy attack. Finally, the results of theoretical derivations are validated by a numerical example and a practical case.</p>\",\"PeriodicalId\":55453,\"journal\":{\"name\":\"Asian Journal of Control\",\"volume\":\"26 6\",\"pages\":\"3314-3326\"},\"PeriodicalIF\":2.7000,\"publicationDate\":\"2024-05-19\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Asian Journal of Control\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://onlinelibrary.wiley.com/doi/10.1002/asjc.3409\",\"RegionNum\":4,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q2\",\"JCRName\":\"AUTOMATION & CONTROL SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Asian Journal of Control","FirstCategoryId":"94","ListUrlMain":"https://onlinelibrary.wiley.com/doi/10.1002/asjc.3409","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"AUTOMATION & CONTROL SYSTEMS","Score":null,"Total":0}
引用次数: 0

摘要

本文主要针对配备状态估计器和攻击探测器的网络物理系统中的两个通信信道,设计隐蔽的虚假数据注入攻击。它引入了完美攻击的概念,使攻击探测器无法检测到所设计的攻击信号,从而使攻击者能够进一步破坏系统的稳定。通过攻击者设计的误差模型,所设计的攻击并不需要了解状态估计器。通过向通信信道注入精心设计的完美攻击,可以将基于卡尔曼滤波器的残差探测器系统的状态估计误差扩大到无穷大。此外,这种设计好的攻击可以绕过基于残差的检测器,从而实现完全隐蔽的攻击。最后,理论推导的结果通过一个数值实例和一个实际案例得到了验证。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Two-channel stealthy false data injection attacks design without estimator knowledge

This paper primarily focuses on designing stealthy false data injection attacks targeting two communication channels in cyber-physical systems equipped with state estimators and attack detectors. It introduces the concept of perfect attacks, rendering the attack detector unable to detect the designed attack signals, thereby enabling attackers to further destabilize the system. Through the error model designed by the attacker, the designed attack does not require knowledge of the state estimator. By injecting a carefully designed perfect attack into the communication channel, it is possible to extend the state estimation error of a residual detector system based on the Kalman filter to infinity. Moreover, this designed attack can bypass the residual-based detector, thus achieving a completely stealthy attack. Finally, the results of theoretical derivations are validated by a numerical example and a practical case.

求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
Asian Journal of Control
Asian Journal of Control 工程技术-自动化与控制系统
CiteScore
4.80
自引率
25.00%
发文量
253
审稿时长
7.2 months
期刊介绍: The Asian Journal of Control, an Asian Control Association (ACA) and Chinese Automatic Control Society (CACS) affiliated journal, is the first international journal originating from the Asia Pacific region. The Asian Journal of Control publishes papers on original theoretical and practical research and developments in the areas of control, involving all facets of control theory and its application. Published six times a year, the Journal aims to be a key platform for control communities throughout the world. The Journal provides a forum where control researchers and practitioners can exchange knowledge and experiences on the latest advances in the control areas, and plays an educational role for students and experienced researchers in other disciplines interested in this continually growing field. The scope of the journal is extensive. Topics include: The theory and design of control systems and components, encompassing: Robust and distributed control using geometric, optimal, stochastic and nonlinear methods Game theory and state estimation Adaptive control, including neural networks, learning, parameter estimation and system fault detection Artificial intelligence, fuzzy and expert systems Hierarchical and man-machine systems All parts of systems engineering which consider the reliability of components and systems Emerging application areas, such as: Robotics Mechatronics Computers for computer-aided design, manufacturing, and control of various industrial processes Space vehicles and aircraft, ships, and traffic Biomedical systems National economies Power systems Agriculture Natural resources.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信