Zhi Lian;Peng Shi;Chee Peng Lim;Imre J. Rudas;Ramesh K. Agarwal
{"title":"数据包丢失情况下基于随机事件的远程估计的混合隐形攻击","authors":"Zhi Lian;Peng Shi;Chee Peng Lim;Imre J. Rudas;Ramesh K. Agarwal","doi":"10.1109/TNSE.2024.3457911","DOIUrl":null,"url":null,"abstract":"Security related issues of cyber-physical systems are important and interesting from the perspectives of both attackers and defenders. In this paper, we design a stochastic event-based stealthy hybrid attack scheme for remote state estimation in the event of packet dropouts. The objective of the attacker is to maximize the performance degradation while remaining stealthy. Firstly, attack stealthiness is characterized based on the probability distribution and transmission rate. With the stealthiness constraints, an innovation-based stealthy attack model is designed under the assumption that attackers can intercept and modify the measurement innovations. Then, an optimal hybrid attack technique is proposed to maximize the estimation error. With the developed attack strategy, attackers can launch hybrid attacks, including denial-of-service attacks and/or false data injection attacks, to block the network communication channel and compromise the transmitted measurements, therefore degrading and even destroying the system performance. Verification examples are given to illustrate the effectiveness of the attack design performance.","PeriodicalId":54229,"journal":{"name":"IEEE Transactions on Network Science and Engineering","volume":"11 6","pages":"5829-5838"},"PeriodicalIF":6.7000,"publicationDate":"2024-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Hybrid Stealthy Attacks on Stochastic Event-Based Remote Estimation Under Packet Dropouts\",\"authors\":\"Zhi Lian;Peng Shi;Chee Peng Lim;Imre J. Rudas;Ramesh K. Agarwal\",\"doi\":\"10.1109/TNSE.2024.3457911\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Security related issues of cyber-physical systems are important and interesting from the perspectives of both attackers and defenders. In this paper, we design a stochastic event-based stealthy hybrid attack scheme for remote state estimation in the event of packet dropouts. The objective of the attacker is to maximize the performance degradation while remaining stealthy. Firstly, attack stealthiness is characterized based on the probability distribution and transmission rate. With the stealthiness constraints, an innovation-based stealthy attack model is designed under the assumption that attackers can intercept and modify the measurement innovations. Then, an optimal hybrid attack technique is proposed to maximize the estimation error. With the developed attack strategy, attackers can launch hybrid attacks, including denial-of-service attacks and/or false data injection attacks, to block the network communication channel and compromise the transmitted measurements, therefore degrading and even destroying the system performance. Verification examples are given to illustrate the effectiveness of the attack design performance.\",\"PeriodicalId\":54229,\"journal\":{\"name\":\"IEEE Transactions on Network Science and Engineering\",\"volume\":\"11 6\",\"pages\":\"5829-5838\"},\"PeriodicalIF\":6.7000,\"publicationDate\":\"2024-09-10\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IEEE Transactions on Network Science and Engineering\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://ieeexplore.ieee.org/document/10675326/\",\"RegionNum\":2,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"ENGINEERING, MULTIDISCIPLINARY\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Transactions on Network Science and Engineering","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10675326/","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"ENGINEERING, MULTIDISCIPLINARY","Score":null,"Total":0}
Hybrid Stealthy Attacks on Stochastic Event-Based Remote Estimation Under Packet Dropouts
Security related issues of cyber-physical systems are important and interesting from the perspectives of both attackers and defenders. In this paper, we design a stochastic event-based stealthy hybrid attack scheme for remote state estimation in the event of packet dropouts. The objective of the attacker is to maximize the performance degradation while remaining stealthy. Firstly, attack stealthiness is characterized based on the probability distribution and transmission rate. With the stealthiness constraints, an innovation-based stealthy attack model is designed under the assumption that attackers can intercept and modify the measurement innovations. Then, an optimal hybrid attack technique is proposed to maximize the estimation error. With the developed attack strategy, attackers can launch hybrid attacks, including denial-of-service attacks and/or false data injection attacks, to block the network communication channel and compromise the transmitted measurements, therefore degrading and even destroying the system performance. Verification examples are given to illustrate the effectiveness of the attack design performance.
期刊介绍:
The proposed journal, called the IEEE Transactions on Network Science and Engineering (TNSE), is committed to timely publishing of peer-reviewed technical articles that deal with the theory and applications of network science and the interconnections among the elements in a system that form a network. In particular, the IEEE Transactions on Network Science and Engineering publishes articles on understanding, prediction, and control of structures and behaviors of networks at the fundamental level. The types of networks covered include physical or engineered networks, information networks, biological networks, semantic networks, economic networks, social networks, and ecological networks. Aimed at discovering common principles that govern network structures, network functionalities and behaviors of networks, the journal seeks articles on understanding, prediction, and control of structures and behaviors of networks. Another trans-disciplinary focus of the IEEE Transactions on Network Science and Engineering is the interactions between and co-evolution of different genres of networks.