Sheng-Sheng Dong, Yi-Gang Li, Li Chen, Xiaoling Zhang
{"title":"远程状态估计能量约束下利用侧边信息的最优隐形攻击","authors":"Sheng-Sheng Dong, Yi-Gang Li, Li Chen, Xiaoling Zhang","doi":"10.1007/s12555-023-0702-2","DOIUrl":null,"url":null,"abstract":"<p>This work considers the innovation-based attacks with side information under the energy constraint in cyber-physical systems where Kullback-Leibler (K-L) divergence is used as the stealthiness metric. Moreover, the attacker requires to decide when to launch attacks over a finite time horizon since the energy limitation. To cause the largest degradation to the estimation performance, the attack strategy and schedule require to be designed synergistically under the constraints. The terminal error (TE) and average error (AE) are respectively taken as attack performance indices. Then, the optimal attack policies for the TE and AE are obtained by solving a constrained optimization problem and a 0–1 programming problem. Finally, simulation examples are employed to demonstrate the results.</p>","PeriodicalId":54965,"journal":{"name":"International Journal of Control Automation and Systems","volume":"5 1","pages":""},"PeriodicalIF":2.5000,"publicationDate":"2024-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Optimal Stealthy Attack With Side Information Under the Energy Constraint on Remote State Estimation\",\"authors\":\"Sheng-Sheng Dong, Yi-Gang Li, Li Chen, Xiaoling Zhang\",\"doi\":\"10.1007/s12555-023-0702-2\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<p>This work considers the innovation-based attacks with side information under the energy constraint in cyber-physical systems where Kullback-Leibler (K-L) divergence is used as the stealthiness metric. Moreover, the attacker requires to decide when to launch attacks over a finite time horizon since the energy limitation. To cause the largest degradation to the estimation performance, the attack strategy and schedule require to be designed synergistically under the constraints. The terminal error (TE) and average error (AE) are respectively taken as attack performance indices. Then, the optimal attack policies for the TE and AE are obtained by solving a constrained optimization problem and a 0–1 programming problem. Finally, simulation examples are employed to demonstrate the results.</p>\",\"PeriodicalId\":54965,\"journal\":{\"name\":\"International Journal of Control Automation and Systems\",\"volume\":\"5 1\",\"pages\":\"\"},\"PeriodicalIF\":2.5000,\"publicationDate\":\"2024-09-02\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Control Automation and Systems\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://doi.org/10.1007/s12555-023-0702-2\",\"RegionNum\":3,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q2\",\"JCRName\":\"AUTOMATION & CONTROL SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Control Automation and Systems","FirstCategoryId":"94","ListUrlMain":"https://doi.org/10.1007/s12555-023-0702-2","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"AUTOMATION & CONTROL SYSTEMS","Score":null,"Total":0}
引用次数: 0
摘要
这项研究考虑了网络物理系统中能量限制下基于侧信息的创新攻击,并将库尔贝-莱布勒(K-L)发散作为隐蔽性指标。此外,由于能量限制,攻击者需要在有限的时间范围内决定何时发动攻击。为了最大限度地降低估计性能,攻击策略和时间安排需要在约束条件下协同设计。分别以终端误差(TE)和平均误差(AE)作为攻击性能指标。然后,通过求解约束优化问题和 0-1 编程问题,得到 TE 和 AE 的最优攻击策略。最后,采用仿真实例来展示结果。
Optimal Stealthy Attack With Side Information Under the Energy Constraint on Remote State Estimation
This work considers the innovation-based attacks with side information under the energy constraint in cyber-physical systems where Kullback-Leibler (K-L) divergence is used as the stealthiness metric. Moreover, the attacker requires to decide when to launch attacks over a finite time horizon since the energy limitation. To cause the largest degradation to the estimation performance, the attack strategy and schedule require to be designed synergistically under the constraints. The terminal error (TE) and average error (AE) are respectively taken as attack performance indices. Then, the optimal attack policies for the TE and AE are obtained by solving a constrained optimization problem and a 0–1 programming problem. Finally, simulation examples are employed to demonstrate the results.
期刊介绍:
International Journal of Control, Automation and Systems is a joint publication of the Institute of Control, Robotics and Systems (ICROS) and the Korean Institute of Electrical Engineers (KIEE).
The journal covers three closly-related research areas including control, automation, and systems.
The technical areas include
Control Theory
Control Applications
Robotics and Automation
Intelligent and Information Systems
The Journal addresses research areas focused on control, automation, and systems in electrical, mechanical, aerospace, chemical, and industrial engineering in order to create a strong synergy effect throughout the interdisciplinary research areas.