远程状态估计能量约束下利用侧边信息的最优隐形攻击

IF 2.5 3区 计算机科学 Q2 AUTOMATION & CONTROL SYSTEMS
Sheng-Sheng Dong, Yi-Gang Li, Li Chen, Xiaoling Zhang
{"title":"远程状态估计能量约束下利用侧边信息的最优隐形攻击","authors":"Sheng-Sheng Dong, Yi-Gang Li, Li Chen, Xiaoling Zhang","doi":"10.1007/s12555-023-0702-2","DOIUrl":null,"url":null,"abstract":"<p>This work considers the innovation-based attacks with side information under the energy constraint in cyber-physical systems where Kullback-Leibler (K-L) divergence is used as the stealthiness metric. Moreover, the attacker requires to decide when to launch attacks over a finite time horizon since the energy limitation. To cause the largest degradation to the estimation performance, the attack strategy and schedule require to be designed synergistically under the constraints. The terminal error (TE) and average error (AE) are respectively taken as attack performance indices. Then, the optimal attack policies for the TE and AE are obtained by solving a constrained optimization problem and a 0–1 programming problem. Finally, simulation examples are employed to demonstrate the results.</p>","PeriodicalId":54965,"journal":{"name":"International Journal of Control Automation and Systems","volume":"5 1","pages":""},"PeriodicalIF":2.5000,"publicationDate":"2024-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Optimal Stealthy Attack With Side Information Under the Energy Constraint on Remote State Estimation\",\"authors\":\"Sheng-Sheng Dong, Yi-Gang Li, Li Chen, Xiaoling Zhang\",\"doi\":\"10.1007/s12555-023-0702-2\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<p>This work considers the innovation-based attacks with side information under the energy constraint in cyber-physical systems where Kullback-Leibler (K-L) divergence is used as the stealthiness metric. Moreover, the attacker requires to decide when to launch attacks over a finite time horizon since the energy limitation. To cause the largest degradation to the estimation performance, the attack strategy and schedule require to be designed synergistically under the constraints. The terminal error (TE) and average error (AE) are respectively taken as attack performance indices. Then, the optimal attack policies for the TE and AE are obtained by solving a constrained optimization problem and a 0–1 programming problem. Finally, simulation examples are employed to demonstrate the results.</p>\",\"PeriodicalId\":54965,\"journal\":{\"name\":\"International Journal of Control Automation and Systems\",\"volume\":\"5 1\",\"pages\":\"\"},\"PeriodicalIF\":2.5000,\"publicationDate\":\"2024-09-02\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Control Automation and Systems\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://doi.org/10.1007/s12555-023-0702-2\",\"RegionNum\":3,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q2\",\"JCRName\":\"AUTOMATION & CONTROL SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Control Automation and Systems","FirstCategoryId":"94","ListUrlMain":"https://doi.org/10.1007/s12555-023-0702-2","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"AUTOMATION & CONTROL SYSTEMS","Score":null,"Total":0}
引用次数: 0

摘要

这项研究考虑了网络物理系统中能量限制下基于侧信息的创新攻击,并将库尔贝-莱布勒(K-L)发散作为隐蔽性指标。此外,由于能量限制,攻击者需要在有限的时间范围内决定何时发动攻击。为了最大限度地降低估计性能,攻击策略和时间安排需要在约束条件下协同设计。分别以终端误差(TE)和平均误差(AE)作为攻击性能指标。然后,通过求解约束优化问题和 0-1 编程问题,得到 TE 和 AE 的最优攻击策略。最后,采用仿真实例来展示结果。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Optimal Stealthy Attack With Side Information Under the Energy Constraint on Remote State Estimation

This work considers the innovation-based attacks with side information under the energy constraint in cyber-physical systems where Kullback-Leibler (K-L) divergence is used as the stealthiness metric. Moreover, the attacker requires to decide when to launch attacks over a finite time horizon since the energy limitation. To cause the largest degradation to the estimation performance, the attack strategy and schedule require to be designed synergistically under the constraints. The terminal error (TE) and average error (AE) are respectively taken as attack performance indices. Then, the optimal attack policies for the TE and AE are obtained by solving a constrained optimization problem and a 0–1 programming problem. Finally, simulation examples are employed to demonstrate the results.

求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
International Journal of Control Automation and Systems
International Journal of Control Automation and Systems 工程技术-自动化与控制系统
CiteScore
5.80
自引率
21.90%
发文量
343
审稿时长
8.7 months
期刊介绍: International Journal of Control, Automation and Systems is a joint publication of the Institute of Control, Robotics and Systems (ICROS) and the Korean Institute of Electrical Engineers (KIEE). The journal covers three closly-related research areas including control, automation, and systems. The technical areas include Control Theory Control Applications Robotics and Automation Intelligent and Information Systems The Journal addresses research areas focused on control, automation, and systems in electrical, mechanical, aerospace, chemical, and industrial engineering in order to create a strong synergy effect throughout the interdisciplinary research areas.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信