{"title":"基于多通道协议的能量约束最优状态估计隐身攻击","authors":"Dancheng Mao;Yugang Niu;Kun Xu","doi":"10.1109/TAC.2025.3558413","DOIUrl":null,"url":null,"abstract":"Research on attack design provides a reference for attack defense. To this end, this work considers the design problem of an optimal energy-constrained stealthy attack strategy orienting remote estimation. The signals from smart sensors to remote estimators are scheduled via an extended Round-Robin protocol, which sends data through each channel in a specific order, and allows more than one channel to be transitable at each instant. To achieve the optimal attack strategy that can maximize the impact on estimation performance, a new attack model with the constraints of stealthiness and energy limitations is constructed. Furthermore, an equivalent two-step optimization problem is suggested to obtain the optimal attack matrix and optimal attack scheduling, respectively. Finally, the optimality and stealthiness of the proposed energy-constrained attack strategy are verified via simulation results.","PeriodicalId":13201,"journal":{"name":"IEEE Transactions on Automatic Control","volume":"70 9","pages":"6245-6252"},"PeriodicalIF":7.0000,"publicationDate":"2025-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Energy-Constrained Optimal Stealthy Attack Against State Estimation With Multichannel Protocol\",\"authors\":\"Dancheng Mao;Yugang Niu;Kun Xu\",\"doi\":\"10.1109/TAC.2025.3558413\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Research on attack design provides a reference for attack defense. To this end, this work considers the design problem of an optimal energy-constrained stealthy attack strategy orienting remote estimation. The signals from smart sensors to remote estimators are scheduled via an extended Round-Robin protocol, which sends data through each channel in a specific order, and allows more than one channel to be transitable at each instant. To achieve the optimal attack strategy that can maximize the impact on estimation performance, a new attack model with the constraints of stealthiness and energy limitations is constructed. Furthermore, an equivalent two-step optimization problem is suggested to obtain the optimal attack matrix and optimal attack scheduling, respectively. Finally, the optimality and stealthiness of the proposed energy-constrained attack strategy are verified via simulation results.\",\"PeriodicalId\":13201,\"journal\":{\"name\":\"IEEE Transactions on Automatic Control\",\"volume\":\"70 9\",\"pages\":\"6245-6252\"},\"PeriodicalIF\":7.0000,\"publicationDate\":\"2025-04-07\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IEEE Transactions on Automatic Control\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://ieeexplore.ieee.org/document/10950135/\",\"RegionNum\":1,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"AUTOMATION & CONTROL SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Transactions on Automatic Control","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10950135/","RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"AUTOMATION & CONTROL SYSTEMS","Score":null,"Total":0}
Energy-Constrained Optimal Stealthy Attack Against State Estimation With Multichannel Protocol
Research on attack design provides a reference for attack defense. To this end, this work considers the design problem of an optimal energy-constrained stealthy attack strategy orienting remote estimation. The signals from smart sensors to remote estimators are scheduled via an extended Round-Robin protocol, which sends data through each channel in a specific order, and allows more than one channel to be transitable at each instant. To achieve the optimal attack strategy that can maximize the impact on estimation performance, a new attack model with the constraints of stealthiness and energy limitations is constructed. Furthermore, an equivalent two-step optimization problem is suggested to obtain the optimal attack matrix and optimal attack scheduling, respectively. Finally, the optimality and stealthiness of the proposed energy-constrained attack strategy are verified via simulation results.
期刊介绍:
In the IEEE Transactions on Automatic Control, the IEEE Control Systems Society publishes high-quality papers on the theory, design, and applications of control engineering. Two types of contributions are regularly considered:
1) Papers: Presentation of significant research, development, or application of control concepts.
2) Technical Notes and Correspondence: Brief technical notes, comments on published areas or established control topics, corrections to papers and notes published in the Transactions.
In addition, special papers (tutorials, surveys, and perspectives on the theory and applications of control systems topics) are solicited.