网络物理系统能量约束下最优离线生成ϵ-stealthy攻击。

IF 6.5
Hua-Sheng Shan, Ping Sun, Yi-Gang Li
{"title":"网络物理系统能量约束下最优离线生成ϵ-stealthy攻击。","authors":"Hua-Sheng Shan, Ping Sun, Yi-Gang Li","doi":"10.1016/j.isatra.2025.09.004","DOIUrl":null,"url":null,"abstract":"<p><p>The malicious attack design helps to accurately assess the vulnerability of cyber-physical systems under attacks. Based on this, an off-line generated attack model with time-varying covariance is proposed under the energy constraint, which aims to maximize the system estimation error while satisfying the ϵ-stealthiness. Subsequently, the problem is equivalently transformed by quantifying the optimization objective based on the derivation of error covariance and deriving the stealthiness condition according to the statistical properties of mutual information and Kullback-Leibler divergence. Due to the coupling relationship between the designed covariance and scheduling, the covariance is derived as a function of the attack scheduling by the Lagrange multiplier method. Then, the optimal attack scheduling is proved to be fixed according to the uniqueness of the optimal parameters. Finally, some numerical simulations are given to validate the effectiveness of results.</p>","PeriodicalId":94059,"journal":{"name":"ISA transactions","volume":" ","pages":""},"PeriodicalIF":6.5000,"publicationDate":"2025-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Optimal off-line generated ϵ-stealthy attacks under the energy constraint in cyber-physical systems.\",\"authors\":\"Hua-Sheng Shan, Ping Sun, Yi-Gang Li\",\"doi\":\"10.1016/j.isatra.2025.09.004\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<p><p>The malicious attack design helps to accurately assess the vulnerability of cyber-physical systems under attacks. Based on this, an off-line generated attack model with time-varying covariance is proposed under the energy constraint, which aims to maximize the system estimation error while satisfying the ϵ-stealthiness. Subsequently, the problem is equivalently transformed by quantifying the optimization objective based on the derivation of error covariance and deriving the stealthiness condition according to the statistical properties of mutual information and Kullback-Leibler divergence. Due to the coupling relationship between the designed covariance and scheduling, the covariance is derived as a function of the attack scheduling by the Lagrange multiplier method. Then, the optimal attack scheduling is proved to be fixed according to the uniqueness of the optimal parameters. Finally, some numerical simulations are given to validate the effectiveness of results.</p>\",\"PeriodicalId\":94059,\"journal\":{\"name\":\"ISA transactions\",\"volume\":\" \",\"pages\":\"\"},\"PeriodicalIF\":6.5000,\"publicationDate\":\"2025-09-17\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"ISA transactions\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1016/j.isatra.2025.09.004\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"ISA transactions","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1016/j.isatra.2025.09.004","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

恶意攻击设计有助于准确评估网络物理系统在攻击下的脆弱性。在此基础上,提出了一种能量约束下具有时变协方差的离线生成攻击模型,其目标是在满足ϵ-stealthiness的前提下使系统估计误差最大化。然后,根据误差协方差的推导对优化目标进行量化,根据互信息的统计性质和Kullback-Leibler散度推导出隐身条件,对问题进行等效转化。由于设计的协方差与调度之间存在耦合关系,利用拉格朗日乘子法推导出协方差作为攻击调度的函数。然后,根据最优参数的唯一性证明了最优攻击调度是固定的。最后通过数值仿真验证了所得结果的有效性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Optimal off-line generated ϵ-stealthy attacks under the energy constraint in cyber-physical systems.

The malicious attack design helps to accurately assess the vulnerability of cyber-physical systems under attacks. Based on this, an off-line generated attack model with time-varying covariance is proposed under the energy constraint, which aims to maximize the system estimation error while satisfying the ϵ-stealthiness. Subsequently, the problem is equivalently transformed by quantifying the optimization objective based on the derivation of error covariance and deriving the stealthiness condition according to the statistical properties of mutual information and Kullback-Leibler divergence. Due to the coupling relationship between the designed covariance and scheduling, the covariance is derived as a function of the attack scheduling by the Lagrange multiplier method. Then, the optimal attack scheduling is proved to be fixed according to the uniqueness of the optimal parameters. Finally, some numerical simulations are given to validate the effectiveness of results.

求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信