{"title":"一种带能量约束的状态估计混合伪确认攻击策略","authors":"Yao Li;Jiaxin Zhang;Xiaolin Wang;Xinping Guan","doi":"10.1109/LSP.2025.3606839","DOIUrl":null,"url":null,"abstract":"Security issues of cyber-physical systems have attracted more and more attentions these years. In this letter, we investigate an energy-constrained optimal hybrid fake-acknowledge attack strategy on state estimation over infinite-time domain, where an attacker will choose certain time instants to generate or block (denoted as Phase I and Phase II, respectively) the feedback flag-acknowledgment (ACK) signals based on a given sensory transmission schedule (STS). We first provide an explicit threshold form of the optimal STS under power constraint. Based on this, the optimal attack strategy for Phase I is presented and proved to satisfy a threshold form. We continue to discuss the optimal state distribution at the threshold, which contributes as a bridge to link these two phases, and consequently derive out the optimal attack strategy for Phase II. Moreover, the condition of convergence is also analytically provided. Comparisons with other feasible schedules are accomplished to verify the correctness and effectiveness of our proposed results.","PeriodicalId":13154,"journal":{"name":"IEEE Signal Processing Letters","volume":"32 ","pages":"3804-3808"},"PeriodicalIF":3.9000,"publicationDate":"2025-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"An Optimal Hybrid Fake-Acknowledgment Attack Strategy on State Estimation With Energy Constraint\",\"authors\":\"Yao Li;Jiaxin Zhang;Xiaolin Wang;Xinping Guan\",\"doi\":\"10.1109/LSP.2025.3606839\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Security issues of cyber-physical systems have attracted more and more attentions these years. In this letter, we investigate an energy-constrained optimal hybrid fake-acknowledge attack strategy on state estimation over infinite-time domain, where an attacker will choose certain time instants to generate or block (denoted as Phase I and Phase II, respectively) the feedback flag-acknowledgment (ACK) signals based on a given sensory transmission schedule (STS). We first provide an explicit threshold form of the optimal STS under power constraint. Based on this, the optimal attack strategy for Phase I is presented and proved to satisfy a threshold form. We continue to discuss the optimal state distribution at the threshold, which contributes as a bridge to link these two phases, and consequently derive out the optimal attack strategy for Phase II. Moreover, the condition of convergence is also analytically provided. Comparisons with other feasible schedules are accomplished to verify the correctness and effectiveness of our proposed results.\",\"PeriodicalId\":13154,\"journal\":{\"name\":\"IEEE Signal Processing Letters\",\"volume\":\"32 \",\"pages\":\"3804-3808\"},\"PeriodicalIF\":3.9000,\"publicationDate\":\"2025-09-09\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IEEE Signal Processing Letters\",\"FirstCategoryId\":\"5\",\"ListUrlMain\":\"https://ieeexplore.ieee.org/document/11153083/\",\"RegionNum\":2,\"RegionCategory\":\"工程技术\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q2\",\"JCRName\":\"ENGINEERING, ELECTRICAL & ELECTRONIC\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Signal Processing Letters","FirstCategoryId":"5","ListUrlMain":"https://ieeexplore.ieee.org/document/11153083/","RegionNum":2,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"ENGINEERING, ELECTRICAL & ELECTRONIC","Score":null,"Total":0}
An Optimal Hybrid Fake-Acknowledgment Attack Strategy on State Estimation With Energy Constraint
Security issues of cyber-physical systems have attracted more and more attentions these years. In this letter, we investigate an energy-constrained optimal hybrid fake-acknowledge attack strategy on state estimation over infinite-time domain, where an attacker will choose certain time instants to generate or block (denoted as Phase I and Phase II, respectively) the feedback flag-acknowledgment (ACK) signals based on a given sensory transmission schedule (STS). We first provide an explicit threshold form of the optimal STS under power constraint. Based on this, the optimal attack strategy for Phase I is presented and proved to satisfy a threshold form. We continue to discuss the optimal state distribution at the threshold, which contributes as a bridge to link these two phases, and consequently derive out the optimal attack strategy for Phase II. Moreover, the condition of convergence is also analytically provided. Comparisons with other feasible schedules are accomplished to verify the correctness and effectiveness of our proposed results.
期刊介绍:
The IEEE Signal Processing Letters is a monthly, archival publication designed to provide rapid dissemination of original, cutting-edge ideas and timely, significant contributions in signal, image, speech, language and audio processing. Papers published in the Letters can be presented within one year of their appearance in signal processing conferences such as ICASSP, GlobalSIP and ICIP, and also in several workshop organized by the Signal Processing Society.