271
Views
1
CrossRef citations to date
0
Altmetric
Research Articles

Optimal strictly stealthy attacks in cyber-physical systems with multiple channels under the energy constraint

, &
Pages 2608-2625 | Received 11 Apr 2023, Accepted 31 Jul 2023, Published online: 18 Aug 2023

References

  • Ahmed, S. H., Kim, G., & Kim, D. (2013). Cyber physical system: Architecture, applications and research challenges. In 2013 IFIP wireless days (WD) (pp. 1–5). IEEE. ISSN 2156-9711.
  • An, L., & Yang, G.-H. (2017). Secure state estimation against sparse sensor attacks with adaptive switching mechanism. IEEE Transactions on Automatic Control, 63(8), 2596–2603. https://doi.org/10.1109/TAC.9
  • An, L., Yang, G. H., Deng, C., & Wen, C. (2023). Event-triggered reference governors for collisions-free leader-following coordination under unreliable communication topologies. IEEE Transactions on Automatic Control. https://doi.org/10.1109/TAC.2023.3291654
  • Anderson, B. D., & Moore, J. B. (2012). Optimal filtering. Courier Corporation.
  • Bai, C.-Z., Gupta, V., & Pasqualetti, F. (2017). On kalman filtering with compromised sensors: Attack stealthiness and performance bounds. IEEE Transactions on Automatic Control, 62(12), 6641–6648. https://doi.org/10.1109/TAC.2017.2714903
  • Bai, C.-Z., Pasqualetti, F., & Gupta, V. (2017). Data-injection attacks in stochastic control systems: Detectability and performance tradeoffs. Automatica, 82, 251–260. https://doi.org/10.1016/j.automatica.2017.04.047
  • Cardenas, A. A., Amin, S., & Sastry, S. (2008). Secure control: Towards survivable cyber-physical systems. In 2008 the 28th international conference on distributed computing systems workshops (pp. 495–500). IEEE.
  • Chen, Y., Kar, S., & Moura, J. M. (2017). Cyber-physical attacks with control objectives. IEEE Transactions on Automatic Control, 63(5), 1418–1425. https://doi.org/10.1109/TAC.2017.2741778
  • De Marcellis, A., & Ferri, G. (2011). Analog circuits and systems for voltage-mode and current-mode sensor interfacing applications. Springer Science & Business Media.
  • Doebelin, E. O., & Manik, D. N. (2007). Measurement systems: Application and design. McGraw-Hil.
  • Foroush, H. S., & Martinez, S. (2012). On event-triggered control of linear systems under periodic denial-of-service jamming attacks. In 2012 IEEE 51st IEEE conference on decision and control (CDC) (pp. 2551–2556). IEEE.
  • Gan, R., Xiao, Y., Shao, J., & Qin, J. (2019). An analysis on optimal attack schedule based on channel hopping scheme in cyber-physical systems. IEEE Transactions on Cybernetics, 51(2), 994–1003. https://doi.org/10.1109/TCYB.6221036
  • Gervais-Ducouret, S. (2011). Next smart sensors generation. In 2011 IEEE sensors applications symposium (pp. 193–196). IEEE.
  • Grant, M., & Boyd, S. (2014). Cvx: Matlab software for disciplined convex programming (Version 2.1).
  • Guo, H., Sun, J., Pang, Z.-H., & Liu, G.-P. (2023). Event-based optimal stealthy false data-injection attacks against remote state estimation systems. IEEE Transactions on Cybernetics. https://doi.org/10.1109/TCYB.2023.3255583
  • Guo, Z., Shi, D., Johansson, K. H., & Shi, L. (2016). Optimal linear cyber-attack on remote state estimation. IEEE Transactions on Control of Network Systems, 4(1), 4–13. https://doi.org/10.1109/TCNS.2016.2570003
  • Guo, Z., Shi, D., Johansson, K. H., & Shi, L. (2018). Worst-case stealthy innovation-based linear attack on remote state estimation. Automatica, 89, 117–124. https://doi.org/10.1016/j.automatica.2017.11.018
  • Guo, Z., Shi, D., Quevedo, D. E., & Shi, L. (2018). Secure state estimation against integrity attacks: A gaussian mixture model approach. IEEE Transactions on Signal Processing, 67(1), 194–207. https://doi.org/10.1109/TSP.2018.2879037
  • Hespanha, J. P., Naghshtabrizi, P., & Xu, Y. (2007). A survey of recent results in networked control systems. Proceedings of the IEEE, 95(1), 138–162. https://doi.org/10.1109/JPROC.2006.887288
  • Islam, T., Mukhopadhyay, S. C., & Suryadevara, N. K. (2016). Smart sensors and internet of things: A postgraduate paper. IEEE Sensors Journal, 17(3), 577–584. https://doi.org/10.1109/JSEN.7361
  • Law, Y. W., Palaniswami, M., Hoesel, L. V., Doumen, J., Hartel, P., & Havinga, P. (2009). Energy-efficient link-layer jamming attacks against wireless sensor network mac protocols. ACM Transactions on Sensor Networks (TOSN), 5(1), 1–38. https://doi.org/10.1145/1464420.1464426
  • Li, F., & Tang, Y. (2018). False data injection attack for cyber-physical systems with resource constraint. IEEE Transactions on Cybernetics, 50(2), 729–738. https://doi.org/10.1109/TCYB.6221036
  • Li, Y., Shi, D., & Chen, T. (2018). False data injection attacks on networked control systems: A stackelberg game analysis. IEEE Transactions on Automatic Control, 63(10), 3503–3509. https://doi.org/10.1109/TAC.9
  • Li, Y., Shi, L., & Chen, T. (2017). Detection against linear deception attacks on multi-sensor remote state estimation. IEEE Transactions on Control of Network Systems, 5(3), 846–856. https://doi.org/10.1109/TCNS.2017.2648508
  • Li, Y.-G., & Yang, G.-H. (2019). Optimal stealthy innovation-based attacks with historical data in cyber-physical systems. IEEE Transactions on Systems, Man, and Cybernetics: Systems, 51(6), 3401–3411. https://doi.org/10.1109/TSMC.2019.2924976
  • Li, Y.-G., & Yang, G.-H. (2022). Optimal completely stealthy attacks against remote estimation in cyber-physical systems. Information Sciences, 590, 15–28. https://doi.org/10.1016/j.ins.2022.01.014
  • Liu, H. (2019). Sinr-based multi-channel power schedule under dos attacks: A stackelberg game approach with incomplete information. Automatica, 100, 274–280. https://doi.org/10.1016/j.automatica.2018.11.034
  • Liu, Y., Ning, P., & Reiter, M. K. (2011). False data injection attacks against state estimation in electric power grids. ACM Transactions on Information and System Security (TISSEC), 14(1), 1–33. https://doi.org/10.1145/1952982.1952995
  • Lu, A.-Y., & Yang, G.-H. (2017). Secure state estimation for cyber-physical systems under sparse sensor attacks via a switched luenberger observer. Information Sciences, 417, 454–464. https://doi.org/10.1016/j.ins.2017.07.029
  • Mehra, R. K., & Peschon, J. (1971). An innovations approach to fault detection and diagnosis in dynamic systems. Automatica, 7(5), 637–640. https://doi.org/10.1016/0005-1098(71)90028-8
  • Meijer, G. (2008). Smart sensor systems. John Wiley & Sons.
  • Mo, Y., Kim, T. H.-J., Brancik, K., Dickinson, D., Lee, H., Perrig, A., & Sinopoli, B. (2011). Cyber–physical security of a smart grid infrastructure. Proceedings of the IEEE, 100(1), 195–209.
  • Pang, Z., Fu, Y., Guo, H., & Sun, J. (2023). Analysis of stealthy false data injection attacks against networked control systems: Three case studies. Journal of Systems Science and Complexity, 36(4), 1407–1422.
  • Pang, Z.-H., Fan, L.-Z., Guo, H., Shi, Y., Chai, R., Sun, J., & Liu, G.-P. (2022). Security of networked control systems subject to deception attacks: A survey. International Journal of Systems Science, 53(16), 3577–3598. https://doi.org/10.1080/00207721.2022.2143735
  • Pelechrinis, K., Iliofotou, M., & Krishnamurthy, S. V. (2010). Denial of service attacks in wireless networks: The case of jammers. IEEE Communications Surveys & Tutorials, 13(2), 245–257. https://doi.org/10.1109/SURV.2011.041110.00022
  • Peng, L., Shi, L., Cao, X., & Sun, C. (2017). Optimal attack energy allocation against remote state estimation. IEEE Transactions on Automatic Control, 63(7), 2199–2205. https://doi.org/10.1109/TAC.9
  • Poisel, R. (2011). Modern communications jamming principles and techniques. Artech House.
  • Poovendran, R., Sampigethaya, K., Gupta, S. K. S., Lee, I., Prasad, K. V., Corman, D., & Paunicka, J. L. (2011). Special issue on cyber-physical systems [scanning the issue]. Proceedings of the IEEE, 100(1), 6–12. https://doi.org/10.1109/JPROC.2011.2167449
  • Qin, J., Li, M., Shi, L., & Yu, X. (2017). Optimal denial-of-service attack scheduling with energy constraint over packet-dropping networks. IEEE Transactions on Automatic Control, 63(6), 1648–1663. https://doi.org/10.1109/TAC.9
  • Qin, J., Li, M., Wang, J., Shi, L., Kang, Y., & Zheng, W. X. (2020). Optimal denial-of-service attack energy management against state estimation over an sinr-based network. Automatica, 119, 109090. https://doi.org/10.1016/j.automatica.2020.109090
  • Song, Y., & Ye, D. (2022). Optimal stealthy attack against stochastic event-based scheduling for remote state estimation in cyber-physical systems. International Journal of Robust and Nonlinear Control, 32(6), 3511–3526. https://doi.org/10.1002/rnc.v32.6
  • Teixeira, A. M. (2019). Optimal stealthy attacks on actuators for strictly proper systems. In 2019 IEEE 58th conference on decision and control (CDC) (pp. 4385–4390). IEEE.
  • Willsky, A. S. (1976). A survey of design methods for failure detection in dynamic systems. Automatica, 12(6), 601–611. https://doi.org/10.1016/0005-1098(76)90041-8
  • Xu, W., Ma, K., Trappe, W., & Zhang, Y. (2006). Jamming sensor networks: Attack and defense strategies. IEEE Network, 20(3), 41–47. https://doi.org/10.1109/MNET.2006.1637931
  • Yang, W., Zhang, Y., Chen, G., Yang, C., & Shi, L. (2019). Distributed filtering under false data injection attacks. Automatica, 102, 34–44. https://doi.org/10.1016/j.automatica.2018.12.027
  • Ye, D., Yang, B., & Zhang, T.-Y. (2021). Optimal stealthy linear attack on remote state estimation with side information. IEEE Systems Journal, 16(1), 1499–1507. https://doi.org/10.1109/JSYST.2021.3063735
  • Zhang, H., Cheng, P., Shi, L., & Chen, J. (2015a). Optimal denial-of-service attack scheduling with energy constraint. IEEE Transactions on Automatic Control, 60(11), 3023–3028. https://doi.org/10.1109/TAC.9
  • Zhang, H., Cheng, P., Shi, L., & Chen, J. (2015b). Optimal dos attack scheduling in wireless networked control system. IEEE Transactions on Control Systems Technology, 24(3), 843–852. https://doi.org/10.1109/TCST.2015.2462741
  • Zhang, H., Qi, Y., Wu, J., Fu, L., & He, L. (2016). Dos attack energy management against remote state estimation. IEEE Transactions on Control of Network Systems, 5(1), 383–394. https://doi.org/10.1109/TCNS.6509490
  • Zhang, H., & Wang, J. (2016). Active steering actuator fault detection for an automatically-steered electric ground vehicle. IEEE Transactions on Vehicular Technology, 66(5), 3685–3702. https://doi.org/10.1109/TVT.2015.2445833
  • Zhang, J., & Sun, J. (2021). Optimal stealthy linear-attack schedules on remote state estimation. IEEE Transactions on Signal Processing, 69, 2807–2817. https://doi.org/10.1109/TSP.2021.3078624
  • Zhang, L., Deng, C., Che, W.-W., & An, L. (2023). Adaptive backstepping control for nonlinear interconnected systems with prespecified-performance-driven output triggering. Automatica, 154, 111063. https://doi.org/10.1016/j.automatica.2023.111063
  • Zhang, Q., Liu, K., Han, D., Su, G., & Xia, Y. (2022). Design of stealthy deception attacks with partial system knowledge. IEEE Transactions on Automatic Control, 68(2), 1069–1076. https://doi.org/10.1109/TAC.2022.3146079
  • Zhang, Q., Liu, K., Teixeira, A. M., Li, Y., Chai, S., & Xia, Y. (2023). An online kullback-leibler divergence-based stealthy attack against cyber-physical systems. IEEE Transactions on Automatic Control, 68(6), 3672–3679.
  • Zhang, T.-Y., & Ye, D. (2020). False data injection attacks with complete stealthiness in cyber–physical systems: A self-generated approach. Automatica, 120, 109117. https://doi.org/10.1016/j.automatica.2020.109117
  • Zhang, Z.-H., & Yang, G.-H. (2017). Interval observer-based fault isolation for discrete-time fuzzy interconnected systems with unknown interconnections. IEEE Transactions on Cybernetics, 47(9), 2413–2424. https://doi.org/10.1109/TCYB.2017.2707462
  • Zhao, Z., Wang, Z., & Zou, L. (2022). Sequential fusion estimation for multirate complex networks with uniform quantization: A zonotopic set-membership approach. IEEE Transactions on Neural Networks and Learning Systems. https://doi.org/10.1109/TNNLS.2022.3209135
  • Zhao, Z., Wang, Z., Zou, L., Chen, Y., & Sheng, W. (2023). Zonotopic distributed fusion for nonlinear networked systems with bit rate constraint. Information Fusion, 90, 174–184. https://doi.org/10.1016/j.inffus.2022.09.014
  • Zhou, J., Shang, J., & Chen, T. (2023). On information fusion in optimal linear FDI attacks against remote state estimation. IEEE Transactions on Control of Network Systems. https://doi.org/10.1109/TCNS.2023.3260041

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.