International Journal of Control, Automation, and Systems 2024; 22(9): 2723-2733
https://doi.org/10.1007/s12555-023-0702-2
© The International Journal of Control, Automation, and Systems
This work considers the innovation-based attacks with side information under the energy constraint in cyber-physical systems where Kullback-Leibler (K-L) divergence is used as the stealthiness metric. Moreover, the attacker requires to decide when to launch attacks over a finite time horizon since the energy limitation. To cause the largest degradation to the estimation performance, the attack strategy and schedule require to be designed synergistically under the constraints. The terminal error (TE) and average error (AE) are respectively taken as attack performance indices. Then, the optimal attack policies for the TE and AE are obtained by solving a constrained optimization problem and a 0-1 programming problem. Finally, simulation examples are employed to demonstrate the results.
Keywords Cyber-physical systems (CPSs), energy constraint, K-L divergence, side information, stealthy attacks.
International Journal of Control, Automation, and Systems 2024; 22(9): 2723-2733
Published online September 1, 2024 https://doi.org/10.1007/s12555-023-0702-2
Copyright © The International Journal of Control, Automation, and Systems.
Sheng-Sheng Dong, Yi-Gang Li*, Li Chen, and Xiaoling Zhang
Shenyang University of Technology
This work considers the innovation-based attacks with side information under the energy constraint in cyber-physical systems where Kullback-Leibler (K-L) divergence is used as the stealthiness metric. Moreover, the attacker requires to decide when to launch attacks over a finite time horizon since the energy limitation. To cause the largest degradation to the estimation performance, the attack strategy and schedule require to be designed synergistically under the constraints. The terminal error (TE) and average error (AE) are respectively taken as attack performance indices. Then, the optimal attack policies for the TE and AE are obtained by solving a constrained optimization problem and a 0-1 programming problem. Finally, simulation examples are employed to demonstrate the results.
Keywords: Cyber-physical systems (CPSs), energy constraint, K-L divergence, side information, stealthy attacks.
Vol. 22, No. 9, pp. 2673~2953
Bo-Chao Zheng*, Lina Guo, Xiaoguang Liu, Zhou Gu, and Yangyang Zhao
International Journal of Control, Automation and Systems 2022; 20(12): 3892-3902