Regular Papers

International Journal of Control, Automation, and Systems 2024; 22(9): 2723-2733

https://doi.org/10.1007/s12555-023-0702-2

© The International Journal of Control, Automation, and Systems

Optimal Stealthy Attack With Side Information Under the Energy Constraint on Remote State Estimation

Sheng-Sheng Dong, Yi-Gang Li*, Li Chen, and Xiaoling Zhang

Shenyang University of Technology

Abstract

This work considers the innovation-based attacks with side information under the energy constraint in cyber-physical systems where Kullback-Leibler (K-L) divergence is used as the stealthiness metric. Moreover, the attacker requires to decide when to launch attacks over a finite time horizon since the energy limitation. To cause the largest degradation to the estimation performance, the attack strategy and schedule require to be designed synergistically under the constraints. The terminal error (TE) and average error (AE) are respectively taken as attack performance indices. Then, the optimal attack policies for the TE and AE are obtained by solving a constrained optimization problem and a 0-1 programming problem. Finally, simulation examples are employed to demonstrate the results.

Keywords Cyber-physical systems (CPSs), energy constraint, K-L divergence, side information, stealthy attacks.

Article

Regular Papers

International Journal of Control, Automation, and Systems 2024; 22(9): 2723-2733

Published online September 1, 2024 https://doi.org/10.1007/s12555-023-0702-2

Copyright © The International Journal of Control, Automation, and Systems.

Optimal Stealthy Attack With Side Information Under the Energy Constraint on Remote State Estimation

Sheng-Sheng Dong, Yi-Gang Li*, Li Chen, and Xiaoling Zhang

Shenyang University of Technology

Abstract

This work considers the innovation-based attacks with side information under the energy constraint in cyber-physical systems where Kullback-Leibler (K-L) divergence is used as the stealthiness metric. Moreover, the attacker requires to decide when to launch attacks over a finite time horizon since the energy limitation. To cause the largest degradation to the estimation performance, the attack strategy and schedule require to be designed synergistically under the constraints. The terminal error (TE) and average error (AE) are respectively taken as attack performance indices. Then, the optimal attack policies for the TE and AE are obtained by solving a constrained optimization problem and a 0-1 programming problem. Finally, simulation examples are employed to demonstrate the results.

Keywords: Cyber-physical systems (CPSs), energy constraint, K-L divergence, side information, stealthy attacks.

IJCAS
September 2024

Vol. 22, No. 9, pp. 2673~2953

Stats or Metrics

Share this article on

  • line

Related articles in IJCAS

IJCAS

eISSN 2005-4092
pISSN 1598-6446