• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

基于信息物理系统中跳频方案的最优攻击调度分析

An Analysis on Optimal Attack Schedule Based on Channel Hopping Scheme in Cyber-Physical Systems.

作者信息

Gan Ruimeng, Xiao Yue, Shao Jinliang, Qin Jiahu

出版信息

IEEE Trans Cybern. 2021 Feb;51(2):994-1003. doi: 10.1109/TCYB.2019.2914144. Epub 2021 Jan 15.

DOI:10.1109/TCYB.2019.2914144
PMID:31107677
Abstract

In this paper, we investigate the issue of security on the remote state estimation in cyber-physical systems (CPSs), where a wireless sensor utilizes the channel hopping scheme to transmit the data to the remote estimator over multiple channels in the presence of periodic denial-of-service attacks. Assume that the jammer can interfere with a subset of channels at each attack time in active period. For an energy-constraint jammer, the problem of how to select the number of channels at each attack time to maximally deteriorate the CPS performance is investigated. Based on the index of average estimation error, we introduce two different attack strategies, which include selecting identical number of channels and unequal number of channels at each attack time, and further show theoretically that the attack effect by selecting unequal number of channels is better than that of selecting identical number of channels. By formulating the problem of selecting the number of channels as integer programming problems, we present the corresponding algorithm to approximate the optimal attack schedule for both cases. The numerical results are presented to validate the theoretical results and the effectiveness of the proposed algorithms.

摘要

在本文中,我们研究了信息物理系统(CPS)中远程状态估计的安全问题,其中无线传感器采用信道跳变方案,在存在周期性拒绝服务攻击的情况下通过多个信道将数据传输到远程估计器。假设干扰器在活跃期的每个攻击时刻都能干扰一部分信道。对于能量受限的干扰器,研究了如何在每个攻击时刻选择信道数量以最大程度地降低CPS性能的问题。基于平均估计误差指标,我们引入了两种不同的攻击策略,包括在每个攻击时刻选择相同数量的信道和不相等数量的信道,并进一步从理论上表明,选择不相等数量信道的攻击效果优于选择相同数量信道的攻击效果。通过将选择信道数量的问题表述为整数规划问题,我们针对这两种情况提出了相应的算法来近似最优攻击调度。给出了数值结果以验证理论结果和所提算法的有效性。

相似文献

1
An Analysis on Optimal Attack Schedule Based on Channel Hopping Scheme in Cyber-Physical Systems.基于信息物理系统中跳频方案的最优攻击调度分析
IEEE Trans Cybern. 2021 Feb;51(2):994-1003. doi: 10.1109/TCYB.2019.2914144. Epub 2021 Jan 15.
2
Allocation of Eavesdropping Attacks for Multi-System Remote State Estimation.多系统远程状态估计的窃听攻击分配
Sensors (Basel). 2024 Jan 28;24(3):850. doi: 10.3390/s24030850.
3
Stealthy false data injection attacks with resource constraints against multi-sensor estimation systems.针对多传感器估计系统的具有资源约束的隐蔽虚假数据注入攻击。
ISA Trans. 2022 Aug;127:32-40. doi: 10.1016/j.isatra.2022.02.045. Epub 2022 Mar 4.
4
Observer-based H control for cyber-physical systems encountering DoS jamming attacks: An attack-tolerant approach.遭遇拒绝服务干扰攻击的信息物理系统基于观测器的 H 控制:一种容错方法。
ISA Trans. 2020 Sep;104:1-14. doi: 10.1016/j.isatra.2019.12.014. Epub 2020 Jan 6.
5
Jamming attack against remote state estimation over multiple wireless channels: A reinforcement learning based game theoretical approach.针对多无线信道远程状态估计的干扰攻击:一种基于强化学习的博弈论方法。
ISA Trans. 2022 Nov;130:1-9. doi: 10.1016/j.isatra.2022.03.005. Epub 2022 Mar 11.
6
Optimal energy constrained deception attacks in cyber-physical systems with multiple channels: A fusion attack approach.多通道下能量受限的网络物理系统最优欺骗攻击:一种融合攻击方法。
ISA Trans. 2023 Jun;137:1-12. doi: 10.1016/j.isatra.2023.01.020. Epub 2023 Jan 18.
7
False Data Injection Attack for Cyber-Physical Systems With Resource Constraint.具有资源约束的网络物理系统的虚假数据注入攻击。
IEEE Trans Cybern. 2020 Feb;50(2):729-738. doi: 10.1109/TCYB.2018.2871951. Epub 2018 Oct 10.
8
Learning-Based DoS Attack Power Allocation in Multiprocess Systems.
IEEE Trans Neural Netw Learn Syst. 2023 Oct;34(10):8017-8030. doi: 10.1109/TNNLS.2022.3148924. Epub 2023 Oct 5.
9
Secure control design for nonlinear cyber-physical systems under DoS, replay, and deception cyber-attacks with multiple transmission channels.具有多传输通道的拒绝服务、重放和欺骗性网络攻击下非线性网络物理系统的安全控制设计
ISA Trans. 2022 Sep;128(Pt B):294-308. doi: 10.1016/j.isatra.2021.11.033. Epub 2021 Dec 13.
10
Optimal Stealthy Attacks With Energy Constraint Against Remote State Estimation.针对远程状态估计的能量受限最优隐秘攻击
IEEE Trans Cybern. 2024 Jun;54(6):3577-3587. doi: 10.1109/TCYB.2023.3312346. Epub 2024 May 30.

引用本文的文献

1
Multi-Channel Power Scheduling Based on Intrusion Detection System Under DDoS Attack: A Starkberg Game Approach.基于入侵检测系统的DDoS攻击下多通道功率调度:一种斯塔克伯格博弈方法
Sensors (Basel). 2025 Jan 26;25(3):742. doi: 10.3390/s25030742.
2
An Overview of Recent Advances of Resilient Consensus for Multiagent Systems under Attacks.受攻击多智能体系统弹性共识研究进展综述
Comput Intell Neurosci. 2022 Aug 2;2022:6732343. doi: 10.1155/2022/6732343. eCollection 2022.