• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

针对多传感器估计系统的具有资源约束的隐蔽虚假数据注入攻击。

Stealthy false data injection attacks with resource constraints against multi-sensor estimation systems.

作者信息

Guo Haibin, Sun Jian, Pang Zhong-Hua

机构信息

State Key Lab of Intelligent Control and Decision of Complex Systems, School of Automation, Beijing Institute of Technology, Beijing 100081, China.

State Key Lab of Intelligent Control and Decision of Complex Systems, School of Automation, Beijing Institute of Technology, Beijing 100081, China; Beijing Institute of Technology Chongqing Innovation Center, Chongqing 401120, China.

出版信息

ISA Trans. 2022 Aug;127:32-40. doi: 10.1016/j.isatra.2022.02.045. Epub 2022 Mar 4.

DOI:10.1016/j.isatra.2022.02.045
PMID:35292173
Abstract

This paper mainly investigates how to maximally degrade estimation performance of a cyber-physical system under limited resource. A stealthy false data injection (FDI) attack scheme is proposed to only attack partial sensor channels of a multi-sensor estimation system. The attack stealthiness condition and the compromised estimation error covariance are respectively derived, and then the stealthy attack problem is formed as a constrained optimization problem. An explicit solution of the optimal attack strategy is given and proven. Furthermore, the relationship between the compromised estimation error covariance and the attacked sensor is analyzed, and then the sensor selection principle is derived to decide which sensor channel should be attacked. Finally, two numerical simulation examples are provided to confirm the theoretical analysis results.

摘要

本文主要研究如何在资源受限的情况下最大程度地降低信息物理系统的估计性能。提出了一种隐蔽虚假数据注入(FDI)攻击方案,仅对多传感器估计系统的部分传感器通道进行攻击。分别推导了攻击隐蔽性条件和受损估计误差协方差,然后将隐蔽攻击问题构建为一个约束优化问题。给出并证明了最优攻击策略的显式解。此外,分析了受损估计误差协方差与被攻击传感器之间的关系,进而推导了传感器选择原则,以确定应攻击哪个传感器通道。最后,提供了两个数值仿真示例来验证理论分析结果。

相似文献

1
Stealthy false data injection attacks with resource constraints against multi-sensor estimation systems.针对多传感器估计系统的具有资源约束的隐蔽虚假数据注入攻击。
ISA Trans. 2022 Aug;127:32-40. doi: 10.1016/j.isatra.2022.02.045. Epub 2022 Mar 4.
2
Event-Based Optimal Stealthy False Data-Injection Attacks Against Remote State Estimation Systems.针对远程状态估计系统的基于事件的最优隐蔽虚假数据注入攻击
IEEE Trans Cybern. 2023 Oct;53(10):6714-6724. doi: 10.1109/TCYB.2023.3255583. Epub 2023 Sep 15.
3
False Data Injection Attack for Cyber-Physical Systems With Resource Constraint.具有资源约束的网络物理系统的虚假数据注入攻击。
IEEE Trans Cybern. 2020 Feb;50(2):729-738. doi: 10.1109/TCYB.2018.2871951. Epub 2018 Oct 10.
4
Kullback-Leibler Divergence-Based Optimal Stealthy Sensor Attack Against Networked Linear Quadratic Gaussian Systems.基于库尔贝克-莱布勒散度的针对网络化线性二次高斯系统的最优隐蔽传感器攻击
IEEE Trans Cybern. 2022 Nov;52(11):11539-11548. doi: 10.1109/TCYB.2021.3068220. Epub 2022 Oct 17.
5
Optimal energy constrained deception attacks in cyber-physical systems with multiple channels: A fusion attack approach.多通道下能量受限的网络物理系统最优欺骗攻击:一种融合攻击方法。
ISA Trans. 2023 Jun;137:1-12. doi: 10.1016/j.isatra.2023.01.020. Epub 2023 Jan 18.
6
Optimal Stealthy Attacks With Energy Constraint Against Remote State Estimation.针对远程状态估计的能量受限最优隐秘攻击
IEEE Trans Cybern. 2024 Jun;54(6):3577-3587. doi: 10.1109/TCYB.2023.3312346. Epub 2024 May 30.
7
Multiplicative Attacks with Essential Stealthiness in Sensor and Actuator Loops against Cyber-Physical Systems.传感器和执行器环中的乘法攻击与对网络物理系统的基本隐身性。
Sensors (Basel). 2023 Feb 9;23(4):1957. doi: 10.3390/s23041957.
8
Optimal Strictly Stealthy Attack Design on Cyber-Physical Systems: A Data-Driven Approach.网络物理系统的最优严格隐蔽攻击设计:一种数据驱动方法
IEEE Trans Cybern. 2024 Oct;54(10):6180-6192. doi: 10.1109/TCYB.2024.3413969. Epub 2024 Oct 9.
9
An Analysis on Optimal Attack Schedule Based on Channel Hopping Scheme in Cyber-Physical Systems.基于信息物理系统中跳频方案的最优攻击调度分析
IEEE Trans Cybern. 2021 Feb;51(2):994-1003. doi: 10.1109/TCYB.2019.2914144. Epub 2021 Jan 15.
10
Optimal Stealthy Deception Attack Against Cyber-Physical Systems.最优隐身欺骗攻击对策的网络物理系统
IEEE Trans Cybern. 2020 Sep;50(9):3963-3972. doi: 10.1109/TCYB.2019.2912622. Epub 2019 May 8.