• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

多通道下能量受限的网络物理系统最优欺骗攻击:一种融合攻击方法。

Optimal energy constrained deception attacks in cyber-physical systems with multiple channels: A fusion attack approach.

机构信息

School of Artificial Intelligence, Shenyang University of Technology, 110870, China.

College of Information Science and Engineering, Northeastern University, Shenyang, 110819, China; State Key Laboratory of Synthetical Automation of Process Industries, Northeastern University, Shenyang, 110819, China; Department of Electrical and Computer Engineering, King Abdulaziz University, Jeddah 21589, Saudi Arabia.

出版信息

ISA Trans. 2023 Jun;137:1-12. doi: 10.1016/j.isatra.2023.01.020. Epub 2023 Jan 18.

DOI:10.1016/j.isatra.2023.01.020
PMID:36725413
Abstract

This paper studies the issue of developing the optimal deception attacks on the multiple channels in cyber-physical systems, where the attackers are limited by energy constraints. To fully utilize the eavesdropped data, by linearly combining the innovations from the different channels, a fusion attack model is proposed under the stealthiness condition. According to the statistical characteristics of the correlated stochastic variables and the orthogonality principle, the state estimation error is quantified and analyzed by deriving the iteration of the error covariance matrices of the remote estimators under the proposed attack framework. Moreover, by analyzing the correlations of the decision variables in the objective function, it is shown that the attack parameters and energy allocation strategy can be derived by two steps without loss of optimality, such that the optimal attack scheme is acquired by solving a multivariate semi-definite programming (SDP) problem and a linear 0-1 programming problem respectively. Finally, simulation examples are provided to illustrate the effectiveness of the proposed method.

摘要

本文研究了在能量受限的情况下,针对多通道网络物理系统中的最优欺骗攻击问题。为了充分利用截获的数据,通过对来自不同通道的新息进行线性组合,在隐蔽性条件下提出了一种融合攻击模型。根据相关随机变量的统计特性和正交原理,通过推导远程估计器在提出的攻击框架下的误差协方差矩阵的迭代,对状态估计误差进行了量化和分析。此外,通过分析目标函数中决策变量的相关性,表明可以通过两步不损失最优性的方法导出攻击参数和能量分配策略,从而通过分别求解多元半定规划(SDP)问题和线性 0-1 规划问题获得最优攻击方案。最后,通过仿真示例验证了所提方法的有效性。

相似文献

1
Optimal energy constrained deception attacks in cyber-physical systems with multiple channels: A fusion attack approach.多通道下能量受限的网络物理系统最优欺骗攻击:一种融合攻击方法。
ISA Trans. 2023 Jun;137:1-12. doi: 10.1016/j.isatra.2023.01.020. Epub 2023 Jan 18.
2
Stealthy false data injection attacks with resource constraints against multi-sensor estimation systems.针对多传感器估计系统的具有资源约束的隐蔽虚假数据注入攻击。
ISA Trans. 2022 Aug;127:32-40. doi: 10.1016/j.isatra.2022.02.045. Epub 2022 Mar 4.
3
Optimal Stealthy Deception Attack Against Cyber-Physical Systems.最优隐身欺骗攻击对策的网络物理系统
IEEE Trans Cybern. 2020 Sep;50(9):3963-3972. doi: 10.1109/TCYB.2019.2912622. Epub 2019 May 8.
4
Optimal Stealthy Attacks With Energy Constraint Against Remote State Estimation.针对远程状态估计的能量受限最优隐秘攻击
IEEE Trans Cybern. 2024 Jun;54(6):3577-3587. doi: 10.1109/TCYB.2023.3312346. Epub 2024 May 30.
5
Multiplicative Attacks with Essential Stealthiness in Sensor and Actuator Loops against Cyber-Physical Systems.传感器和执行器环中的乘法攻击与对网络物理系统的基本隐身性。
Sensors (Basel). 2023 Feb 9;23(4):1957. doi: 10.3390/s23041957.
6
Event-Based Optimal Stealthy False Data-Injection Attacks Against Remote State Estimation Systems.针对远程状态估计系统的基于事件的最优隐蔽虚假数据注入攻击
IEEE Trans Cybern. 2023 Oct;53(10):6714-6724. doi: 10.1109/TCYB.2023.3255583. Epub 2023 Sep 15.
7
Optimal Innovation-Based Stealthy Attacks in Networked LQG Systems With Attack Cost.具有攻击成本的网络化线性二次高斯(LQG)系统中基于最优创新的隐秘攻击
IEEE Trans Cybern. 2024 Feb;54(2):787-796. doi: 10.1109/TCYB.2022.3229430. Epub 2024 Jan 17.
8
Secure control design for nonlinear cyber-physical systems under DoS, replay, and deception cyber-attacks with multiple transmission channels.具有多传输通道的拒绝服务、重放和欺骗性网络攻击下非线性网络物理系统的安全控制设计
ISA Trans. 2022 Sep;128(Pt B):294-308. doi: 10.1016/j.isatra.2021.11.033. Epub 2021 Dec 13.
9
An Analysis on Optimal Attack Schedule Based on Channel Hopping Scheme in Cyber-Physical Systems.基于信息物理系统中跳频方案的最优攻击调度分析
IEEE Trans Cybern. 2021 Feb;51(2):994-1003. doi: 10.1109/TCYB.2019.2914144. Epub 2021 Jan 15.
10
Kullback-Leibler Divergence-Based Optimal Stealthy Sensor Attack Against Networked Linear Quadratic Gaussian Systems.基于库尔贝克-莱布勒散度的针对网络化线性二次高斯系统的最优隐蔽传感器攻击
IEEE Trans Cybern. 2022 Nov;52(11):11539-11548. doi: 10.1109/TCYB.2021.3068220. Epub 2022 Oct 17.

引用本文的文献

1
Multi-Channel Power Scheduling Based on Intrusion Detection System Under DDoS Attack: A Starkberg Game Approach.基于入侵检测系统的DDoS攻击下多通道功率调度:一种斯塔克伯格博弈方法
Sensors (Basel). 2025 Jan 26;25(3):742. doi: 10.3390/s25030742.