• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

传感器和执行器环中的乘法攻击与对网络物理系统的基本隐身性。

Multiplicative Attacks with Essential Stealthiness in Sensor and Actuator Loops against Cyber-Physical Systems.

机构信息

Engineering Research Center of Metallurgical Automation and Measurement Technology, Ministry of Education, Wuhan University of Science and Technology, Wuhan 430081, China.

School of Information Science and Engineering, Wuhan University of Science and Technology, Wuhan 430081, China.

出版信息

Sensors (Basel). 2023 Feb 9;23(4):1957. doi: 10.3390/s23041957.

DOI:10.3390/s23041957
PMID:36850552
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC9959309/
Abstract

Stealthy attacks in sensor and actuator loops are the research priorities in the security of cyber-physical systems. Existing attacks define the stealthiness conditions against the Chi-square or Kullback-Leibler divergence detectors and parameterize the attack model based on additive signals. Such conditions ignore the potential anomalies of the vulnerable outputs in the control layer, and the attack sequences need to be generated online, increasing the hardware and software costs. This paper investigates a type of multiplicative attack with essential stealthiness where the employed model is a novel form. The advantage is that the parameters can be designed in a constant form without having to be generated online. An essential stealthiness condition is proposed for the first time and complements the existing ones. Two sufficient conditions for the existence of constant attack matrices are given in the form of theorems, where two methods for decoupling the unknown variables are particularly considered. A quadruple-tank process, an experimental platform for attack and defense, is developed to verify the theoretical results. The experiments indicate that the proposed attack strategy can fulfill both the attack performance and stealthiness conditions.

摘要

在网络物理系统安全中,传感器和执行器回路中的隐蔽攻击是研究重点。现有的攻击针对卡方或 Kullback-Leibler 散度检测器定义了隐蔽性条件,并基于附加信号对攻击模型进行参数化。这些条件忽略了控制层中脆弱输出的潜在异常,并且攻击序列需要在线生成,这增加了硬件和软件成本。本文研究了一种具有本质隐蔽性的乘法攻击,所采用的模型是一种新颖的形式。其优势在于参数可以设计成常数形式,而无需在线生成。首次提出了本质隐蔽性条件,并对现有的条件进行了补充。以定理的形式给出了常数攻击矩阵存在的两个充分条件,其中特别考虑了两种解耦未知变量的方法。开发了一个四容水箱过程作为攻击和防御的实验平台,以验证理论结果。实验表明,所提出的攻击策略既能满足攻击性能要求,又能满足隐蔽性条件。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f1ff/9959309/e0f07123eb2b/sensors-23-01957-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f1ff/9959309/251fbc9c8b41/sensors-23-01957-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f1ff/9959309/0c729a93ccce/sensors-23-01957-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f1ff/9959309/b982ae8c6621/sensors-23-01957-g003a.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f1ff/9959309/29990143bf2c/sensors-23-01957-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f1ff/9959309/a642b347b231/sensors-23-01957-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f1ff/9959309/e0f07123eb2b/sensors-23-01957-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f1ff/9959309/251fbc9c8b41/sensors-23-01957-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f1ff/9959309/0c729a93ccce/sensors-23-01957-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f1ff/9959309/b982ae8c6621/sensors-23-01957-g003a.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f1ff/9959309/29990143bf2c/sensors-23-01957-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f1ff/9959309/a642b347b231/sensors-23-01957-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f1ff/9959309/e0f07123eb2b/sensors-23-01957-g006.jpg

相似文献

1
Multiplicative Attacks with Essential Stealthiness in Sensor and Actuator Loops against Cyber-Physical Systems.传感器和执行器环中的乘法攻击与对网络物理系统的基本隐身性。
Sensors (Basel). 2023 Feb 9;23(4):1957. doi: 10.3390/s23041957.
2
Kullback-Leibler Divergence-Based Optimal Stealthy Sensor Attack Against Networked Linear Quadratic Gaussian Systems.基于库尔贝克-莱布勒散度的针对网络化线性二次高斯系统的最优隐蔽传感器攻击
IEEE Trans Cybern. 2022 Nov;52(11):11539-11548. doi: 10.1109/TCYB.2021.3068220. Epub 2022 Oct 17.
3
Stealthy false data injection attacks with resource constraints against multi-sensor estimation systems.针对多传感器估计系统的具有资源约束的隐蔽虚假数据注入攻击。
ISA Trans. 2022 Aug;127:32-40. doi: 10.1016/j.isatra.2022.02.045. Epub 2022 Mar 4.
4
Optimal Innovation-Based Stealthy Attacks in Networked LQG Systems With Attack Cost.具有攻击成本的网络化线性二次高斯(LQG)系统中基于最优创新的隐秘攻击
IEEE Trans Cybern. 2024 Feb;54(2):787-796. doi: 10.1109/TCYB.2022.3229430. Epub 2024 Jan 17.
5
Optimal Stealthy Deception Attack Against Cyber-Physical Systems.最优隐身欺骗攻击对策的网络物理系统
IEEE Trans Cybern. 2020 Sep;50(9):3963-3972. doi: 10.1109/TCYB.2019.2912622. Epub 2019 May 8.
6
Optimal energy constrained deception attacks in cyber-physical systems with multiple channels: A fusion attack approach.多通道下能量受限的网络物理系统最优欺骗攻击:一种融合攻击方法。
ISA Trans. 2023 Jun;137:1-12. doi: 10.1016/j.isatra.2023.01.020. Epub 2023 Jan 18.
7
Reliable Control Policy of Cyber-Physical Systems Against a Class of Frequency-Constrained Sensor and Actuator Attacks.针对一类频域受限传感器和执行器攻击的信息物理系统可靠控制策略。
IEEE Trans Cybern. 2018 Dec;48(12):3432-3439. doi: 10.1109/TCYB.2018.2815758. Epub 2018 Mar 27.
8
Event-Based Optimal Stealthy False Data-Injection Attacks Against Remote State Estimation Systems.针对远程状态估计系统的基于事件的最优隐蔽虚假数据注入攻击
IEEE Trans Cybern. 2023 Oct;53(10):6714-6724. doi: 10.1109/TCYB.2023.3255583. Epub 2023 Sep 15.
9
Reachability Analysis of Cyber-Physical Systems Under Stealthy Attacks.隐蔽攻击下信息物理系统的可达性分析
IEEE Trans Cybern. 2022 Jun;52(6):4926-4934. doi: 10.1109/TCYB.2020.3025307. Epub 2022 Jun 16.
10
A Brief Survey of Recent Advances and Methodologies for the Security Control of Complex Cyber-Physical Networks.复杂网络安全控制的最新进展与方法综述。
Sensors (Basel). 2023 Apr 15;23(8):4013. doi: 10.3390/s23084013.

引用本文的文献

1
Sensor Network Attack Synthesis against Fault Diagnosis of Discrete Event Systems.针对离散事件系统故障诊断的传感器网络攻击合成
Sensors (Basel). 2024 Jul 9;24(14):4445. doi: 10.3390/s24144445.

本文引用的文献

1
Kullback-Leibler Divergence-Based Optimal Stealthy Sensor Attack Against Networked Linear Quadratic Gaussian Systems.基于库尔贝克-莱布勒散度的针对网络化线性二次高斯系统的最优隐蔽传感器攻击
IEEE Trans Cybern. 2022 Nov;52(11):11539-11548. doi: 10.1109/TCYB.2021.3068220. Epub 2022 Oct 17.
2
A survey on attack detection, estimation and control of industrial cyber-physical systems.工业信息物理系统的攻击检测、估计与控制研究综述
ISA Trans. 2021 Oct;116:1-16. doi: 10.1016/j.isatra.2021.01.036. Epub 2021 Jan 28.
3
Finite-Time Extended Dissipative Filtering for Singular T-S Fuzzy Systems With Nonhomogeneous Markov Jumps.
具有非齐次马尔可夫跳变的奇异T-S模糊系统的有限时间扩展耗散滤波
IEEE Trans Cybern. 2022 Jun;52(6):4574-4584. doi: 10.1109/TCYB.2020.3030503. Epub 2022 Jun 16.
4
Summation Detector for False Data-Injection Attack in Cyber-Physical Systems.信息物理系统中针对虚假数据注入攻击的求和检测器
IEEE Trans Cybern. 2020 Jun;50(6):2338-2345. doi: 10.1109/TCYB.2019.2915124. Epub 2019 Jun 3.
5
Observer-based output feedback H control for cyber-physical systems under randomly occurring packet dropout and periodic DoS attacks.基于观测器的输出反馈 H 控制在随机丢包和周期性 DoS 攻击下的网络物理系统。
ISA Trans. 2019 Dec;95:58-67. doi: 10.1016/j.isatra.2019.05.008. Epub 2019 May 16.
6
Robust H control for networked control systems with randomly occurring uncertainties: Observer-based case.具有随机不确定性的网络控制系统的鲁棒 H 控制:基于观测器的情况。
ISA Trans. 2018 Dec;83:13-24. doi: 10.1016/j.isatra.2018.09.006. Epub 2018 Sep 24.
7
Data-Driven Methods for Stealthy Attacks on TCP/IP-Based Networked Control Systems Equipped With Attack Detectors.针对配备攻击检测器的基于TCP/IP的网络控制系统的隐蔽攻击的数据驱动方法。
IEEE Trans Cybern. 2019 Aug;49(8):3020-3031. doi: 10.1109/TCYB.2018.2837874. Epub 2018 Jun 5.