Suppr超能文献

具有攻击成本的网络化线性二次高斯(LQG)系统中基于最优创新的隐秘攻击

Optimal Innovation-Based Stealthy Attacks in Networked LQG Systems With Attack Cost.

作者信息

Jin Kaijing, Ye Dan

出版信息

IEEE Trans Cybern. 2024 Feb;54(2):787-796. doi: 10.1109/TCYB.2022.3229430. Epub 2024 Jan 17.

Abstract

In this article, the optimal innovation-based attack strategy is investigated for the networked linear quadratic Gaussian (LQG) systems. To bypass the detector, the attacks are required to follow strict stealthiness or ϵ -stealthiness described by the Kullback-Leibler divergence. The attackers aim to increase the quadratic control cost and decrease the attack cost, which is formulated as a nonconvex optimization problem. Then, based on the cyclic property of the matrix trace, the nonconvex objective function is transformed into a linear function related to attack matrices and covariance matrices of the tampered innovations. The optimal strictly stealthy attack is obtained by utilizing the matrix decomposition technique. Furthermore, the optimal ϵ -stealthy attack is derived to achieve a higher-attack effect by an integrated convex optimization, which distinguishes from the existing suboptimal attacks developed by a two-stage optimization. Simulation results are provided to show the effectiveness of the designed attacks.

摘要

本文针对网络化线性二次高斯(LQG)系统研究了基于最优创新的攻击策略。为绕过检测器,攻击需遵循由库尔贝克 - 莱布勒散度描述的严格隐蔽性或ϵ - 隐蔽性。攻击者旨在增加二次控制成本并降低攻击成本,这被表述为一个非凸优化问题。然后,基于矩阵迹的循环性质,将非凸目标函数转化为与被篡改创新的攻击矩阵和协方差矩阵相关的线性函数。利用矩阵分解技术获得最优严格隐蔽攻击。此外,通过综合凸优化推导得到最优ϵ - 隐蔽攻击,以实现更高的攻击效果,这与通过两阶段优化开发的现有次优攻击不同。提供了仿真结果以表明所设计攻击的有效性。

相似文献

1
Optimal Innovation-Based Stealthy Attacks in Networked LQG Systems With Attack Cost.
IEEE Trans Cybern. 2024 Feb;54(2):787-796. doi: 10.1109/TCYB.2022.3229430. Epub 2024 Jan 17.
2
Kullback-Leibler Divergence-Based Optimal Stealthy Sensor Attack Against Networked Linear Quadratic Gaussian Systems.
IEEE Trans Cybern. 2022 Nov;52(11):11539-11548. doi: 10.1109/TCYB.2021.3068220. Epub 2022 Oct 17.
3
Optimal Stealthy Deception Attack Against Cyber-Physical Systems.
IEEE Trans Cybern. 2020 Sep;50(9):3963-3972. doi: 10.1109/TCYB.2019.2912622. Epub 2019 May 8.
5
Optimal energy constrained deception attacks in cyber-physical systems with multiple channels: A fusion attack approach.
ISA Trans. 2023 Jun;137:1-12. doi: 10.1016/j.isatra.2023.01.020. Epub 2023 Jan 18.
6
Data-Driven Methods for Stealthy Attacks on TCP/IP-Based Networked Control Systems Equipped With Attack Detectors.
IEEE Trans Cybern. 2019 Aug;49(8):3020-3031. doi: 10.1109/TCYB.2018.2837874. Epub 2018 Jun 5.
7
Optimal Strictly Stealthy Attack Design on Cyber-Physical Systems: A Data-Driven Approach.
IEEE Trans Cybern. 2024 Oct;54(10):6180-6192. doi: 10.1109/TCYB.2024.3413969. Epub 2024 Oct 9.
8
Stealthy false data injection attacks with resource constraints against multi-sensor estimation systems.
ISA Trans. 2022 Aug;127:32-40. doi: 10.1016/j.isatra.2022.02.045. Epub 2022 Mar 4.
9
Event-Based Optimal Stealthy False Data-Injection Attacks Against Remote State Estimation Systems.
IEEE Trans Cybern. 2023 Oct;53(10):6714-6724. doi: 10.1109/TCYB.2023.3255583. Epub 2023 Sep 15.
10
Reachability Analysis of Cyber-Physical Systems Under Stealthy Attacks.
IEEE Trans Cybern. 2022 Jun;52(6):4926-4934. doi: 10.1109/TCYB.2020.3025307. Epub 2022 Jun 16.

文献AI研究员

20分钟写一篇综述,助力文献阅读效率提升50倍。

立即体验

用中文搜PubMed

大模型驱动的PubMed中文搜索引擎

马上搜索

文档翻译

学术文献翻译模型,支持多种主流文档格式。

立即体验