• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

针对远程状态估计的能量受限最优隐秘攻击

Optimal Stealthy Attacks With Energy Constraint Against Remote State Estimation.

作者信息

Liu Xuan, Yang Guang-Hong

出版信息

IEEE Trans Cybern. 2024 Jun;54(6):3577-3587. doi: 10.1109/TCYB.2023.3312346. Epub 2024 May 30.

DOI:10.1109/TCYB.2023.3312346
PMID:37768802
Abstract

This article investigates the problem of energy-constrained stealthy attack strategy against remote state estimation for cyber-physical systems. Taking into account the energy constraint, the malicious attacker is required to schedule the off-line generated signals to modify the transmitted data with limited times over a finite-time horizon under the stealthiness condition, which makes the design of attack strategy more complex. Different from the attack schedules which are studied on the basis of prescribed attack signals in the existing results, the attack strategy is presented under the framework of collaborative design to deteriorate the estimation performance to the largest extent, which yet leads to the coupling between the attack schedules and attack signals. To overcome the difficulty without sacrificing the optimality, the attack design problem is solved in two steps. First, analyze the problem with the given attack schedule to derive the optimal attack signals. Then, the optimal schedule is obtained by efficiently solving the nonlinear 0-1 programming problem based on the algorithm of reducing the search space which is designed to eliminate a part of the nonoptimal solutions. To demonstrate the theoretical results, a simulation example is provided.

摘要

本文研究了针对网络物理系统远程状态估计的能量受限隐秘攻击策略问题。考虑到能量约束,恶意攻击者需要在隐秘条件下,在有限时间范围内安排离线生成的信号,以有限次数修改传输数据,这使得攻击策略的设计更加复杂。与现有结果中基于规定攻击信号研究的攻击调度不同,本文在协同设计框架下提出攻击策略,以最大程度地降低估计性能,但这会导致攻击调度与攻击信号之间的耦合。为了在不牺牲最优性的情况下克服这一困难,分两步解决攻击设计问题。首先,分析给定攻击调度下的问题,以推导最优攻击信号。然后,基于旨在消除部分非最优解的搜索空间缩减算法,通过有效求解非线性0-1规划问题获得最优调度。为了验证理论结果,给出了一个仿真示例。

相似文献

1
Optimal Stealthy Attacks With Energy Constraint Against Remote State Estimation.针对远程状态估计的能量受限最优隐秘攻击
IEEE Trans Cybern. 2024 Jun;54(6):3577-3587. doi: 10.1109/TCYB.2023.3312346. Epub 2024 May 30.
2
Stealthy false data injection attacks with resource constraints against multi-sensor estimation systems.针对多传感器估计系统的具有资源约束的隐蔽虚假数据注入攻击。
ISA Trans. 2022 Aug;127:32-40. doi: 10.1016/j.isatra.2022.02.045. Epub 2022 Mar 4.
3
Kullback-Leibler Divergence-Based Optimal Stealthy Sensor Attack Against Networked Linear Quadratic Gaussian Systems.基于库尔贝克-莱布勒散度的针对网络化线性二次高斯系统的最优隐蔽传感器攻击
IEEE Trans Cybern. 2022 Nov;52(11):11539-11548. doi: 10.1109/TCYB.2021.3068220. Epub 2022 Oct 17.
4
Optimal energy constrained deception attacks in cyber-physical systems with multiple channels: A fusion attack approach.多通道下能量受限的网络物理系统最优欺骗攻击:一种融合攻击方法。
ISA Trans. 2023 Jun;137:1-12. doi: 10.1016/j.isatra.2023.01.020. Epub 2023 Jan 18.
5
Event-Based Optimal Stealthy False Data-Injection Attacks Against Remote State Estimation Systems.针对远程状态估计系统的基于事件的最优隐蔽虚假数据注入攻击
IEEE Trans Cybern. 2023 Oct;53(10):6714-6724. doi: 10.1109/TCYB.2023.3255583. Epub 2023 Sep 15.
6
Optimal Stealthy Deception Attack Against Cyber-Physical Systems.最优隐身欺骗攻击对策的网络物理系统
IEEE Trans Cybern. 2020 Sep;50(9):3963-3972. doi: 10.1109/TCYB.2019.2912622. Epub 2019 May 8.
7
Optimal Strictly Stealthy Attack Design on Cyber-Physical Systems: A Data-Driven Approach.网络物理系统的最优严格隐蔽攻击设计:一种数据驱动方法
IEEE Trans Cybern. 2024 Oct;54(10):6180-6192. doi: 10.1109/TCYB.2024.3413969. Epub 2024 Oct 9.
8
Multiplicative Attacks with Essential Stealthiness in Sensor and Actuator Loops against Cyber-Physical Systems.传感器和执行器环中的乘法攻击与对网络物理系统的基本隐身性。
Sensors (Basel). 2023 Feb 9;23(4):1957. doi: 10.3390/s23041957.
9
False Data Injection Attack for Cyber-Physical Systems With Resource Constraint.具有资源约束的网络物理系统的虚假数据注入攻击。
IEEE Trans Cybern. 2020 Feb;50(2):729-738. doi: 10.1109/TCYB.2018.2871951. Epub 2018 Oct 10.
10
An Analysis on Optimal Attack Schedule Based on Channel Hopping Scheme in Cyber-Physical Systems.基于信息物理系统中跳频方案的最优攻击调度分析
IEEE Trans Cybern. 2021 Feb;51(2):994-1003. doi: 10.1109/TCYB.2019.2914144. Epub 2021 Jan 15.