Sheng-Sheng Dong, Yi-Gang Li, Li Chen, Xiaoling Zhang
{"title":"Optimal Stealthy Attack With Side Information Under the Energy Constraint on Remote State Estimation","authors":"Sheng-Sheng Dong, Yi-Gang Li, Li Chen, Xiaoling Zhang","doi":"10.1007/s12555-023-0702-2","DOIUrl":null,"url":null,"abstract":"<p>This work considers the innovation-based attacks with side information under the energy constraint in cyber-physical systems where Kullback-Leibler (K-L) divergence is used as the stealthiness metric. Moreover, the attacker requires to decide when to launch attacks over a finite time horizon since the energy limitation. To cause the largest degradation to the estimation performance, the attack strategy and schedule require to be designed synergistically under the constraints. The terminal error (TE) and average error (AE) are respectively taken as attack performance indices. Then, the optimal attack policies for the TE and AE are obtained by solving a constrained optimization problem and a 0–1 programming problem. Finally, simulation examples are employed to demonstrate the results.</p>","PeriodicalId":54965,"journal":{"name":"International Journal of Control Automation and Systems","volume":"5 1","pages":""},"PeriodicalIF":2.5000,"publicationDate":"2024-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Control Automation and Systems","FirstCategoryId":"94","ListUrlMain":"https://doi.org/10.1007/s12555-023-0702-2","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"AUTOMATION & CONTROL SYSTEMS","Score":null,"Total":0}
引用次数: 0
Abstract
This work considers the innovation-based attacks with side information under the energy constraint in cyber-physical systems where Kullback-Leibler (K-L) divergence is used as the stealthiness metric. Moreover, the attacker requires to decide when to launch attacks over a finite time horizon since the energy limitation. To cause the largest degradation to the estimation performance, the attack strategy and schedule require to be designed synergistically under the constraints. The terminal error (TE) and average error (AE) are respectively taken as attack performance indices. Then, the optimal attack policies for the TE and AE are obtained by solving a constrained optimization problem and a 0–1 programming problem. Finally, simulation examples are employed to demonstrate the results.
期刊介绍:
International Journal of Control, Automation and Systems is a joint publication of the Institute of Control, Robotics and Systems (ICROS) and the Korean Institute of Electrical Engineers (KIEE).
The journal covers three closly-related research areas including control, automation, and systems.
The technical areas include
Control Theory
Control Applications
Robotics and Automation
Intelligent and Information Systems
The Journal addresses research areas focused on control, automation, and systems in electrical, mechanical, aerospace, chemical, and industrial engineering in order to create a strong synergy effect throughout the interdisciplinary research areas.